{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:52:04Z","timestamp":1759092724551},"reference-count":27,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[1996,1,1]],"date-time":"1996-01-01T00:00:00Z","timestamp":820454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1996,1]]},"DOI":"10.1016\/s0167-4048(97)89699-x","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T19:05:05Z","timestamp":1027623905000},"page":"661-671","source":"Crossref","is-referenced-by-count":4,"title":["Plugging the holes in host-based authentication"],"prefix":"10.1016","volume":"15","author":[{"given":"Jim","family":"Reid","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(97)89699-X_BIB1","series-title":"Proc. IEEE Symposium on Security and Privacy","article-title":"Java Security: From HotWava to Netscape and Beyond","author":"Dean","year":"1996"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB2","article-title":"Security Flaws in the HoWava Web Browser","author":"Dean","year":"1996"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB3","series-title":"A Unix Network Protocol Security Study: Network Information Service","author":"Hess","year":"1991"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB4","series-title":"Proc. Computers and Security","article-title":"Open Systems Security: Traps and Pitfalls","author":"Reid","year":"1995"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB5","series-title":"Proc. Fifth USENIX Unix Security Symposium","article-title":"DNS and BIND Security Issues","author":"Vixie","year":"1996"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB6","series-title":"Proc. Fifth USENIX Unix Security Symposium","article-title":"Using the Domain Name System lor System Break-ins","author":"Bellovin","year":"1995"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB7","article-title":"Addressing Weaknesses in the Domain Name System Protocol","author":"Schuba","year":"1993"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB8","series-title":"Domain Name System Security Extensions","author":"Eastlake","year":"1996"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB9","article-title":"A Weakness in the 4.2 BSD UN$\u0303TCP\/IP Software","author":"Morris","year":"1985"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB10","series-title":"Technical details of the attack described by Markoff in NYT","author":"Shimomura","year":"1995"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB11","year":"1995"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB12","series-title":"Takedown!","author":"Shimomura","year":"1995"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB13","article-title":"Generic Security Service Application Program Interface","author":"Linn","year":"1993","journal-title":"Internet RFC 1508"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB14","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1007\/BF00123958","article-title":"Computation of Discrete Logarithms in Prime Fields","volume":"1","author":"LaMacchia","year":"1991","journal-title":"Designs, Codes & Cryptography"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB15","doi-asserted-by":"crossref","DOI":"10.1145\/381906.381946","article-title":"Limitations of the Kerberos Authentication System","author":"Bellovin","year":"1990","journal-title":"Computer Communications Review"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB16","year":"1996"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB17","series-title":"Proc. Sixth USENIX Unix Security Symposium","first-page":"187","article-title":"Murphy's Law and Computer Security","author":"Venema","year":"1996"},{"issue":"11","key":"10.1016\/S0167-4048(97)89699-X_BIB18","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/188280.188291","article-title":"Vhy Cryptosystems Fail","volume":"37","author":"Anderson","year":"1994","journal-title":"Comm. ACM"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB19","article-title":"Security Architecture for the Internet Protocol","author":"Atkinson","year":"1995","journal-title":"Internet RFC 1825"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB20","article-title":"IPAuthentication Header","author":"Atkinson","year":"1995","journal-title":"Internet RFC 1826"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB21","article-title":"IP Encapsulating Payload","author":"Atkinson","year":"1995","journal-title":"Internet RFC 1827"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB22","series-title":"Proc. Sixth USENIX Unix Security Symposium","first-page":"205","article-title":"Problem Areas for the IP Security Protocols","author":"Bellovin","year":"1996"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB23","series-title":"Proc. Sixth USENIX Unix Security Symposium","first-page":"37","article-title":"SSH \u2014 Secure Login Connections over the Internet","author":"Ylonen","year":"1996"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB24","article-title":"Privacy Enhanced Mail","author":"Linn","year":"1993","journal-title":"Internet RFC 1421"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB25","series-title":"Proc. Sixth UNENIX Unix Security Symposium","first-page":"161","article-title":"Public Key Distribution with Secure DNS","author":"Galvin","year":"1996"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB26","series-title":"Proc. ASIACRYPT 94","first-page":"263","article-title":"The Magic Words are Squeamish Ossifrage","author":"Atkins","year":"1995"},{"key":"10.1016\/S0167-4048(97)89699-X_BIB27","series-title":"Applied Cryptography","author":"Schneier","year":"1996"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740489789699X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740489789699X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T02:26:02Z","timestamp":1555986362000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016740489789699X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,1]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1996,1]]}},"alternative-id":["S016740489789699X"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(97)89699-x","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1996,1]]}}}