{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:10:47Z","timestamp":1725516647118},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540705413"},{"type":"electronic","value":"9783540705420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70542-0_3","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"44-63","source":"Crossref","is-referenced-by-count":1,"title":["VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges"],"prefix":"10.1007","author":[{"given":"Brett","family":"Stone-Gross","sequence":"first","affiliation":[]},{"given":"David","family":"Sigal","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Cohn","sequence":"additional","affiliation":[]},{"given":"John","family":"Morse","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Almeroth","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Bahl, P., Balachandran, A., Venkatachary, S.: Secure Wireless Internet Access in Public Places. In: Proc. of the International Communications Conference (ICC), Helsinki, Finland (June 2001)","DOI":"10.1109\/ICC.2001.937274"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Bruschi, D., Ornaghi, A., Rosti, E.: S-ARP: A Secure Address Resolution Protocol. In: Proc. of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV (December 2003)","DOI":"10.1109\/CSAC.2003.1254311"},{"key":"3_CR3","unstructured":"Burkholder, P.: SSL Man-in-the-Middle Attacks. The SANS Institute (February 2002)"},{"issue":"3","key":"3_CR4","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V. Cahill","year":"2003","unstructured":"Cahill, V., Shand, B., Gray, E.: Using Trust for Secure Collaboration in Uncertain Environments. Pervasive Computing\u00a02(3), 52\u201361 (2003)","journal-title":"Pervasive Computing"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Chomsiri, T.: HTTPS Hacking Protection. In: Proc. of Advanced Information Networking and Applications Workshops (AINAW), Mahasarakham, Thailand (May 2007)","DOI":"10.1109\/AINAW.2007.200"},{"key":"3_CR6","unstructured":"Demerjian, J., Serhrouchni, A., Achemlal, M.: Certificate-based Access Control and Authentication for DHCP. In: Proc. of the International Conference on E-Business and Telecommunication Networks (ICETE), Setubal, Portugal (August 2004)"},{"key":"3_CR7","unstructured":"DSniff, http:\/\/monkey.org\/~dugsong\/dsniff\/"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Eastlake, D.: Domain Name System Security Extensions. RFC 2535 (March 1999)","DOI":"10.17487\/rfc2535"},{"key":"3_CR9","unstructured":"Ettercap, http:\/\/ettercap.sourceforge.net\/"},{"issue":"1","key":"3_CR10","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/S1389-1286(02)00326-2","volume":"41","author":"M. Gouda","year":"2003","unstructured":"Gouda, M., Huang, C.: A Secure Address Resolution Protocol. The Computer Networks Journal\u00a041(1), 57\u201371 (2003)","journal-title":"The Computer Networks Journal"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Komori, T., Saito, T.: The Secure DHCP System with User Authentication. In: Proc. of Local Computer Networks (LCN), Washington DC (November 2002)","DOI":"10.1109\/LCN.2002.1181774"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Lootah, W., Enck, W., McDaniel, P.: TARP: ticket-based address resolution protocol. In: Proc. of the Annual Computer Security Applications Conference (ACSAC), Tucson, AZ (December 2005)","DOI":"10.1109\/CSAC.2005.55"},{"key":"3_CR13","unstructured":"Meyer, D.: University of Oregon Route Views Project, http:\/\/www.antc.uoregon.edu\/route-views\/"},{"key":"3_CR14","unstructured":"Morley Mao, Z., Rexford, J., Wang, J., Katz, R.: Towards an Accurate AS-Level Traceroute Tool. In: Proc. of the Special Interest Group on Data Communication (SIGCOMM), Karlsruhe, Germany (August 2003)"},{"key":"3_CR15","unstructured":"PlanetLab: An Open Platform for Developing, Deploying, and Accessing Planetary-Scale Services, http:\/\/www.planet-lab.org\/"},{"key":"3_CR16","unstructured":"Poole, L., Pai, V.S.: ConfiDNS: Leveraging scale and history to improve DNS security. In: Proc. of Third Workshop on Real, Large Distributed Systems (WORLDS), Seattle, WA (November 2006)"},{"key":"3_CR17","unstructured":"Routing Assets Database (RADb), http:\/\/www.radb.net\/"},{"key":"3_CR18","unstructured":"Routing Information Service (RIS), http:\/\/www.ripe.net\/ris\/ris-index.html"},{"key":"3_CR19","unstructured":"Spring, N., Wetherall, D., Anderson, T.: Scriptroute: A Public Internet Measurement Facility. In: Proc. of the Internet Technologies and Systems (ITS), Seattle, WA (March 2003)"},{"key":"3_CR20","unstructured":"Wagner, R.: Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks. The SANS Institute (August 2001)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Xia, H., Brustoloni, J.C.: Hardening Web Browsers Against Man-in-the-Middle and Eavesdropping Attacks. In: Proc. of the 14th International World Wide Web (WWW) Conference, Chiba, Japan (May 2005)","DOI":"10.1145\/1060745.1060817"},{"issue":"4","key":"3_CR22","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1145\/571637.571638","volume":"20","author":"L. Zhou","year":"2002","unstructured":"Zhou, L., Schneider, F., van Renesse, R.: COCA: A Secure Distributed On-line Certification Authority. ACM Transactions on Computer Systems\u00a020(4), 329\u2013368 (2002)","journal-title":"ACM Transactions on Computer Systems"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70542-0_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:07:32Z","timestamp":1605762452000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70542-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540705413","9783540705420"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70542-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}