{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:06:23Z","timestamp":1725656783763},"reference-count":6,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/emeit.2011.6023898","type":"proceedings-article","created":{"date-parts":[[2011,10,12]],"date-time":"2011-10-12T20:24:52Z","timestamp":1318451092000},"page":"4010-4013","source":"Crossref","is-referenced-by-count":2,"title":["An improvement SSL protocol application research"],"prefix":"10.1109","author":[{"given":"Wang","family":"Zhenzhong","sequence":"first","affiliation":[]},{"given":"Wang","family":"Yao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Technology and Application Experiment of Information Security","year":"2004","author":"cai","key":"3"},{"key":"2","article-title":"Analysis and research of access control mechanism based on SSL protocol","author":"ren","year":"2009","journal-title":"Microcomputer Information"},{"key":"1","article-title":"Study for client authentication policy based on SSL","author":"qin","year":"2008","journal-title":"Computer Engineering and Design"},{"key":"6","article-title":"Improving kerberos protocol with diffie-hellman algorithm","author":"tang","year":"2007","journal-title":"Computer Engineering and Design"},{"journal-title":"The TLS Protocol Versionl 0 [EB\/OL]","year":"1999","key":"5"},{"key":"4","article-title":"PKI technology with SSL and maintenance for web security","author":"li","year":"2001","journal-title":"Journal of Shaanxi Normal University(Natural Science Edition)"}],"event":{"name":"Mechanical Engineering and Information Technology (EMEIT)","start":{"date-parts":[[2011,8,12]]},"location":"Harbin, Heilongjiang, China","end":{"date-parts":[[2011,8,14]]}},"container-title":["Proceedings of 2011 International Conference on Electronic &amp; Mechanical Engineering and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5996364\/6023088\/06023898.pdf?arnumber=6023898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T04:08:41Z","timestamp":1490069321000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6023898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/emeit.2011.6023898","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}