{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:45:14Z","timestamp":1730252714522,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,13]]},"DOI":"10.1109\/icoin50884.2021.9333877","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T15:42:57Z","timestamp":1612366977000},"page":"758-763","source":"Crossref","is-referenced-by-count":1,"title":["Let\u2019s Attest! Multi-modal Certificate Exchange for the Web of Trust"],"prefix":"10.1109","author":[{"given":"Tobias","family":"Mueller","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Welcome to the 2000s: Enabling casual two-party keysigning","volume":"22","author":"mueller","year":"2015","journal-title":"Sicherheit in Vernetzten Systemen"},{"journal-title":"What Is Free Software?","year":"2014","author":"stallman","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ELMAR.2014.6923341"},{"key":"ref13","article-title":"Another Nail in the Coffin: OpenPGP Key Servers Gone Rogue","volume":"26","author":"mueller","year":"2019","journal-title":"Sicherheit in Vernetzten Systemen"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407083"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029200"},{"key":"ref16","first-page":"1901","article-title":"Framework for fuzzing USB stacks with virtual machines","author":"mueller","year":"2015","journal-title":"Informatik 2015"},{"key":"ref17","first-page":"1145","article-title":"USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs","author":"su","year":"2017","journal-title":"Proceedings of the 26th USENIX Conference on Security Symposium ser SEC&#x2019;17"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-319-95729-6_18","article-title":"USBlock: Blocking USB-Based Keypress Injection Attacks","author":"neuner","year":"2018","journal-title":"Data and Applications Security and Privacy XXIV"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3339268"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_2"},{"key":"ref4","article-title":"Problems and Solutions for Operating OpenPGP Keyservers under the GDPR","author":"mueller","year":"2019","journal-title":"2019 International Conference on Software Telecommunications and Computer Networks (SoftCOM)"},{"key":"ref27","first-page":"1011","article-title":"Johnny, you are fired!&#x201D; - spoofing OpenPGP and S\/MIME signatures in Emails","author":"m\u00fcller","year":"2019","journal-title":"Proceedings of the 28th USENIX Conference on Security Symposium ser SEC&#x2019;19"},{"journal-title":"OpenPGP Message Format","year":"2007","author":"shaw","key":"ref3"},{"key":"ref6","first-page":"97","article-title":"The Secure Remote Password Protocol","author":"wu","year":"1998","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/359460.359473"},{"journal-title":"Magic Wormhole","year":"2020","author":"warner","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-540-30574-3_14","article-title":"Simple Password-Based Encrypted Key Exchange Protocols","author":"abdalla","year":"2005","journal-title":"Topics in Cryptology &#x2013; CT-RSA 2005"},{"journal-title":"RFC 5751-Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 3 2 Message Specification","year":"2010","author":"ramsdell","key":"ref2"},{"journal-title":"Neuer Rekord Deutsches E-Mail-Volumen steigt auf 848 Milliarden Mails","year":"2019","author":"wilhelm","key":"ref9"},{"journal-title":"E-Mail-Verschl&#x00FC;sselung - Gr&#x00FC;nde der Nichtnutzung in Deutschland 2018","year":"2019","author":"rabe","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268947"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025733"},{"key":"ref21","first-page":"417","article-title":"SafeS-linger: Easy-to-use and secure public-key exchange","author":"farb","year":"2013","journal-title":"Proceedings of the 19th Annual International Conference on Mobile Computing & Networking ser MobiCom &#x2019;13"},{"key":"ref24","article-title":"An Attack on CFB Mode Encryption As Used By OpenPGP","author":"mister","year":"2005","journal-title":"Technical Report-033"},{"key":"ref23","first-page":"18","article-title":"A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols","author":"katz","year":"2000","journal-title":"Proceedings of the 9th Conference on USENIX Security Symposium - Volume 9 ser SSYM&#x2019;00"},{"key":"ref26","first-page":"549","article-title":"Efail: Breaking S\/MIME and OpenPGP email encryption using exfiltration channels","author":"poddebniak","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref25","article-title":"Defective Sign & Encrypt in S\/MIME, PKCS#7, MOSS, PEM, PGP, and XML","author":"davis","year":"2001","journal-title":"2001 USENIX Annual Technical Conference"}],"event":{"name":"2021 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2021,1,13]]},"location":"Jeju Island, Korea (South)","end":{"date-parts":[[2021,1,16]]}},"container-title":["2021 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9333828\/9333848\/09333877.pdf?arnumber=9333877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:40:10Z","timestamp":1652197210000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9333877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,13]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icoin50884.2021.9333877","relation":{},"subject":[],"published":{"date-parts":[[2021,1,13]]}}}