{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:52:48Z","timestamp":1759092768884,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1109\/aiiot54504.2022.9817199","type":"proceedings-article","created":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T19:41:02Z","timestamp":1657741262000},"page":"494-500","source":"Crossref","is-referenced-by-count":0,"title":["Ensuring Web Integrity through Content Delivery Networks"],"prefix":"10.1109","author":[{"given":"Zhao Xiang","family":"Lim","sequence":"first","affiliation":[{"name":"Infocomm Technology Cluster Singapore Institute of Technology,Singapore"}]},{"given":"Xiu Qi","family":"Ho","sequence":"additional","affiliation":[{"name":"Infocomm Technology Cluster Singapore Institute of Technology,Singapore"}]},{"given":"Daniel Zhonghao","family":"Tan","sequence":"additional","affiliation":[{"name":"Infocomm Technology Cluster Singapore Institute of Technology,Singapore"}]},{"given":"Weihan","family":"Goh","sequence":"additional","affiliation":[{"name":"Infocomm Technology Cluster Singapore Institute of Technology,Singapore"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22633-5_13"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8484"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICICT50521.2020.00085"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355575"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.139"},{"journal-title":"ICANN Research","article-title":"TLD DNSSEC Report","year":"2022","key":"ref15"},{"journal-title":"Hypertext Transfer Protocol (HTTP\/1 1) Message Syntax and Routing","year":"2014","key":"ref16"},{"journal-title":"MDN Web Docs","article-title":"webRequest.filterResponseData()","year":"0","key":"ref17"},{"journal-title":"bugs chromium org","article-title":"Issue 487422: WebRequest API: allow extensions to read response body","year":"0","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380092"},{"journal-title":"CDN Content Distribution Network","year":"2004","author":"peng","key":"ref4"},{"journal-title":"CloudFlare","article-title":"How website performance affects conversion rates","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3380613"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494855"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23374"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.12"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"102171","DOI":"10.1016\/j.ijinfomgt.2020.102171","article-title":"Impact of digital surge during Covid-19 pandemic: A viewpoint on research and practice","volume":"55","author":"de\u2019","year":"2020","journal-title":"International Journal of Information Management"},{"key":"ref1","article-title":"The Risks of SSL Inspection","author":"dormann","year":"2015","journal-title":"SEI Blog Carnegie Mellon University"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.32"},{"key":"ref20","article-title":"Subresource Integrity","author":"akhawe","year":"2016","journal-title":"W3C"},{"journal-title":"CloudFlare","article-title":"Cloudflare Resolver for Firefox","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3427563"},{"key":"ref24","article-title":"Code Verify: An open source browser extension for verifying code authenticity on the web","author":"hansen","year":"2022","journal-title":"Engineering at Meta"},{"journal-title":"Github","article-title":"gchq\/CyberChef: The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis","year":"0","key":"ref23"}],"event":{"name":"2022 IEEE World AI IoT Congress (AIIoT)","start":{"date-parts":[[2022,6,6]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2022,6,9]]}},"container-title":["2022 IEEE World AI IoT Congress (AIIoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9817098\/9817144\/09817199.pdf?arnumber=9817199","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:39:54Z","timestamp":1659659994000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9817199\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/aiiot54504.2022.9817199","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]}}}