{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:09:44Z","timestamp":1730214584999,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dexa.2002.1045871","type":"proceedings-article","created":{"date-parts":[[2004,4,23]],"date-time":"2004-04-23T14:38:15Z","timestamp":1082731095000},"page":"22-28","source":"Crossref","is-referenced-by-count":0,"title":["Architectural defects of the secure shell"],"prefix":"10.1109","author":[{"given":"T.","family":"Saito","sequence":"first","affiliation":[]},{"given":"T.","family":"Kito","sequence":"additional","affiliation":[]},{"given":"K.","family":"Umesawa","sequence":"additional","affiliation":[]},{"given":"F.","family":"Mizoguchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"147","article-title":"Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR","author":"lowe","year":"1996","journal-title":"Tools and Algorithms for Construction and Analysis of Systems"},{"key":"ref11","first-page":"2040","article-title":"On Authentication Protocols Using Public-Key Cryptography","volume":"42","author":"saito","year":"2001","journal-title":"IPSJ (Information Processing Society of Japan) Journal"},{"year":"0","author":"freier","article-title":"The SSL Protocol Version 3.0","key":"ref12"},{"year":"0","key":"ref13"},{"key":"ref4","article-title":"SSH Transport Layer Protocol draft-ietf-secsh-transport-11. txt","author":"ylonen","year":"2001","journal-title":"Network Working Group Internet Draft"},{"key":"ref3","article-title":"SSH Protocol Architecture draft-ietf-secsh-architecture-11. txt","author":"ylonen","year":"2001","journal-title":"Network Working Group Internet Draft"},{"key":"ref6","article-title":"SSH Authentication Protocol draft-ietf-secsh-userauth-13. txt","author":"ylonen","year":"2001","journal-title":"Network Working Group Internet Draft"},{"key":"ref5","article-title":"SSH Connection Protocol draft-ietf-secsh-connect-14. txt","author":"ylonen","year":"2001","journal-title":"Network Working Group Internet Draft"},{"year":"0","key":"ref8"},{"key":"ref7","article-title":"Diffie-Hellman Group Exchange for the SSH Transport Layer Protocol draft-ietf-secsh-dh-group-exchange-00. txt","author":"friedl","year":"2001","journal-title":"Network Working Group Internet Draft"},{"key":"ref2","article-title":"The SSH (Secure Shell) Remote Login Protocol, Internet Draft","author":"ylonen","year":"1995","journal-title":"Network Working Group"},{"year":"2001","author":"barrett","article-title":"SSH, The Secure Shell","key":"ref1"},{"year":"0","key":"ref9"}],"event":{"acronym":"DEXA-02","name":"13th International Workshop on Database and Expert Systems Applications","location":"Aix-en-Provence, France"},"container-title":["Proceedings. 13th International Workshop on Database and Expert Systems Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8104\/22410\/01045871.pdf?arnumber=1045871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T18:04:57Z","timestamp":1489428297000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1045871\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/dexa.2002.1045871","relation":{},"subject":[]}}