{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:40:30Z","timestamp":1725838830837},"publisher-location":"Cham","reference-count":4,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319260952"},{"type":"electronic","value":"9783319260969"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26096-9_3","type":"book-chapter","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T11:18:35Z","timestamp":1448363915000},"page":"22-29","source":"Crossref","is-referenced-by-count":1,"title":["Redesigning Secure Protocols to Compel Security Checks"],"prefix":"10.1007","author":[{"given":"Keith","family":"Irwin","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., Shmatikov, V.: The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 38\u201349. ACM, New York (2012)","key":"3_CR1","DOI":"10.1145\/2382196.2382204"},{"unstructured":"marcan and bushing. Console hacking 2008: Wii fail. In: 25th Chaos Communication Congress, 25C3. Chaos Computer Club (2008)","key":"3_CR2"},{"unstructured":"Matyas, S., Abraham, D., Johnson, D., Karne, R., Le, A., Prymak, R., Thomas, J., Wilkins, J., Yeh, P.: Data cryptography operations using control vectors in a data processing system, 17 April 1990. US Patent 4,918,728","key":"3_CR3"},{"doi-asserted-by":"crossref","unstructured":"Smid, M.E.: A key notarization system for computer networks. Number 54. US Dept. of Commerce, National Bureau of Standards: for sale by the Supt. of Docs., US Govt. Print. Off., (1979)","key":"3_CR4","DOI":"10.6028\/NBS.SP.500-54"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26096-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T13:27:30Z","timestamp":1559309250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26096-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319260952","9783319260969"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26096-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}