iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/PST.2013.6596067
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:51:34Z","timestamp":1729637494166,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596067","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"309-316","source":"Crossref","is-referenced-by-count":8,"title":["Socio-technical formal analysis of TLS certificate validation in modern browsers"],"prefix":"10.1109","author":[{"given":"Giampaolo","family":"Bella","sequence":"first","affiliation":[]},{"given":"Rosario","family":"Giustolisi","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Updates to the internet x.509 public key infrastructure certificate and certificate revocation list profile","volume":"6818","author":"yee","year":"2013","journal-title":"RFC"},{"key":"17","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1145\/1368310.1368354","article-title":"Provably secure browser-based user-aware mutual authentication over TLS","author":"gajek","year":"2008","journal-title":"Proc of ACM ASIACCS '08"},{"key":"18","first-page":"289","article-title":"PKI layer cake: New collision attacks against the global x.509 infrastructure","author":"kaminsky","year":"2010","journal-title":"Proc of FC'10"},{"key":"15","first-page":"489","article-title":"Browser model for security analysis of browser-based protocols","author":"gro\ufffd","year":"2005","journal-title":"Proceedings of ESORICS'05"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2012.6297941"},{"journal-title":"Proc of PST '05","article-title":"User perceptions of privacy and security on the web","year":"2005","author":"flinn","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.27"},{"key":"11","first-page":"709","article-title":"PAT: Towards flexible verification under fairness","volume":"5643","author":"sun","year":"2009","journal-title":"Proc CAV'09 Ser LNCS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"year":"0","key":"21"},{"key":"20","article-title":"Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile","volume":"5280","author":"cooper","year":"2008","journal-title":"RFC"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1981-5_5"},{"year":"0","key":"23"},{"year":"0","key":"24"},{"year":"0","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/359576.359585"},{"journal-title":"An Integrated Framework for Checking the Behaviour of FUML Models Using CSP","year":"2012","author":"abdelhalim","key":"27"},{"key":"28","article-title":"Connection-oriented media transport over the transport layer security (tls) protocol in the session description protocol (sdp)","volume":"4572","author":"lennox","year":"2006","journal-title":"RFC"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502668"},{"key":"2","article-title":"HTTP over tls","volume":"2818","author":"rescorla","year":"2000","journal-title":"RFC"},{"year":"0","key":"10"},{"key":"1","article-title":"The Transport Layer Security (TLS) Protocol Version 1.2","volume":"5246","author":"dierks","year":"2008","journal-title":"RFC"},{"journal-title":"Ceremony Design and Analysis","year":"2007","author":"ellison","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655012"},{"journal-title":"Proc USENIX NSDI '09","article-title":"Crying wolf: An empirical study of ssl warning effectiveness","year":"2009","author":"sunshine","key":"5"},{"journal-title":"Proc of IFIPTM '13","article-title":"A socio-techinical understanding of tls certificate validation","year":"0","author":"bella","key":"4"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/978-3-642-30436-1_23","article-title":"Layered analysis of security ceremonies","volume":"376","author":"bella","year":"2012","journal-title":"Information Security and Privacy Research SE-23 Ser IFIP Advances in ICT"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596067.pdf?arnumber=6596067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T22:11:24Z","timestamp":1498083084000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":28,"URL":"http:\/\/dx.doi.org\/10.1109\/pst.2013.6596067","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}