{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:25Z","timestamp":1750220905507,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":18,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369678","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"229-235","source":"Crossref","is-referenced-by-count":0,"title":["Design and Implementation of Web Browser Secure Storage for Web Standard Authentication Based on FIDO"],"prefix":"10.1145","author":[{"given":"Jaeyeon","family":"Park","sequence":"first","affiliation":[{"name":"Sejong University, Seoul, Korea"}]},{"given":"Dongil","family":"Shin","sequence":"additional","affiliation":[{"name":"Sejong University, Seoul, Korea"}]},{"given":"Dongkyoo","family":"Shin","sequence":"additional","affiliation":[{"name":"Sejong University, Seoul, Korea"}]},{"given":"Jaeyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"iRIPPLE, Inc Seoul, Korea"}]},{"given":"Hyungseok","family":"Lee","sequence":"additional","affiliation":[{"name":"iRIPPLE, Inc Seoul, Korea"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369678-1","unstructured":"Kelsey Cairns, Harry Halpin, and Graham Steel. 2016. Security analysis of the W3C web cryptography API. In International Conference on Research in Security Standardisation. Springer, 112--140."},{"key":"key-10.1145\/3368926.3369678-2","unstructured":"HLV Gong, D Balfanz, A Czeskis, A Birgisson, and J Hodges. 2015. FIDO 2.0: Web API for accessing FIDO 2.0 credentials. (2015)."},{"key":"key-10.1145\/3368926.3369678-3","unstructured":"Harry Halpin. 2014. The W3C web cryptography API: motivation and overview. In Proceedings of the 23rd International Conference on World Wide Web. ACM, 959--964."},{"key":"key-10.1145\/3368926.3369678-4","doi-asserted-by":"crossref","unstructured":"Russell Housley. 1999. Cryptographic message syntax. (1999).","DOI":"10.17487\/rfc2630"},{"key":"key-10.1145\/3368926.3369678-5","doi-asserted-by":"crossref","unstructured":"Russell Housley. 2007. Cryptographic Message Syntax (CMS) Authenticated-Enveloped-Data Content Type. (2007).","DOI":"10.17487\/rfc5083"},{"key":"key-10.1145\/3368926.3369678-6","unstructured":"Mayssa Jemel and Ahmed Serhrouchni. 2014. Security assurance of local data stored by HTML5 web application. In 2014 10th International Conference on Information Assurance and Security. IEEE, 47--52."},{"key":"key-10.1145\/3368926.3369678-7","doi-asserted-by":"crossref","unstructured":"Burt Kaliski. 1998. PKCS# 7: Cryptographic message syntax version 1.5. (1998).","DOI":"10.17487\/rfc2315"},{"key":"key-10.1145\/3368926.3369678-8","doi-asserted-by":"crossref","unstructured":"Burt Kaliski. 2000. PKCS# 5: Password-based cryptography specification version 2.0. (2000).","DOI":"10.17487\/rfc2898"},{"key":"key-10.1145\/3368926.3369678-9","doi-asserted-by":"crossref","unstructured":"Burt Kaliski. 2008. Public-Key Cryptography Standards (PKCS)# 8: Private-Key Information Syntax Specification Version 1.2. (2008).","DOI":"10.17487\/rfc5208"},{"key":"key-10.1145\/3368926.3369678-10","unstructured":"Stefan Kimak and Jeremy Ellman. 2015. HTML5 IndexedDB Encryption: Prevention against Potential Attacks. International Journal of Intelligent Computing Research 6, 4 (2015), 621--630."},{"key":"key-10.1145\/3368926.3369678-11","doi-asserted-by":"crossref","unstructured":"Stefan Kimak, Jeremy Ellman, and Christopher Laing. 2014. Some potential issues with the security of HTML5 indexedDB. (2014).","DOI":"10.1049\/cp.2014.0971"},{"key":"key-10.1145\/3368926.3369678-12","unstructured":"Hong C Li, Mark D Boucher, Conor P Cahill, Manohar R Castelino, Steve Orrin, Vinay Phegade, John E Simpson, et al. 2016. Secure local web application data manager. (Sept. 6 2016). US Patent 9,436,838."},{"key":"key-10.1145\/3368926.3369678-13","doi-asserted-by":"crossref","unstructured":"Sreekanth Malladi, Jim Alves-Foss, and Robert B Heckendorn. 2002. On preventing replay attacks on security protocols. Technical Report. IDAHO UNIV MOSCOW DEPT OF COMPUTER SCIENCE.","DOI":"10.21236\/ADA462295"},{"key":"key-10.1145\/3368926.3369678-14","unstructured":"K Moriarty, S Parkinson, A Rusch, and M Scott. 2014. Pkcs# 12: Personal information exchange syntax v1. 1. Technical Report. RFC 7292, July 2014 [Online] Available: https:\/\/tools.ietf.org\/html\/rfc7292."},{"key":"key-10.1145\/3368926.3369678-15","unstructured":"Top OWASP. 2017. Top 10-2017 The Ten Most Critical Web Application Security Risks. URL: owasp. org\/images\/7\/72\/OWASP_Top_10-2017_%28en 29 (2017)."},{"key":"key-10.1145\/3368926.3369678-16","unstructured":"Ryan Sleevi and Mark Watson. 2014. Web cryptography API. W3C candidate recommendation, W3C, Dec (2014)."},{"key":"key-10.1145\/3368926.3369678-17","doi-asserted-by":"crossref","unstructured":"Paul Syverson. 1994. A taxonomy of replay attacks [cryptographic protocols] Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings. IEEE (1994).","DOI":"10.21236\/ADA463948"},{"key":"key-10.1145\/3368926.3369678-18","unstructured":"William West and S Monisha Pulimood. 2012. Analysis of privacy and security in HTML5 web storage. Journal of Computing Sciences in Colleges 27, 3 (2012), 80--87."}],"event":{"number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"acronym":"SoICT 2019","name":"the Tenth International Symposium","start":{"date-parts":[[2019,12,4]]},"location":"Hanoi, Ha Long Bay, Viet Nam","end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology  - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369678&ftid=2101320&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:51Z","timestamp":1750203891000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369678"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369678","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}