{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:41:58Z","timestamp":1740102118567,"version":"3.37.3"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1005800"],"award-info":[{"award-number":["2020YFB1005800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002011"],"award-info":[{"award-number":["62002011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002358","name":"Youth Top Talent Support Program of Beihang University","doi-asserted-by":"publisher","award":["YWF-22-L-1272"],"award-info":[{"award-number":["YWF-22-L-1272"]}],"id":[{"id":"10.13039\/501100002358","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,9]]},"DOI":"10.1109\/iscc58397.2023.10217862","type":"proceedings-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T17:46:48Z","timestamp":1693244808000},"page":"1207-1213","source":"Crossref","is-referenced-by-count":0,"title":["Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers"],"prefix":"10.1109","author":[{"given":"Aozhuo","family":"Sun","sequence":"first","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Bingyu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University,Beijing,China"}]},{"given":"Qiongxiao","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Certificate Authority Co., Ltd,Beijing,China"}]},{"given":"Huiqing","family":"Wan","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security, Chinese Academy of Sciences,Beijing,China"}]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Cyber Security, University of Science and Technology of China,Hefei,China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering,State Key Laboratory of Information Security, Chinese Academy of Sciences,Beijing,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358655"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00039"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0052"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00053"},{"key":"ref10","first-page":"53","article-title":"Uninvited guests: Analyzing the identity and behavior of certificate transparency bots","author":"kondracki","year":"2022","journal-title":"31st USENIX Security Symposium (USENIX Security 22)"},{"journal-title":"An Update on Attempted Man-in-the-middle Attacks","year":"2011","author":"adkins","key":"ref2"},{"journal-title":"Security incident report","year":"2018","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560596"},{"journal-title":"Key transparency","year":"2023","author":"mcmillion","key":"ref16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660355"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37228-6_25"},{"journal-title":"SSLMate Cert spotter","year":"2023","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0075"},{"journal-title":"PBC Library","year":"2014","author":"lynn","key":"ref26"},{"key":"ref25","first-page":"75","article-title":"Off-line keyword guessing attacks on recent keyword search schemes over encrypted data","author":"byun","year":"2006","journal-title":"Proc Securecomm and Workshops"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81645-2_21"},{"key":"ref22","article-title":"TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication","author":"holz","year":"2015","journal-title":"ArXiv Preprint"},{"journal-title":"Minutes of the code signing certificate working group","year":"2023","author":"forum","key":"ref21"},{"journal-title":"bplib","year":"2019","author":"danezis","key":"ref28"},{"journal-title":"Barreto-Naehrig Curves","year":"2016","author":"kato","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450057"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345653"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131401"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278562"},{"journal-title":"Certificate Transparency","year":"2013","author":"laurie","key":"ref4"},{"journal-title":"Working together to detect maliciously or mistakenly issued cer-tificates","year":"2022","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00027"},{"journal-title":"RFC 9162 Certificate Trans-parency Version 2 0","year":"2021","author":"laurie","key":"ref5"}],"event":{"name":"2023 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2023,7,9]]},"location":"Gammarth, Tunisia","end":{"date-parts":[[2023,7,12]]}},"container-title":["2023 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10217219\/10217829\/10217862.pdf?arnumber=10217862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,25]],"date-time":"2023-09-25T17:51:07Z","timestamp":1695664267000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10217862\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iscc58397.2023.10217862","relation":{},"subject":[],"published":{"date-parts":[[2023,7,9]]}}}