{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:34:01Z","timestamp":1725788041363},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1109\/icoin.2012.6164348","type":"proceedings-article","created":{"date-parts":[[2012,3,13]],"date-time":"2012-03-13T16:54:40Z","timestamp":1331657680000},"page":"53-58","source":"Crossref","is-referenced-by-count":1,"title":["Secure web referral service"],"prefix":"10.1109","author":[{"given":"Vijayakrishnan","family":"Nagarajan","sequence":"first","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"489","article-title":"Hardening web browsers against manin-the-middle and eavesdropping attacks","author":"xia","year":"2005","journal-title":"Proceedings of the 14th international conference on World Wide Web"},{"journal-title":"DNS Spoofing (Malicious Cache Poisoning)","year":"2000","author":"sax","key":"13"},{"key":"14","first-page":"99","article-title":"An introduction to arp spoofing","author":"whalen","year":"2001","journal-title":"NoDEA"},{"journal-title":"Sslstrip Software","year":"2009","author":"moxie","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.98"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4034"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4035"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4033"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367569"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.200"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019213109274"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1364782.1364786"}],"event":{"name":"2012 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2012,2,1]]},"location":"Bali, Indonesia","end":{"date-parts":[[2012,2,3]]}},"container-title":["The International Conference on Information Network 2012"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6158351\/6164338\/06164348.pdf?arnumber=6164348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:25:18Z","timestamp":1490102718000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6164348\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icoin.2012.6164348","relation":{},"subject":[],"published":{"date-parts":[[2012,2]]}}}