{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:38:58Z","timestamp":1725500338059},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775348"},{"type":"electronic","value":"9783540775355"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77535-5_18","type":"book-chapter","created":{"date-parts":[[2008,1,8]],"date-time":"2008-01-08T15:23:47Z","timestamp":1199805827000},"page":"245-265","source":"Crossref","is-referenced-by-count":3,"title":["On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences"],"prefix":"10.1007","author":[{"given":"Swee-Won","family":"Lo","sequence":"first","affiliation":[]},{"given":"Raphael C. -W.","family":"Phan","sequence":"additional","affiliation":[]},{"given":"Bok-Min","family":"Goi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"AICT Security - Empty your Cache. Available online at https:\/\/www.ualberta.ca\/AICT\/Security\/BrowserCache.html#private"},{"key":"18_CR2","unstructured":"Archer, T.: Are Hash Codes Unique? Available online at http:\/\/blogs.msdn.com\/tomarcher\/archive\/2006\/05\/10\/594204.aspx"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO 1993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"18_CR4","unstructured":"CIBC - Clear Your Browser\u2019s Cache. Available online at http:\/\/www.cibc.com\/ca\/legal\/clear-browsers-cache.html"},{"key":"18_CR5","volume-title":"Principles of Computer Security: Security+ TM and Beyond","author":"W.A. Conklin","year":"2005","unstructured":"Conklin, W.A., White, G.B., Cothren, C., Williams, D., Davis, R.L.: Principles of Computer Security: Security+ TM and Beyond. McGraw-Hill, New York (2005)"},{"key":"18_CR6","unstructured":"EasyChair Conference System. Available online at http:\/\/www.easychair.org\/"},{"key":"18_CR7","unstructured":"Foster, J.C.: Defense Tactics for SQL Injection Attacks. Available online at http:\/\/searchappsecurity.techtarget.com\/tip\/0,289483,sid92_gci1219912,00.html"},{"key":"18_CR8","unstructured":"Fyre, C.: One Simple Rule to Make your Web Apps more Secure (2006), Available online at http:\/\/searchappsecurity.techtarget.com\/qna\/0,289202,sid92_gci1225425,00.html"},{"key":"18_CR9","unstructured":"Google Mail. Available online at http:\/\/gmail.google.com"},{"key":"18_CR10","unstructured":"Halevi, S.: Web Submission and Review Software. Available online at http:\/\/theory.csail.mit.edu\/~shaih\/websubrev"},{"key":"18_CR11","unstructured":"IACR Conferences. Available online at http:\/\/www.iacr.org\/conferences\/"},{"key":"18_CR12","volume-title":"Web Hacking: Attacks and Defense","author":"S. McClure","year":"2003","unstructured":"McClure, S., Shah, S., Shah, S.: Web Hacking: Attacks and Defense. Addison-Wesley, Reading (2003)"},{"key":"18_CR13","unstructured":"Microsoft Corporation. Microsoft\u2019s Conference Management Toolkit. Available online at http:\/\/msrcmt.research.microsoft.com\/cmt\/"},{"key":"18_CR14","unstructured":"Password Cracking: Information from Answers.com (2006), Available online at http:\/\/www.answers.com\/topic\/password-cracking"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Peikari, C., Chuvakin, A.: Security Warrior. O\u2019Reilly (2004)","DOI":"10.1016\/S1353-4858(04)00117-5"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"R.C.-W. Phan","year":"2005","unstructured":"Phan, R.C.-W., Goi, B.-M.: Flaw in IEEE Trans on Consumer Electronics Online Submission System. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, Springer, Heidelberg (2005)"},{"key":"18_CR17","unstructured":"Phan, R.C.-W., Ling, H.-C.: On the Insecurity of the Microsoft Research Conference Management Tool (MSRCMT) System. In: CITA 2005. Proceedings of International Conference on IT in Asia, pp. 75\u201379 (2005) Also presented at the rump session of Asiacrypt 2004, Jeju Island, Korea"},{"key":"18_CR18","unstructured":"PHP Manual. Full version available online at http:\/\/www.php.net\/manual\/en\/"},{"key":"18_CR19","unstructured":"Regular Expressions (2006),Available online at http:\/\/searchappsecurity.techtarget.com\/sDefinition\/0,290660,sid92_gci517740,00.html"},{"key":"18_CR20","unstructured":"ScholarOne, Inc. Manuscript Central: About Manuscript Central. Available online at http:\/\/www.scholarone.com\/products_manuscriptcentral_aboutMC.shtml"},{"key":"18_CR21","unstructured":"Security Information Clearing Browser Cache and History. Available online at http:\/\/www.hlasset.com\/files\/Clearing_Cache_History.pdf"},{"key":"18_CR22","unstructured":"SoftConf.com - Software for Conferences. Available online at http:\/\/www.softconf.com\/index.html"},{"key":"18_CR23","unstructured":"SourceForge.net: Web Submission and Review Software. Available online at http:\/\/sourceforge.net\/projects\/websubrev"},{"key":"18_CR24","unstructured":"What is SQL Injection? (2006), Available online at http:\/\/searchappsecurity.techtarget.com\/sDefinition\/0,290660,sid92_gci1003024,00.html"},{"key":"18_CR25","unstructured":"The Ten Most Critical Web Application Security Vulnerabilities (2004) Available online at http:\/\/osdn.dl.sourceforge.net\/sourceforge\/owasp\/OWASPTopTen2004.pdf"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Ware, M.: Online Submission and Peer-Review System (2005) Available online at www.zen34802.zen.co.uk\/Learned_Publishing_offprint.pdf","DOI":"10.1087\/095315105774648771"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77535-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T17:20:42Z","timestamp":1557163242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77535-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775348","9783540775355"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77535-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}