{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T23:40:09Z","timestamp":1744501209419,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341281"},{"type":"electronic","value":"9783642341298"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34129-8_34","type":"book-chapter","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T15:15:22Z","timestamp":1350486922000},"page":"365-372","source":"Crossref","is-referenced-by-count":2,"title":["Cookie-Proxy: A Scheme to Prevent SSLStrip Attack"],"prefix":"10.1007","author":[{"given":"Sendong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Sicheng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chunguang","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"34_CR1","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MSP.2009.12","volume":"7","author":"F. Callegati","year":"2009","unstructured":"Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-middle attack to the https protocol. IEEE Security Privacy\u00a07(1), 78\u201381 (2009)","journal-title":"IEEE Security Privacy"},{"key":"34_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-14215-4_12","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"N. Nikiforakis","year":"2010","unstructured":"Nikiforakis, N., Younan, Y., Joosen, W.: HProxy: Client-Side Detection of SSL Stripping Attacks. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol.\u00a06201, pp. 200\u2013218. Springer, Heidelberg (2010)"},{"key":"34_CR3","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1145\/2076732.2076773","volume-title":"Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011","author":"D. Shin","year":"2011","unstructured":"Shin, D., Lopes, R.: An empirical study of visual security cues to prevent the sslstripping attack. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, pp. 287\u2013296. ACM, New York (2011)"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1145\/1755688.1755714","volume-title":"Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010","author":"A.P.H. Fung","year":"2010","unstructured":"Fung, A.P.H., Cheung, K.W.: Sslock: sustaining the trust on entities brought by ssl. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, pp. 204\u2013213. ACM, New York (2010)"},{"issue":"6","key":"34_CR5","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1016\/j.comnet.2012.01.013","volume":"56","author":"A. Liu","year":"2012","unstructured":"Liu, A., Kovacs, J., Gouda, M.: A secure cookie scheme. Computer Networks\u00a056(6), 1723\u20131730 (2012)","journal-title":"Computer Networks"},{"key":"34_CR6","first-page":"19","volume-title":"Proceedings of the 10th Conference on USENIX Security Symposium, SSYM 2001","author":"K. Fu","year":"2001","unstructured":"Fu, K., Sit, E., Smith, K., Feamster, N.: Dos and donts of client authentication on the web. In: Proceedings of the 10th Conference on USENIX Security Symposium, SSYM 2001, vol.\u00a010, pp. 19\u201335. USENIX Association, Berkeley (2001)"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Liu, A., Kovacs, J., Huang, C.T., Gouda, M.: A secure cookie protocol. In: Proceeding of 14th International Conference on Computer Communications and Networks, ICCCN 2005, pp. 333\u2013338 (October 2005)","DOI":"10.1109\/ICCCN.2005.1523880"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Pujolle, G., Serhrouchni, A., Ayadi, I.: Secure session management with cookies. In: Processing of 7th International Conference on Information, Communications and Signal, ICICS 2009, pp. 1\u20136 (December 2009)","DOI":"10.1109\/ICICS.2009.5397550"},{"key":"34_CR9","unstructured":"Sommerlad, P.: Reverse proxy patterns. In: European Conference on Pattern Languages of Programming, EuroPLoP 2003 (2003)"},{"key":"34_CR10","unstructured":"Barth, A.: HTTP State Management Mechanism, IETF Internet-Draft (2010), https:\/\/datatracker.ietf.org\/doc\/draft-ietf-httpstate-cookie\/"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Wang, D., Ma, C., Weng, C., Jia, C.: Cryptanalysis and Improvement of a Remote User Authentication Scheme for Resource-Limited Environment. Journal of Electronics & Information Technology (in press, 2012)","DOI":"10.3724\/SP.J.1146.2012.00376"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Syverson, P., Van Oorschot, P.: A unified cryptographic protocol logic. Technical report, DTIC Document (1996)","DOI":"10.21236\/ADA464967"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34129-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T23:14:01Z","timestamp":1744499641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34129-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341281","9783642341298"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34129-8_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}