{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:56:37Z","timestamp":1725476197307},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/icc.2017.7996681","type":"proceedings-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T20:39:10Z","timestamp":1501533550000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["GroupSec: A new security model for the web"],"prefix":"10.1109","author":[{"given":"Spencer","family":"Sevilla","sequence":"first","affiliation":[]},{"given":"J.J.","family":"Garcia-Luna-Aceves","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Sadjadpour","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Explicit trusted proxy in HTTP\/2 0 or &#x2026; not so much","year":"0","key":"ref10"},{"journal-title":"Evil or benign? &#x2018;Trusted proxy&#x2019; draft debate rages on","year":"0","key":"ref11"},{"journal-title":"An architecture for secure content delegation using HTTP","year":"2016","author":"thomson","key":"ref12"},{"journal-title":"Out-Of-Band&#x2019; content coding for HTTP","year":"2016","author":"reschke","key":"ref13"},{"journal-title":"Caching secure HTTP content using blind caches","year":"2016","author":"thomson","key":"ref14"},{"key":"ref15","article-title":"Factors that affect the perception of security and privacy of e-commerce web sites","author":"turner","year":"2001","journal-title":"International Conference on Electronic Commerce Research"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-2050-6.ch005"},{"journal-title":"Encrypted content-encoding for HTTP","year":"2016","author":"thomson","key":"ref17"},{"journal-title":"RSA laboratories What key size should be used","year":"0","key":"ref18"},{"journal-title":"So you're making an RSA key for an SSL certificate What key size do you use","year":"0","key":"ref19"},{"journal-title":"HTTP Archive","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787482"},{"key":"ref27","article-title":"Privacy on the web: Facts, challenges, and solutions","author":"eltoweissy","year":"0","journal-title":"2003 Proc IEEE Security and Privacy"},{"journal-title":"It wasn't easy but Netflix will soon use HTTPS to secure video streams","year":"0","key":"ref3"},{"journal-title":"Explicit trusted proxy in HTTP\/2 0","year":"2014","author":"loreto","key":"ref6"},{"journal-title":"The Cost of Latency","year":"0","author":"hamilton","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"ref8","article-title":"TLS proxy server extension","author":"mcgrew","year":"0","journal-title":"IETF Informational Internet-Draft 2013"},{"key":"ref7","article-title":"Explicit proxies for HTTP\/2.0","author":"peon","year":"2012","journal-title":"IETF Internet Draft Informational"},{"journal-title":"HTTPS Everywhere","year":"0","key":"ref2"},{"journal-title":"HackerNews discussion explicit trusted proxy in HTTP\/2 0","year":"0","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674991"},{"journal-title":"How big an RSA key is considered secure to-day","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57p1"},{"journal-title":"OpenSSL","year":"0","key":"ref21"},{"journal-title":"An efficient certificate format for ECC","year":"0","author":"ford","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-131a"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2005.00018.x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00071.x"}],"event":{"name":"ICC 2017 - 2017 IEEE International Conference on Communications","start":{"date-parts":[[2017,5,21]]},"location":"Paris, France","end":{"date-parts":[[2017,5,25]]}},"container-title":["2017 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7985734\/7996317\/07996681.pdf?arnumber=7996681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T15:43:28Z","timestamp":1502898208000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7996681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icc.2017.7996681","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}