{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:35:00Z","timestamp":1730248500810,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icitcs.2016.7740366","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T16:40:55Z","timestamp":1478796055000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Rules and Results for SSL\/TLS Nonintrusive Proxy Based on JSON Data"],"prefix":"10.1109","author":[{"given":"Suhairi","family":"Mohd Jawi","sequence":"first","affiliation":[]},{"given":"Fakariah Hani","family":"Mohd Ali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Passing PCI DSS Section 6 Compliance From Secure Payment Applications to Software Security Assurance","year":"2010","key":"ref10"},{"journal-title":"TLS Proxies Friend or Foe? arXiv preprint arXiv 1407 7146","year":"2014","author":"o'neill","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.15"},{"journal-title":"Passive Collection and Analysis of SSL\/TLS Connections and Certificates","year":"2015","author":"zeindler","key":"ref13"},{"journal-title":"SSL\/TLS interception proxies and transitive trust Black Hat Europe","year":"2012","author":"jarmoc","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1201\/9780203490044"},{"key":"ref4","first-page":"83","article-title":"Analyzing forged ssl certificates in the wild. In Security and Privacy (SP)","author":"huang","year":"0"},{"journal-title":"The Secure Sockets Layer (SSL) Protocol Version 3 0","year":"2011","author":"freier","key":"ref3"},{"journal-title":"Testing for Weak SSL\/TLS Ciphers Insufficient Transport Layer Protection (OTG-CRYPST-001)","year":"2015","key":"ref6"},{"journal-title":"SSL and TLS Theory and Practice","year":"2009","author":"oppliger","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298318"},{"key":"ref7","first-page":"12","volume":"1","author":"ristic","year":"2012","journal-title":"SSL\/TLS Deployment Best Practices"},{"journal-title":"SSL\/TLS protocol and cipher suite scanner with JSON output","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46578-3_51"},{"journal-title":"Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS)","year":"2002","author":"chown","key":"ref9"}],"event":{"name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","start":{"date-parts":[[2016,9,26]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2016,9,26]]}},"container-title":["2016 6th International Conference on IT Convergence and Security (ICITCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7740253\/7740293\/07740366.pdf?arnumber=7740366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T07:05:06Z","timestamp":1480489506000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7740366\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icitcs.2016.7740366","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}