{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:25:56Z","timestamp":1738819556477,"version":"3.37.0"},"reference-count":4,"publisher":"Academy Publisher","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.6.5.757-764","type":"journal-article","created":{"date-parts":[[2011,5,4]],"date-time":"2011-05-04T08:03:58Z","timestamp":1304496238000},"source":"Crossref","is-referenced-by-count":2,"title":["Research and Implementation of Three HTTPS Attacks"],"prefix":"10.4304","volume":"6","author":[{"given":"Kefei","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Tingqiang","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Gao","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2011,5,4]]},"reference":[{"volume-title":"SSL Man-in-the-Middle Attacks","year":"2003","author":"Burkholder","key":"ref1"},{"volume-title":"New Tricks For Defeating SSL in Practice","year":"2009","author":"Moixe","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.200"},{"volume-title":"SSL and TLS Essentials.","year":"2004","author":"Thomas","key":"ref4"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:10:10Z","timestamp":1738775410000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,4]]},"references-count":4,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2011,5,4]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.6.5.757-764","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2011,5,4]]}}}