{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:55:56Z","timestamp":1725562556986},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_2","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T05:14:43Z","timestamp":1281503683000},"page":"21-31","source":"Crossref","is-referenced-by-count":0,"title":["Secure Applications without Secure Infrastructures"],"prefix":"10.1007","author":[{"given":"Dieter","family":"Gollmann","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: DNS security introduction and requirements. RFC 4033 (March 2005)","DOI":"10.17487\/rfc4033"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Protocol modifications for the DNS security extensions. RFC 4035 (March 2005)","DOI":"10.17487\/rfc4035"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: Resource records for the DNS security extensions. RFC 4034 (March 2005)","DOI":"10.17487\/rfc4034"},{"key":"2_CR4","unstructured":"Burns, J.: Cross site reference forgery. Technical report, Information Security Partners, LLC, Version 1.1 (2005)"},{"key":"2_CR5","unstructured":"CERT\u00a0Coordination Center. Malicious HTML tags embedded in client web requests (2000), http:\/\/www.cert.org\/advisories\/CA-2000-02.html"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Dean, D., Felten, E.W., Wallach, D.S.: Java security: from HotJava to Netscape and beyond. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 190\u2013200 (1996)","DOI":"10.1109\/SECPRI.1996.502681"},{"key":"2_CR7","unstructured":"Dierks, T., Rescorla, E.: The TLS protocol \u2013 version 1.2, RFC 5246 (August 2008)"},{"key":"2_CR8","volume-title":"Inside Java 2 Platform Security","author":"L. Gong","year":"2003","unstructured":"Gong, L., Dageforde, M., Ellison, G.W.: Inside Java 2 Platform Security, 2nd edn. Addison-Wesley, Reading (2003)","edition":"2"},{"key":"2_CR9","volume-title":"Writing Secure Code","author":"M. Howard","year":"2002","unstructured":"Howard, M., LeBlanc, D.: Writing Secure Code, 2nd edn. Microsoft Press, Redmond (2002)","edition":"2"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Jackson, C., Barth, A., Bortz, A., Shao, W., Boneh, D.: Protecting browsers from DNS rebinding attacks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 421\u2013431 (2007)","DOI":"10.1145\/1315245.1315298"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Kent, S., Seo, K.: Security architecture for the Internet protocol, RFC 4301 (December 2005)","DOI":"10.17487\/rfc4301"},{"key":"2_CR12","unstructured":"Marsh, R., Dispensa, S.: Renegotiating TLS. Technical report, PhoneFactor Inc., Malvern (November 2009)"},{"key":"2_CR13","unstructured":"One, A.: Smashing the stack for fun and profit. Phrack Magazine\u00a049 (1996)"},{"issue":"3","key":"2_CR14","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MC.2008.98","volume":"41","author":"R. Oppliger","year":"2008","unstructured":"Oppliger, R., Hauser, R., Basin, D.A.: SSL\/TLS session-aware user authentication. IEEE Computer\u00a041(3), 59\u201365 (2008)","journal-title":"IEEE Computer"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Ray, M., Dispensa, S., Oskov, N.: Transport layer security (TLS) renegotiation indication extension, RFC 5746 (February 2010)","DOI":"10.17487\/rfc5746"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:56:34Z","timestamp":1606168594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}