{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T18:36:18Z","timestamp":1773254178138,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642398834","type":"print"},{"value":"9783642398841","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39884-1_28","type":"book-chapter","created":{"date-parts":[[2013,8,4]],"date-time":"2013-08-04T21:02:52Z","timestamp":1375650172000},"page":"329-337","source":"Crossref","is-referenced-by-count":25,"title":["CAge: Taming Certificate Authorities by Inferring Restricted Scopes"],"prefix":"10.1007","author":[{"given":"James","family":"Kasten","sequence":"first","affiliation":[]},{"given":"Eric","family":"Wustrow","sequence":"additional","affiliation":[]},{"given":"J. Alex","family":"Halderman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Gmail.com SSL MITM Attack by Iranian government (August 2011), \n                    \n                      http:\/\/pastebin.com\/ff7Yg663"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Alicherry, M., Keromytis, A.D.: Doublecheck: Multi-path verification against man-in-the-middle attacks. In: ISCC, pp. 557\u2013563. IEEE (2009)","DOI":"10.1109\/ISCC.2009.5202224"},{"key":"28_CR3","unstructured":"Bhat, S.: Gmail users in Iran hit by MITM Attacks. Website (August 2011), \n                    \n                      http:\/\/techie-buzz.com\/tech-news\/gmail-iran-hit-mitm.html"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard) (May 2008)","DOI":"10.17487\/rfc5280"},{"key":"28_CR5","unstructured":"EFF. The EFF SSL Observatory, \n                    \n                      https:\/\/www.eff.org\/observatory"},{"key":"28_CR6","unstructured":"Evans, C.: New Chromium security features (June 2011), Website, \n                    \n                      http:\/\/blog.chromium.org\/2011\/06\/new-chromium-security-features-june.html"},{"key":"28_CR7","first-page":"35","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012","author":"N. Heninger","year":"2012","unstructured":"Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.A.: Mining your Ps and Qs: Detection of widespread weak keys in network devices. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, p. 35. USENIX Association, Berkeley (2012)"},{"key":"28_CR8","unstructured":"IANA. Top level domains, \n                    \n                      http:\/\/data.iana.org\/TLD\/tlds-alpha-by-domain.txt"},{"key":"28_CR9","unstructured":"Loesch, C.: Certificate patrol. Website, \n                    \n                      http:\/\/patrol.psyced.org\/"},{"key":"28_CR10","unstructured":"Marlinspike, M.: SSL and the future of authenticity, BlackHat USA (August 2011)"},{"key":"28_CR11","unstructured":"Richmond, R.: Comodo fraud incident (March 2011), \n                    \n                      http:\/\/www.comodo.com\/Comodo-Fraud-Incident-2011-03-23.html"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-27576-0_20","volume-title":"Financial Cryptography and Data Security","author":"C. Soghoian","year":"2012","unstructured":"Soghoian, C., Stamm, S.: Certified lies: Detecting and defeating government interception attacks against SSL (short paper). In: Danezis, G. (ed.) FC 2011. LNCS, vol.\u00a07035, pp. 250\u2013259. Springer, Heidelberg (2012)"},{"key":"28_CR13","first-page":"321","volume-title":"USENIX 2008 Annual Technical Conference","author":"D. Wendlandt","year":"2008","unstructured":"Wendlandt, D., Andersen, D.G., Perrig, A.: Perspectives: Improving SSH-style host authentication with multi-path probing. In: USENIX 2008 Annual Technical Conference, pp. 321\u2013334. USENIX Association, Berkeley (2008)"},{"key":"28_CR14","unstructured":"Zusman, M.: Criminal charges are not pursued: Hacking PKI, DefCon\u00a017 (August 2009)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39884-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T05:49:48Z","timestamp":1557985788000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39884-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642398834","9783642398841"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39884-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}