{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:15Z","timestamp":1750220895361,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Agent\u00fara na Podporu V\u00f0skumu a V\u00f0voja","award":["APVV-17-0561"],"award-info":[{"award-number":["APVV-17-0561"]}]},{"name":"Faculty of Science, Pavol Jozef Safarik University","award":["VVGS-PF-2019-1062"],"award-info":[{"award-number":["VVGS-PF-2019-1062"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,14]]},"DOI":"10.1145\/3360664.3360681","type":"proceedings-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T15:44:57Z","timestamp":1571845497000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Secure String Class Compliant with PCI DSS"],"prefix":"10.1145","author":[{"given":"Katar\u00edna","family":"Amrichov\u00e1","sequence":"first","affiliation":[{"name":"Institute of Computer Science, Pavol Jozef \u0160af\u00e1rik University in Ko\u0161ice, Ko\u0161ice, Slovakia"}]},{"given":"Ter\u00e9zia","family":"M\u00e9ze\u0161ov\u00e1","sequence":"additional","affiliation":[{"name":"Institute of Computer Science, Pavol Jozef \u0160af\u00e1rik University in Ko\u0161ice, Ko\u0161ice, Slovakia"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alex Caelus. 2014 (accessed May 1 2019). SecureString.cpp. https:\/\/github.com\/alex-caelus\/SecureString\/blob\/master\/SecureString.cpp  Alex Caelus. 2014 (accessed May 1 2019). SecureString.cpp. https:\/\/github.com\/alex-caelus\/SecureString\/blob\/master\/SecureString.cpp"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.12"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694380"},{"key":"e_1_3_2_1_4_1","volume-title":"Cleartext passwords in linux memory. Massachusetts institute of technology","author":"Davidoff Sherri","year":"2008","unstructured":"Sherri Davidoff . 2008. Cleartext passwords in linux memory. Massachusetts institute of technology ( 2008 ), 1--13. Sherri Davidoff. 2008. Cleartext passwords in linux memory. Massachusetts institute of technology (2008), 1--13."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181962"},{"key":"e_1_3_2_1_6_1","first-page":"5","article-title":"Inside the buffer overflow attack: mechanism, method, & prevention","volume":"1","author":"Donaldson Mark E","year":"2002","unstructured":"Mark E Donaldson . 2002 . Inside the buffer overflow attack: mechanism, method, & prevention . GSEC Version 1 , 3 (2002), 5 . Mark E Donaldson. 2002. Inside the buffer overflow attack: mechanism, method, & prevention. GSEC Version 1, 3 (2002), 5.","journal-title":"GSEC Version"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_8_1","unstructured":"European Union Agency for Cybersecurity (ENISA). 2014 (accessed May 1 2019). Algorithms key size and parameters Report. https:\/\/www.enisa.europa.eu\/publications\/algorithms-key-size-and-parameters-report-2014  European Union Agency for Cybersecurity (ENISA). 2014 (accessed May 1 2019). Algorithms key size and parameters Report. https:\/\/www.enisa.europa.eu\/publications\/algorithms-key-size-and-parameters-report-2014"},{"key":"e_1_3_2_1_9_1","unstructured":"Evolveum. 2019 (accessed May 1 2019). GuardedString.java. https:\/\/github.com\/Evolveum\/openicf\/blob\/master\/framework\/java\/connectorframework\/src\/main\/java\/org\/identityconnectors\/common\/security\/GuardedString.java  Evolveum. 2019 (accessed May 1 2019). GuardedString.java. https:\/\/github.com\/Evolveum\/openicf\/blob\/master\/framework\/java\/connectorframework\/src\/main\/java\/org\/identityconnectors\/common\/security\/GuardedString.java"},{"volume-title":"Advances in Computing Applications","author":"Fahrnberger G\u00fcnter","key":"e_1_3_2_1_10_1","unstructured":"G\u00fcnter Fahrnberger . 2016. A detailed view on securestring 3.0 . In Advances in Computing Applications . Springer , 97--121. G\u00fcnter Fahrnberger. 2016. A detailed view on securestring 3.0. In Advances in Computing Applications. Springer, 97--121."},{"volume-title":"Mobile Agents and Security","author":"Gong Li","key":"e_1_3_2_1_11_1","unstructured":"Li Gong and Roland Schemers . 1998. Signing, Sealing, and Guarding Java Objects . In Mobile Agents and Security . Springer , 206--216. Li Gong and Roland Schemers. 1998. Signing, Sealing, and Guarding Java Objects. In Mobile Agents and Security. Springer, 206--216."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.8"},{"volume-title":"Global Security, Safety and Sustainability & e-Democracy","author":"Karayianni Stavroula","key":"e_1_3_2_1_13_1","unstructured":"Stavroula Karayianni and Vasilios Katos . 2011. Practical password harvesting from volatile memory . In Global Security, Safety and Sustainability & e-Democracy . Springer , 17--22. Stavroula Karayianni and Vasilios Katos. 2011. Practical password harvesting from volatile memory. In Global Security, Safety and Sustainability & e-Democracy. Springer, 17--22."},{"key":"e_1_3_2_1_14_1","unstructured":"Microsoft. 2019 (accessed May 1 2019). SecureString.cs from .NET Framework 4.8. https:\/\/referencesource.microsoft.com\/{#}mscorlib\/System\/security\/securestring.cs  Microsoft. 2019 (accessed May 1 2019). SecureString.cs from .NET Framework 4.8. https:\/\/referencesource.microsoft.com\/{#}mscorlib\/System\/security\/securestring.cs"},{"key":"e_1_3_2_1_15_1","volume-title":"International Workshop on Cryptographic Techniques and E-Commerce. 131--138","author":"Perrig Adrian","year":"1999","unstructured":"Adrian Perrig and Dawn Song . 1999 . Hash visualization: A new technique to improve real-world security . In International Workshop on Cryptographic Techniques and E-Commerce. 131--138 . Adrian Perrig and Dawn Song. 1999. Hash visualization: A new technique to improve real-world security. In International Workshop on Cryptographic Techniques and E-Commerce. 131--138."},{"key":"e_1_3_2_1_16_1","unstructured":"Security Standards Council. 2018 (accessed May 1 2019). Payment Card Industry Data Security Standard. https:\/\/www.pcisecuritystandards.org\/document{_}library?category=pcidss{&}document=pci{_}dss  Security Standards Council. 2018 (accessed May 1 2019). Payment Card Industry Data Security Standard. https:\/\/www.pcisecuritystandards.org\/document{_}library?category=pcidss{&}document=pci{_}dss"},{"key":"e_1_3_2_1_17_1","volume-title":"A survey of isolation techniques","author":"Viswanathan Arun","year":"2009","unstructured":"Arun Viswanathan and BC Neuman . 2009. A survey of isolation techniques . Information Sciences Institute , University of Southern California ( 2009 ). Arun Viswanathan and BC Neuman. 2009. A survey of isolation techniques. Information Sciences Institute, University of Southern California (2009)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.54"}],"event":{"name":"CECC 2019: Central European Cybersecurity Conference","sponsor":["University of Maribor"],"location":"Munich Germany","acronym":"CECC 2019"},"container-title":["Proceedings of the Third Central European Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360681","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360664.3360681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:36Z","timestamp":1750203876000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360681"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":18,"alternative-id":["10.1145\/3360664.3360681","10.1145\/3360664"],"URL":"https:\/\/doi.org\/10.1145\/3360664.3360681","relation":{},"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}