{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:27:17Z","timestamp":1747196837524,"version":"3.40.5"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319140537"},{"type":"electronic","value":"9783319140544"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14054-4_3","type":"book-chapter","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T03:39:19Z","timestamp":1418182759000},"page":"39-56","source":"Crossref","is-referenced-by-count":0,"title":["Analyzing Proposals for Improving Authentication on the TLS\/SSL-Protected Web"],"prefix":"10.1007","author":[{"given":"Christopher W.","family":"Brown","sequence":"first","affiliation":[]},{"given":"Michael","family":"Jenkins","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.1. RFC 5246, RFC Editor (April 2006)","DOI":"10.17487\/rfc4346"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Housley, R., Santesson, S.: Update to directorystring processing in the internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC 5280, RFC Editor (August 2006)","DOI":"10.17487\/rfc4630"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1719030.1719050","volume-title":"Proceedings of the 2009 Workshop on New Security Paradigms Workshop, NSPW 2009","author":"C. Herley","year":"2009","unstructured":"Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop, NSPW 2009, pp. 133\u2013144. ACM, New York (2009)"},{"key":"3_CR4","first-page":"399","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009","author":"J. Sunshine","year":"2009","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: an empirical study of ssl warning effectiveness. In: Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009, pp. 399\u2013416. USENIX Association, Berkeley (2009)"},{"key":"3_CR5","unstructured":"Marlinspike, M., Perrin, T.: Trust assertions for certificate keys. Internet-Draft draft-perrin-tls-tack-02, IETF Secretariat (January 2013)"},{"key":"3_CR6","first-page":"321","volume-title":"USENIX 2008 Annual Technical Conference on Annual Technical Conference, ATC 2008","author":"D. Wendlandt","year":"2008","unstructured":"Wendlandt, D., Andersen, D.G., Perrig, A.: Perspectives: improving ssh-style host authentication with multi-path probing. In: USENIX 2008 Annual Technical Conference on Annual Technical Conference, ATC 2008, pp. 321\u2013334. USENIX Association, Berkeley (2008)"},{"key":"3_CR7","unstructured":"CA\/Browser Forum. Guidelines for the issuance and management of extended validation certificates (March 2014), https:\/\/cabforum.org\/wp-content\/uploads\/EV-SSL-Certificate-Guidelines-Version-1.4.6.pdf"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Hoffman, P., Schlyter, J.: The DNS-based authentication of named entities (DANE) transport layer security (tls) protocol: TLSA. RFC 6698, RFC Editor (August 2012)","DOI":"10.17487\/rfc6698"},{"key":"3_CR9","unstructured":"National Institute of Standards and Technology (NIST), http:\/\/www.dnsops.gov\/dnssec-perform.html"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., Kasper, E.: Certificate transparency. RFC 6962, RFC Editor (June 2013)","DOI":"10.17487\/rfc6962"},{"key":"3_CR11","unstructured":"Evans, C., Palmer, C., Sleevi, R.: Public key pinning extension for http. Internet-Draft draft-ietf-websec-key-pinning-08, IETF Secretariat (July 2013)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for key management - part 1: General (revision 3). Technical Report NIST Special Publication 800-57, National Institute of Standards and Technology (March 2007)","DOI":"10.6028\/NIST.SP.800-57p1r2007"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14054-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:15:37Z","timestamp":1747181737000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14054-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319140537","9783319140544"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14054-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}