{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:40:09Z","timestamp":1744206009203,"version":"3.40.3"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031875403","type":"print"},{"value":"9783031875410","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87541-0_5","type":"book-chapter","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:59:56Z","timestamp":1744203596000},"page":"81-119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Limitations of\u00a0Wrapping Protocols and\u00a0TLS Channel Bindings: Formal-Methods Analysis of\u00a0the\u00a0Session Binding Proxy Protocol"],"prefix":"10.1007","author":[{"given":"Enis","family":"Golaszewski","sequence":"first","affiliation":[]},{"given":"Edward","family":"Zieglar","sequence":"additional","affiliation":[]},{"given":"Alan T.","family":"Sherman","sequence":"additional","affiliation":[]},{"given":"Kirellos","family":"Abou Elsaad","sequence":"additional","affiliation":[]},{"given":"Jonathan D.","family":"Fuchs","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,10]]},"reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/32.481513","volume":"22","author":"M Abadi","year":"1996","unstructured":"Abadi, M., Needham, R.M.: Prudent engineering practice for cryptographic protocols. IEEE Trans. Softw. Eng. 22(1), 6\u201315 (1996). https:\/\/doi.org\/10.1109\/32.481513","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR2","unstructured":"Abou\u00a0Elsaad, K.N.: A formal methods analysis of the session binding proxy protocol, Master\u2019s thesis, University of Maryland, Baltimore County (2022). http:\/\/proxy-bc.researchport.umd.edu\/login?url=https:\/\/www.proquest.com\/dissertations-theses\/formal-methods-analysis-session-binding-proxy\/docview\/2720939643\/se-2"},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Altman, J.E., Zhu, L., Williams, N.: Channel Bindings for TLS. RFC 5929 (2010). https:\/\/doi.org\/10.17487\/RFC5929","DOI":"10.17487\/RFC5929"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Barbosa, M., Boldyreva, A., Chen, S., Warinschi, B.: Provable security analysis of FIDO2. In: Advances in Cryptology\u2013CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16\u201320, 2021, Proceedings, Part III 41, pp. 125\u2013156. Springer (2021)","DOI":"10.1007\/978-3-030-84252-9_5"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Annual International Cryptology Conference, pp. 232\u2013249. Springer (1993)","DOI":"10.1007\/3-540-48329-2_21"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Bhandary, P., Zieglar, E., Nicholas, C.: Searching for selfie in TLS 1.3 with the cryptographic protocol shapes analyzer. In: Dougherty, D., Meseguer, J., M\u00f6dersheim, S.A., Rowe, P.D. (eds.) Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday. LNCS, vol. 13066, pp. 50\u201376. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-91631-2_3","DOI":"10.1007\/978-3-030-91631-2_3"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Bindel, N., Cremers, C., Zhao, M.: FIDO2, CTAP 2.1, and WebAuthn 2: provable security and post-quantum instantiation. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 1471\u20131490. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179454"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: Security protocol verification: symbolic and computational models. In: International Conference on Principles of Security and Trust, pp. 3\u201329. Springer (2012)","DOI":"10.1007\/978-3-642-28641-4_2"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Blanchet, B.: Automatic verification of security protocols in the symbolic model: The verifier ProVerif. In: Aldini, A., L\u00f3pez, J., Martinelli, F. (eds.) Foundations of Security Analysis and Design VII - FOSAD 2012\/2013 Tutorial Lectures. LNCS, vol.\u00a08604, pp. 54\u201387. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-319-10082-1_3","DOI":"10.1007\/978-3-319-10082-1_3"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Burgers, W., Verdult, R., van Eekelen, M.C.J.D.: Prevent session hijacking by binding the session to the cryptographic network credentials. In: Nielson, H.R., Gollmann, D. (eds.) Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. LNCS, vol.\u00a08208, pp. 33\u201350. