{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:59:39Z","timestamp":1760043579111},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319641997"},{"type":"electronic","value":"9783319642000"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64200-0_4","type":"book-chapter","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T12:58:41Z","timestamp":1501073921000},"page":"56-66","source":"Crossref","is-referenced-by-count":4,"title":["Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper)"],"prefix":"10.1007","author":[{"given":"Bingqing","family":"Xia","sequence":"first","affiliation":[]},{"given":"Dongyao","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,27]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3-draft-ietf-tls-tls13-20, April 2017. https:\/\/tools.ietf.org\/html\/draft-ietf-tls-tls13-20","DOI":"10.17487\/RFC8446"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., Kasper, E. Certificate Transparency, June 2013. http:\/\/tools.ietf.org\/pdf\/rfc6962.pdf , IETF RFC 6962","DOI":"10.17487\/rfc6962"},{"key":"4_CR3","unstructured":"Laurie, B., Kasper, E.: Revocation Transparency (2012). http:\/\/sump2.links.org\/RevocationTransparency.pdf"},{"key":"4_CR4","unstructured":"Matsumoto, S., Reischuk, R.: IKP: Turning a PKI Around with Blockchains. Cryptology ePrint Archive: Report 2016\/1018"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-44810-1_22","volume-title":"Security Protocols","author":"T Aura","year":"2001","unstructured":"Aura, T., Nikander, P., Leiwo, J.: DOS-resistant authentication with client puzzles. In: Christianson, B., Malcolm, J.A., Crispo, B., Roe, M. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 170\u2013177. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44810-1_22"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Luu, L., Chu, D., Olickel, H., Saxena, P., Hober, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254\u2013269, October 2016","DOI":"10.1145\/2976749.2978309"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Lavaud, A., Fournet, C., Pironti, A., Strub, P.: Triple handshakes and cookie cutters: breaking and fixing authentication over TLS. In: IEEE Symposium on Security and Privacy (SP), pp. 98\u2013113 (2014)","DOI":"10.1109\/SP.2014.14"},{"key":"4_CR8","unstructured":"Nakamoto, S.: Bitcoin: A pee-to-peer electronic cash system (2008)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-662-53357-4_6","volume-title":"Financial Cryptography and Data Security","author":"K Delmolino","year":"2016","unstructured":"Delmolino, K., Arnett, M., Kosba, A., Miller, A., Shi, E.: Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 79\u201394. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-53357-4_6"},{"key":"4_CR10","unstructured":"Ethereum Foundation. Ethereum\u2019s white paper (2014). https:\/\/github.com\/ethereum\/wiki\/White-Paper"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-662-53357-4_7","volume-title":"Financial Cryptography and Data Security","author":"J Bonneau","year":"2016","unstructured":"Bonneau, J.: EthIKS: using ethereum to audit a CONIKS key transparency log. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 95\u2013105. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-53357-4_7"},{"key":"4_CR12","volume-title":"Evolutionary Game Theory","author":"J Weibull","year":"1995","unstructured":"Weibull, J.: Evolutionary Game Theory. MIT Press, Cambridge (1995)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64200-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T16:37:47Z","timestamp":1569947867000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64200-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319641997","9783319642000"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64200-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}