{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T08:37:53Z","timestamp":1768984673978,"version":"3.49.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/pkia.2017.8278958","type":"proceedings-article","created":{"date-parts":[[2018,2,5]],"date-time":"2018-02-05T22:31:59Z","timestamp":1517869919000},"page":"36-42","source":"Crossref","is-referenced-by-count":14,"title":["XML wrapping attack mitigation using positional token"],"prefix":"10.1109","author":[{"given":"Jitendra","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Balaji","family":"Rajendran","sequence":"additional","affiliation":[]},{"given":"B S","family":"Bindhumadhava","sequence":"additional","affiliation":[]},{"given":"N Sarat","family":"Chandra Babu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Detection of XML Signature Wrapping Attack Using Node Counting","volume":"49","author":"nath gupta","year":"2016","journal-title":"Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC _ 16&#x2019;) Smart Innovation Systems and Technologies"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14257\/ijca.2014.7.1.35"},{"key":"ref12","year":"2017","journal-title":"www oasis-open org ' &#x2018;OASIS Web Services Security (WSS)' &#x2018;"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"ronald l","year":"1978","journal-title":"Communications of the ACM CACM"},{"key":"ref4","article-title":"An Inline Approach for Secure SOAP Requests and Early Validation","author":"rahaman","year":"2006","journal-title":"OWASP Europe Conference"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSCloud.2011.6049019"},{"key":"ref6","year":"2017","journal-title":"docs oracle com ' &#x2018;Java XML Digital Signature API Specification (JSR 105) ' &#x2018;"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.70"},{"key":"ref8","year":"2017","journal-title":"www w3 org ' &#x2018;SOAP Version 1 2&#x2019;"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2010.5423006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.12"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1103022.1103026"},{"key":"ref9","year":"2015","journal-title":"www w3 org ' &#x2018;XML Signature Syntax and Processing Version 2 0&#x2019;"}],"event":{"name":"2017 International Conference on Public Key Infrastructure and its Applications (PKIA)","location":"Bangalore","start":{"date-parts":[[2017,11,14]]},"end":{"date-parts":[[2017,11,15]]}},"container-title":["2017 International Conference on Public Key Infrastructure and its Applications (PKIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8267902\/8278939\/08278958.pdf?arnumber=8278958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T09:08:28Z","timestamp":1570698508000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8278958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/pkia.2017.8278958","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}