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-41488-6_3","DOI":"10.1007\/978-3-642-41488-6_3"},{"issue":"2","key":"5_CR11","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/S10207-011-0124-7","volume":"10","author":"G Coker","year":"2011","unstructured":"Coker, G., et al.: Principles of remote attestation. Int. J. Inf. Sec. 10(2), 63\u201381 (2011). https:\/\/doi.org\/10.1007\/S10207-011-0124-7","journal-title":"Int. J. Inf. Sec."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Cremers, C., Horvat, M., Hoyland, J., Scott, S., van\u00a0der Merwe, T.: A comprehensive symbolic analysis of TLS 1.3. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1773\u20131788 (2017)","DOI":"10.1145\/3133956.3134063"},{"issue":"2","key":"5_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983). https:\/\/doi.org\/10.1109\/TIT.1983.1056650","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5_CR14","unstructured":"van Eekelen, M., Moussa, R.B., Hubbers, E., Verdult, R.: Blackboard security assessment, Technical report, Nijmegen: Institute for Computing and Information Sciences (2013)"},{"key":"5_CR15","unstructured":"Elsaad, K.A.: SBP tailgating attack implementation (2022). https:\/\/github.com\/kmanayer\/sbp_impl"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: cryptographic protocol analysis modulo equational properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) Foundations of Security Analysis and Design V, FOSAD 2007\/2008\/2009 Tutorial Lectures. LNCS, vol.\u00a05705, pp. 1\u201350. Springer (2007). https:\/\/doi.org\/10.1007\/978-3-642-03829-7_1","DOI":"10.1007\/978-3-642-03829-7_1"},{"key":"5_CR17","unstructured":"Fuchs, J., Hamer, S., Liu, D.: A man-in-the-middle attack on the FIDO UAF registration protocol. CSEE Dept, UMBC, CMSC 491\/691 report (2022)"},{"key":"5_CR18","unstructured":"Golaszewski, E., Sherman, A.T., Zieglar, E.: Cryptographic binding should not be optional: a formal-methods analysis of FIDO UAF authentication. unpublished manuscript, CSEE Dept, UMBC (2023)"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: Goldreich, O. (ed.) Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 203\u2013225. ACM (2019). https:\/\/doi.org\/10.1145\/3335741.3335750","DOI":"10.1145\/3335741.3335750"},{"key":"5_CR20","unstructured":"Guttman, J., Liskov, M., Ramsdell, J., Rowe, P.: The cryptographic protocol shapes analyzer (CPSA). https:\/\/github.com\/mitre\/cpsa"},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Guttman, J.D.: Security goals: packet trajectories and strand spaces. In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000]. LNCS, vol.\u00a02171, pp. 197\u2013261. Springer (2000). https:\/\/doi.org\/10.1007\/3-540-45608-2_4","DOI":"10.1007\/3-540-45608-2_4"},{"issue":"2","key":"5_CR22","doi-asserted-by":"publisher","first-page":"203","DOI":"10.3233\/JCS-140499","volume":"22","author":"JD Guttman","year":"2014","unstructured":"Guttman, J.D.: Establishing and preserving protocol security goals. J. Comput. Secur. 22(2), 203\u2013267 (2014). https:\/\/doi.org\/10.3233\/JCS-140499","journal-title":"J. Comput. Secur."},{"key":"5_CR23","unstructured":"Jagpal, N., et al.: Trends and lessons from three years fighting malicious extensions. In: Jung, J., Holz, T. (eds.) 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015, pp. 579\u2013593. USENIX Association (2015). https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/jagpal"},{"key":"5_CR24","unstructured":"Kapravelos, A., Grier, C., Chachra, N., Kruegel, C., Vigna, G., Paxson, V.: Hulk: eliciting malicious behavior in browser extensions. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 641\u2013654. USENIX Association, San Diego, CA (2014). https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/kapravelos"},{"key":"5_CR25","unstructured":"Kasturi, R.P., et al.: Mistrust plugins you must: a large-scale study of malicious plugins in WordPress marketplaces. In: Butler, K.R.B., Thomas, K. (eds.) 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 161\u2013178. USENIX Association (2022). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/kasturi"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Kelsey, J., Schneier, B., Wagner, D.A.: Protocol interactions and the chosen protocol attack. In: Christianson, B., Crispo, B., Lomas, T.M.A., Roe, M. (eds.) Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings. LNCS, vol.\u00a01361, pp. 91\u2013104. Springer (1997). https:\/\/doi.org\/10.1007\/BFB0028162","DOI":"10.1007\/BFB0028162"},{"issue":"2","key":"5_CR27","first-page":"66","volume":"16","author":"E Lanus","year":"2017","unstructured":"Lanus, E., Zieglar, E.: Analysis of a forced-latency defense against man-in-the-middle attacks. J. Inf. Warfare 16(2), 66\u201378 (2017)","journal-title":"J. Inf. Warfare"},{"key":"5_CR28","unstructured":"Leischner, G., Tews, C.: Security through VLAN segmentation: isolating and securing critical assets without loss of usability. In: Proceedings of the 9th Annual Western Power Delivery and Automation Conference, Spokane, WA (2007)"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Liskov, M., Rowe, P., Thayer, J.: Completeness of CPSA, Technical report, MITRE (2011). https:\/\/www.mitre.org\/sites\/default\/files\/pdf\/12_0038.pdf","DOI":"10.21236\/ADA562264"},{"key":"5_CR30","unstructured":"Liskov, M.D., Ramsdell, J.D., Guttman, J.D., Rowe, P.D.: The Cryptographic Protocol Shapes Analyzer: A Manual. The MITRE Corporation (2016)"},{"issue":"3","key":"5_CR31","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131\u2013133 (1995). https:\/\/doi.org\/10.1016\/0020-0190(95)00144-2","journal-title":"Inf. Process. Lett."},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: 10th Computer Security Foundations Workshop Proceedings, pp. 31\u201343. IEEE CS Press (1997)","DOI":"10.1109\/CSFW.1997.596782"},{"key":"5_CR33","volume-title":"Web Proxy Servers","author":"A Luotonen","year":"1998","unstructured":"Luotonen, A.: Web Proxy Servers. Prentice-Hall, Inc. (1998)"},{"key":"5_CR34","doi-asserted-by":"publisher","unstructured":"Meier, S., Schmidt, B., Cremers, C., Basin, D.A.: The TAMARIN prover for the symbolic analysis of security protocols. In: Sharygina, N., Veith, H. (eds.) Computer Aided Verification - 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings. LNCS, vol.\u00a08044, pp. 696\u2013701. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_48","DOI":"10.1007\/978-3-642-39799-8_48"},{"issue":"12","key":"5_CR35","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993\u2013999 (1978). https:\/\/doi.org\/10.1145\/359657.359659","journal-title":"Commun. ACM"},{"key":"5_CR36","doi-asserted-by":"publisher","unstructured":"Nikiforakis, N., Meert, W., Younan, Y., Johns, M., Joosen, W.: SessionShield: lightweight protection against session hijacking. In: Erlingsson, \u00da., Wieringa, R.J., Zannone, N. (eds.) Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings. LNCS, vol.\u00a06542, pp. 87\u2013100. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-19125-1_7","DOI":"10.1007\/978-3-642-19125-1_7"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Pang, M.S., Tanriverdi, H.: Security breaches in the US federal government. In: Workshop on the Economics of Information Security (2017)","DOI":"10.2139\/ssrn.2933577"},{"key":"5_CR38","doi-asserted-by":"publisher","unstructured":"Paulson, L.C.: Inductive analysis of the internet protocol TLS. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings. LNCS, vol.\u00a01550, pp. 13\u201323. Springer (1998). https:\/\/doi.org\/10.1007\/3-540-49135-X_2","DOI":"10.1007\/3-540-49135-X_2"},{"key":"5_CR39","doi-asserted-by":"publisher","unstructured":"Pournaghshband, V., Sarrafzadeh, M., Reiher, P.L.: Securing legacy mobile medical devices. In: Godara, B., Nikita, K.S. (eds.) Wireless Mobile Communication and Healthcare - Third International Conference, MobiHealth 2012, Paris, France, November 21-23, 2012, Revised Selected Papers. LNCS, Social Informatics and Telecommunications Engineering, vol.\u00a061, pp. 163\u2013172. Springer (2012). https:\/\/doi.org\/10.1007\/978-3-642-37893-5_19","DOI":"10.1007\/978-3-642-37893-5_19"},{"key":"5_CR40","unstructured":"Ramsdell, J.D.: CPSA and formal security goals. The MITRE Corporation (2015)"},{"key":"5_CR41","unstructured":"Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison-Wesley (2001)"},{"key":"5_CR42","doi-asserted-by":"publisher","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446 (2018). https:\/\/doi.org\/10.17487\/RFC8446","DOI":"10.17487\/RFC8446"},{"key":"5_CR43","doi-asserted-by":"publisher","unstructured":"Rescorla, E., Dierks, T.