{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T02:40:10Z","timestamp":1744252810816,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334689"},{"type":"electronic","value":"9783642334696"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33469-6_30","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T11:35:50Z","timestamp":1349523350000},"page":"214-221","source":"Crossref","is-referenced-by-count":3,"title":["A New Scheme with Secure Cookie against SSLStrip Attack"],"prefix":"10.1007","author":[{"given":"Sendong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Wu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenzhen","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-14215-4_12","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"N. Nikiforakis","year":"2010","unstructured":"Nikiforakis, N., Younan, Y., Joosen, W.: HProxy: Client-Side Detection of SSL Stripping Attacks. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol.\u00a06201, pp. 200\u2013218. Springer, Heidelberg (2010)"},{"key":"30_CR2","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1145\/2076732.2076773","volume-title":"Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011","author":"D. Shin","year":"2011","unstructured":"Shin, D., Lopes, R.: An empirical study of visual security cues to prevent the sslstripping attack. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 287\u2013296. ACM, New York (2011)"},{"issue":"1","key":"30_CR3","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MSP.2009.12","volume":"7","author":"F. Callegati","year":"2009","unstructured":"Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-middle attack to the https protocol. IEEE Security Privacy\u00a07(1), 78\u201381 (2009)","journal-title":"IEEE Security Privacy"},{"key":"30_CR4","first-page":"19","volume-title":"Proceedings of the 10th Conference on USENIX Security Symposium, SSYM 2001","author":"K. Fu","year":"2001","unstructured":"Fu, K., Sit, E., Smith, K., Feamster, N.: Dos and don\u2019ts of client authentication on the web. In: Proceedings of the 10th Conference on USENIX Security Symposium, SSYM 2001, vol.\u00a010, pp. 19\u201335. USENIX Association, Berkeley (2001)"},{"key":"30_CR5","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 1\u201315. Springer, Heidelberg (1996)"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Liu, A., Kovacs, J., Huang, C.T., Gouda, M.: A secure cookie protocol. In: Proceeding of 14th International Conference on Computer Communications and Networks, ICCCN 2005, pp. 333\u2013338 (October 2005)","DOI":"10.1109\/ICCCN.2005.1523880"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Pujolle, G., Serhrouchni, A., Ayadi, I.: Secure session management with cookies. In: Processing of 7th International Conference on Information, Communications and Signal, ICICS 2009, pp. 1\u20136 (December 2009)","DOI":"10.1109\/ICICS.2009.5397550"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33469-6_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T02:16:10Z","timestamp":1744251370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33469-6_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334689","9783642334696"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33469-6_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}