{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T17:47:20Z","timestamp":1648662440024},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,1,31]],"date-time":"2015-01-31T00:00:00Z","timestamp":1422662400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1007\/s11623-015-0376-x","type":"journal-article","created":{"date-parts":[[2015,1,30]],"date-time":"2015-01-30T09:21:44Z","timestamp":1422609704000},"page":"114-116","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TLS \u2014 Dos and Don\u2019ts"],"prefix":"10.1007","volume":"39","author":[{"given":"Kai","family":"Jendrian","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,31]]},"reference":[{"key":"376_CR1","unstructured":"Bodo M\u00f6ller, Thai Duong, Krzysztof Kotowicz; This POODLE Bites: Exploting the SSL 3.0 Fallback; https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf"},{"key":"376_CR2","unstructured":"Mozilla; Attacks on SSL and TLS, https:\/\/wiki.mozilla.org\/Security\/Server_Side_TLS#Attacks_on_SSL_and_TLS"},{"key":"376_CR3","unstructured":"Ivan Risti\u0107; Bulletproof SSL and TLS"},{"key":"376_CR4","unstructured":"Ivan Risti\u0107; OpenSSL Cookbook"},{"key":"376_CR5","unstructured":"Ivan Risti\u0107; SSL\/TLS Deployment Best Practices, https:\/\/www.ssllabs.com\/downloads\/SSL_TLS_Deployment_Best_Practices.pdf"},{"key":"376_CR6","unstructured":"Diverse Autoren; Applied Crypto Hardening, https:\/\/bettercrypto.org\/static\/applied-crypto-hardening.pdf"},{"key":"376_CR7","unstructured":"Chris Palmer; Gradually sunsetting SHA-1, http:\/\/googleonlinesecurity.blogspot.de\/2014\/09\/gradually-sunsetting-sha-1.html"},{"key":"376_CR8","unstructured":"IANA TLS Cipher Suite Registry, http:\/\/www.iana.org\/assignments\/tls-parameters\/tls-parameters.xhtml#tls-parameters-4"},{"key":"376_CR9","unstructured":"BSI; Technische Richtlinie TR-02102-2, Kryptographische Verfahren: Empfehlungen und Schl\u00fcssell\u00e4ngen, Teil 2 \u2014 Verwendung von Transport Layer Security (TLS). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/TechnischeRichtlinien\/TR02102\/BSITR-02102-2_pdf.pdf?__blob=publicationFile"},{"key":"376_CR10","unstructured":"OWASP; Transport Layer Protection Cheat Sheet, https:\/\/www.owasp.org\/index.php\/Transport_Layer_Protection_Cheat_Sheet"},{"key":"376_CR11","unstructured":"OWASP; HTTP Strict Transport Security https:\/\/www.owasp.org\/index.php\/HTTP_Strict_Transport_Security"},{"key":"376_CR12","unstructured":"OWASP; Certificate and Public Key Pinning, https:\/\/www.owasp.org\/index.php\/Certificate_and_Public_Key_Pinning"},{"key":"376_CR13","unstructured":"Mozilla Wiki \u2014 Security TLS, https:\/\/wiki.mozilla.org\/Security\/Server_Side_TLS"},{"key":"376_CR14","unstructured":"Certificate Transperency, \n                    http:\/\/www.certificate-transparency.org\/"},{"key":"376_CR15","unstructured":"Let\u2019s encrypt; \n                    https:\/\/letsencrypt.org\/"},{"key":"376_CR16","unstructured":"Apache mod_ssl Dokumentation; http:\/\/httpd.apache.org\/docs\/2.4\/mod\/mod_ssl.html"},{"key":"376_CR17","unstructured":"ENISA; Algorithms, key size and parameters report 2014, http:\/\/www.enisa.europa.eu\/activities\/identity-and-trust\/library\/deliverables\/algorithms-key-size-and-parameters-report-2014"},{"issue":"11","key":"376_CR18","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/s11623-013-0302-z","volume":"37","author":"Dirk Fox","year":"2013","unstructured":"Fox, Dirk: Perfect Forward Secrecy (PFS). DuD 11\/2013, S. 729","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"376_CR19","unstructured":"Achim Hoffmann, Torsten Gigler; O-Saft \u2014 Richtig verschl\u00fcsseln mit SSL\/TLS; OWASP Day Germany 2014, https:\/\/www.owasp.org\/images\/1\/19\/Richtig_verschluesseln_mit_SSL%2BTLS_-_Achim_Hoffmann%2BTorsten_Gigler.pdf"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-015-0376-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-015-0376-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-015-0376-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-015-0376-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:45Z","timestamp":1559413365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-015-0376-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,31]]},"references-count":19,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["376"],"URL":"https:\/\/doi.org\/10.1007\/s11623-015-0376-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,31]]}}}