{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:30:41Z","timestamp":1725456641577},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642354038"},{"type":"electronic","value":"9783642354045"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35404-5_12","type":"book-chapter","created":{"date-parts":[[2012,12,6]],"date-time":"2012-12-06T19:55:14Z","timestamp":1354823714000},"page":"142-157","source":"Crossref","is-referenced-by-count":0,"title":["Firm Grip Handshakes: A Tool for Bidirectional Vouching"],"prefix":"10.1007","author":[{"given":"Omer","family":"Berkman","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Benny","family":"Pinkas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Arthur, C.: Rogue web certificate could have been used to attack iran dissidents (August 2011), \n                    \n                      http:\/\/www.guardian.co.uk\/technology\/2011\/aug\/30\/faked-web-certificate-iran-dissidents"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Dacosta, I., Ahamad, M., Traynor, P.: Trust no one else: Detecting MITM attacks against SSL\/TLS without third-parties. In: Foresti, et al. (eds.) [9], pp. 199\u2013216","DOI":"10.1007\/978-3-642-33167-1_12"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS protocol version 1.0. RFC-2246 (1999)","DOI":"10.17487\/rfc2246"},{"key":"12_CR4","unstructured":"Dietz, M., Czeskis, A., Balfanz, D., Wallach, D.S.: Origin-bound certificates: a fresh approach to strong client authentication for the web. In: USENIX Security, Berkeley, CA, USA (2012)"},{"key":"12_CR5","unstructured":"Eckersley, P., Burns, J.: An observatory for the SSLiverse (2010), \n                    \n                      https:\/\/www.eff.org\/files\/DefconSSLiverse.pdf"},{"key":"12_CR6","unstructured":"EFF: The Sovereign Keys project, \n                    \n                      https:\/\/www.eff.org\/sovereign-keys"},{"key":"12_CR7","unstructured":"EFF: The EFF SSL observastory (2010), \n                    \n                      https:\/\/www.eff.org\/observatory"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Eronen, P., Tschofenig, H.: Pre-shared key ciphersuites for transport layer security (TLS). RFC-4279 (2005)","DOI":"10.17487\/rfc4279"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security \u2013 ESORICS 2012","year":"2012","unstructured":"Foresti, S., Yung, M., Martinelli, F. (eds.): ESORICS 2012. LNCS, vol.\u00a07459. Springer, Heidelberg (2012)"},{"key":"12_CR10","unstructured":"Google: New chromium security features (June 2011), \n                    \n                      http:\/\/blog.chromium.org\/2011\/06\/new-chromium-security-features-june.html"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Holz, R., Riedmaier, T., Kammenhuber, N., Carle, G.: X.509 forensics: Detecting and localising the SSL\/TLS men-in-the-middle. In: Foresti, et al. (eds.) [9], pp. 217\u2013234","DOI":"10.1007\/978-3-642-33167-1_13"},{"key":"12_CR12","unstructured":"Janson, P., Tsudik, G., Yung, M.: Scalability and flexibility in authentication services: The kryptoknight approach. In: Annual Joint Conference of the IEEE Computer and Communications Societies (1997)"},{"key":"12_CR13","unstructured":"Laurie, B., Langley, A.: Certificate authority transparency and auditability (2011), \n                    \n                      http:\/\/www.links.org\/files\/CertificateAuthorityTransparencyandAuditability.pdf"},{"key":"12_CR14","unstructured":"Marlinspike, M., Perrin, T.: Trust assertions for certificate keys. draft-perrin-tls-tack-00.txt (2012)"},{"key":"12_CR15","unstructured":"Marlinspike, M.: Convergence, \n                    \n                      http:\/\/convergence.io"},{"key":"12_CR16","unstructured":"Osterweil, E., Kaliski, B., Larson, M., McPherson, D.: Reducing the X.509 attack surface with DNSSEC\u2019s DANE. In: SATIN: Securing and Trusting Internet Names (March 2012)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Taylor, D., Wu, T., Mavrogiannopoulos, N., Perrin, T.: Using the secure remote password (SRP) protocol for TLS authentication. RFC-5054 (2007)","DOI":"10.17487\/rfc5054"},{"key":"12_CR18","unstructured":"Wendlandt, D., Andersen, D.G., Perrig, A.: Perspectives:  improving SSH-style host authentication with multi-path probing. In: Isaacs, R., Zhou, Y. (eds.) USENIX Annual Technical Conference, pp. 321\u2013334. USENIX Association (2008)"},{"key":"12_CR19","unstructured":"Wikipedia: DigiNotar \u2014 Wikipedia, the free encyclopedia (2012), \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/DigiNotar"},{"key":"12_CR20","unstructured":"Zetter, K.: Hack obtains 9 bogus certificates for prominent websites; traced to Iran (2011), \n                    \n                      http:\/\/www.wired.com\/threatlevel\/2011\/03\/comodo-compromise\/"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35404-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:29:09Z","timestamp":1558301349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35404-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642354038","9783642354045"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35404-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}