{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:21:30Z","timestamp":1725888090778},"publisher-location":"Singapore","reference-count":7,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811050404"},{"type":"electronic","value":"9789811050411"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5041-1_11","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T07:14:39Z","timestamp":1494659679000},"page":"61-66","source":"Crossref","is-referenced-by-count":2,"title":["Encrypted Network Traffic Analysis Method via Secure Socket Layer Handshake Control"],"prefix":"10.1007","author":[{"given":"Jihoon","family":"Yoon","sequence":"first","affiliation":[]},{"given":"Kangsik","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Yoojae","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"11_CR1","unstructured":"ESG: Network Encryption and its Impact on Enterprise Security (2015)"},{"key":"11_CR2","unstructured":"Gartner: Security Leaders Must Address Threats from Rising SSL Network traffic (2013)"},{"issue":"6","key":"11_CR3","first-page":"1","volume":"2016","author":"M Hus\u00e1k","year":"2016","unstructured":"Hus\u00e1k, M., \u010cerm\u00e1k, M., Jirs\u00edk, T., \u010celeda, P.: HTTPS network traffic analysis and client identification using passive SSL\/TLS fingerprinting, EURASIP J. Inf. Secur. 2016(6), 1\u201314 (2016)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"1","key":"11_CR4","first-page":"89","volume":"2","author":"VT Goh","year":"2010","unstructured":"Goh, V.T., Zimmermann, J., Looi, M.: Detecting attacks in encrypted networks using secret-sharing schemes. Int. J. Cryptol. Res. 2(1), 89\u201399 (2010)","journal-title":"Int. J. Cryptol. Res."},{"key":"11_CR5","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"11_CR6","unstructured":"Whalen, S.: An introduction to arp spoofing, Node99 [Online Document] (2001)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Chomsiri, T.: HTTPS hacking protection. In: 21st International Conference on AINAW 2007, vol. 1. IEEE (2007)","DOI":"10.1109\/AINAW.2007.200"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5041-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T07:17:07Z","timestamp":1494659827000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5041-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050404","9789811050411"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5041-1_11","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}