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (2008). https:\/\/doi.org\/10.17487\/RFC5246","DOI":"10.17487\/RFC5246"},{"issue":"2","key":"5_CR44","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"5_CR45","doi-asserted-by":"publisher","first-page":"106960","DOI":"10.1016\/j.comnet.2019.106960","volume":"166","author":"GE Rodr\u00edguez","year":"2020","unstructured":"Rodr\u00edguez, G.E., Torres, J.G., Flores, P., Benavides, D.E.: Cross-site scripting (XSS) attacks and mitigation: a survey. Comput. Netw. 166, 106960 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2019.106960","journal-title":"Comput. Netw."},{"issue":"6","key":"5_CR46","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/S10207-016-0319-Z","volume":"15","author":"PD Rowe","year":"2016","unstructured":"Rowe, P.D., Guttman, J.D., Liskov, M.D.: Measuring protocol strength with security goals. Int. J. Inf. Sec. 15(6), 575\u2013596 (2016). https:\/\/doi.org\/10.1007\/S10207-016-0319-Z","journal-title":"Int. J. Inf. Sec."},{"issue":"4","key":"5_CR47","doi-asserted-by":"publisher","first-page":"153","DOI":"10.2478\/POPETS-2020-0067","volume":"2020","author":"H Saleem","year":"2020","unstructured":"Saleem, H., Naveed, M.: SoK: anatomy of data breaches. Proc. Priv. Enhancing Technol. 2020(4), 153\u2013174 (2020). https:\/\/doi.org\/10.2478\/POPETS-2020-0067","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"5_CR48","first-page":"188","volume":"9","author":"J Schmandt","year":"2017","unstructured":"Schmandt, J., Sherman, A.T., Banerjee, N.: Mini-MAC: raising the bar for vehicular security with a lightweight message authentication protocol. Veh. Commun. 9, 188\u2013196 (2017)","journal-title":"Veh. Commun."},{"key":"5_CR49","doi-asserted-by":"publisher","unstructured":"Sherman, A.T., et al.: Formal methods analysis of the secure remote password protocol. In: Nigam, V., Kirigin, T.B., Talcott, C.L., Guttman, J.D., Kuznetsov, S.L., Loo, B.T., Okada, M. (eds.) Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday. LNCS, vol. 12300, pp. 103\u2013126. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-62077-6_9","DOI":"10.1007\/978-3-030-62077-6_9"},{"issue":"1","key":"5_CR50","doi-asserted-by":"publisher","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"FJ Thayer","year":"1999","unstructured":"Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: proving security protocols correct. J. Comput. Secur. 7(1), 191\u2013230 (1999). https:\/\/doi.org\/10.3233\/JCS-1999-72-304","journal-title":"J. Comput. Secur."},{"key":"5_CR51","unstructured":"UMBC Protocol Analysis Lab: PAL GitHub repository (2023). https:\/\/tinyurl.com\/3d2wnhuf"},{"key":"5_CR52","doi-asserted-by":"publisher","unstructured":"Wang, Q., Sawhney, S.: Vecure: a practical security framework to protect the CAN bus of vehicles. In: 4th International Conference on the Internet of Things, IOT 2014, Cambridge, MA, USA, October 6-8, 2014, pp. 13\u201318. IEEE (2014). https:\/\/doi.org\/10.1109\/IOT.2014.7030108","DOI":"10.1109\/IOT.2014.7030108"},{"key":"5_CR53","doi-asserted-by":"publisher","unstructured":"Weaver, N., Kreibich, C., Dam, M., Paxson, V.: Here be web proxies. In: Faloutsos, M., Kuzmanovic, A. (eds.) Passive and Active Measurement - 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings. LNCS, vol.\u00a08362, pp. 183\u2013192. Springer (2014). https:\/\/doi.org\/10.1007\/978-3-319-04918-2_18","DOI":"10.1007\/978-3-319-04918-2_18"},{"key":"5_CR54","doi-asserted-by":"publisher","unstructured":"Whited, S.: Channel Bindings for TLS 1.3. RFC 9266 (2022). https:\/\/doi.org\/10.17487\/RFC9266","DOI":"10.17487\/RFC9266"},{"key":"5_CR55","unstructured":"Zhou, Y., Evans, D.: Why aren\u2019t HTTP-only cookies more widely deployed? In: Proceedings of 4th Web, vol. 2 (2010)"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87541-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:00:32Z","timestamp":1744203632000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87541-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031875403","9783031875410"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87541-0_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssresearch24.github.io\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}