{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T14:56:28Z","timestamp":1696517788973},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,1,13]],"date-time":"2011-01-13T00:00:00Z","timestamp":1294876800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-010-0546-4","type":"journal-article","created":{"date-parts":[[2011,1,12]],"date-time":"2011-01-12T16:37:47Z","timestamp":1294850267000},"page":"762-776","source":"Crossref","is-referenced-by-count":3,"title":["User requirements-aware security ranking in SSL protocol"],"prefix":"10.1007","volume":"64","author":[{"given":"Fang","family":"Qi","sequence":"first","affiliation":[]},{"given":"Zhe","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Guojun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,1,13]]},"reference":[{"issue":"1","key":"546_CR1","first-page":"66","volume":"21","author":"I Goldberg","year":"1996","unstructured":"Goldberg I, Wagner D (1996) Randomness and the netscape browser. Dr Dobb\u2019s J 21(1):66\u201370","journal-title":"Dr Dobb\u2019s J"},{"issue":"1","key":"546_CR2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MSP.2009.12","volume":"7","author":"F Callegati","year":"2009","unstructured":"Callegati F, Cerroni W, Ramilli M (2009) Man-in-the-middle attack to the HTTPS protocol. IEEE Secur Priv 7(1):78\u201381","journal-title":"IEEE Secur Priv"},{"key":"546_CR3","unstructured":"Freier AO, Karlton P, Kocher PC (1996) The SSL protocol V3.0, 1996-11-01"},{"issue":"1","key":"546_CR4","first-page":"103","volume":"6","author":"TS Sobh","year":"2008","unstructured":"Sobh TS, Elgohary A, Zaki M (2008) Performance improvements on the network security protocols. Int J Comput Sci Netw Secur 6(1):103\u2013115","journal-title":"Int J Comput Sci Netw Secur"},{"key":"546_CR5","series-title":"LNCS","first-page":"76","volume-title":"Proceedings of 2001 ACM workshop on security and privacy in digital rights management","author":"J Feigenbaum","year":"2002","unstructured":"Feigenbaum J, Freedman MJ, Sander T, Shostack A (2002) Privacy engineering for digital rights management systems. In: Proceedings of 2001 ACM workshop on security and privacy in digital rights management. LNCS, vol 2320. pp 76\u2013105"},{"key":"546_CR6","first-page":"229","volume-title":"Proceedings of the 11th USENIX security conference","author":"E Rescorla","year":"2002","unstructured":"Rescorla E, Cain A, Korver B (2002) SSLACC: A clustered SSL accelerator. In: Proceedings of the 11th USENIX security conference, San Francisco, August 5\u20139, pp 229\u2013246"},{"issue":"3","key":"546_CR7","first-page":"912","volume":"E92-A","author":"HM Sun","year":"2009","unstructured":"Sun HM, Yang CT, Wu ME (2009) Short-exponent RSA, IEICE transactions on fundamentals of electronics. Commun Comput Sci E92-A(3):912\u2013918","journal-title":"Commun Comput Sci"},{"key":"546_CR8","first-page":"1","volume-title":"Proceedings of IEEE global internet symposium 2006, Spain","author":"FC Kuo","year":"2006","unstructured":"Kuo FC, Tschofenig H, Meyer F et al (2006) Comparison studies between pre-shared and public key exchange mechanisms for transport layer security. In: Proceedings of IEEE global internet symposium 2006, Spain, pp 1\u20136"},{"key":"546_CR9","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/1128817.1128826","volume-title":"Proceedings of the 2006 ACM symposium on information, computer and communications security","author":"C Castelluccia","year":"2006","unstructured":"Castelluccia C, Mykletun E, Tsudik G (2006) Improving secure server performance by re-balancing SSL\/TLS handshakes. In: Proceedings of the 2006 ACM symposium on information, computer and communications security. ACM Press, New York, pp 26\u201334"},{"key":"546_CR10","first-page":"28","volume-title":"Lecture notes in computer science","author":"H Shacham","year":"2001","unstructured":"Shacham H, Boneh D (2001) Improving SSL handshake performance via batching, RSA\u20192001. In: Lecture notes in computer science. vol 2020. Springer, San Francisco, pp 28\u201343"},{"key":"546_CR11","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/BFb0052249","volume-title":"Proceedings of crypto \u201997","author":"T Takagi","year":"1997","unstructured":"Takagi T (1997) Fast RSA-type cryptosystems using N-adic expansion. In: Proceedings of crypto \u201997. Lecture notes in computer science, vol 1294, pp 372\u2013384"},{"issue":"1","key":"546_CR12","first-page":"1","volume":"5","author":"D Boneh","year":"2002","unstructured":"Boneh D, Shacham H (2002) Fast variants of RSA. RSA Lab Crypt 5(1):1\u20138","journal-title":"RSA Lab Crypt"},{"issue":"2","key":"546_CR13","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/s00354-008-0059-3","volume":"27","author":"E Blakey","year":"2009","unstructured":"Blakey E (2009) Factorizing RSA keys an improved analogue solution. New Gener Comput 27(2):159\u2013176","journal-title":"New Gener Comput"},{"key":"546_CR14","first-page":"175","volume-title":"Batch RSA, Crypto\u201989","author":"A Fiat","year":"1989","unstructured":"Fiat A (1989) In: Batch RSA, Crypto\u201989. Springer, Berlin, pp 175\u2013185. See also J Cryptology 10(2):75\u201388, 1997"},{"key":"546_CR15","volume-title":"Handbook for applied cryptography","author":"A Menezes","year":"1997","unstructured":"Menezes A, Van Oorschot P, Vanstone S (1997) Handbook for applied cryptography. CRC Press, Boca Raton"},{"key":"546_CR16","first-page":"24","volume-title":"Proceedings of the 9th international world wide web conference","author":"N Bhatti","year":"2000","unstructured":"Bhatti N, Bouch A, Kuchinsky A (2000) Integrating user-perceived quality into web server design. In: Proceedings of the 9th international world wide web conference, Amsterdam, Netherlands, pp 24\u2013334"},{"key":"546_CR17","first-page":"297","volume-title":"Proceedings of the CHI 2000 conference on human factors in computing systems","author":"A Bouch","year":"2000","unstructured":"Bouch A, Kuchinsky A, Bhatti N (2000) Quality is in the eye of the beholder: Meeting user\u2019s requirements for internet quality of service. In: Proceedings of the CHI 2000 conference on human factors in computing systems, The Hague, The Netherlands, pp 297\u2013304"},{"key":"546_CR18","first-page":"842","volume-title":"Proceedings of the 2009 IEEE international symposium on trust, security and privacy for pervasive applications (TSP-09), in conjunction with IEEE MASS 2009, Macau SAR, China","author":"F Qi","year":"2009","unstructured":"Qi F, Tang Z, Wang GJ, Wu J (2009) QoS-aware optimization strategy for security ranking in SSL protocol. In: Proceedings of the 2009 IEEE international symposium on trust, security and privacy for pervasive applications (TSP-09), in conjunction with IEEE MASS 2009, Macau SAR, China, pp 842\u2013847"},{"key":"546_CR19","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/01449290410001669914","volume":"23","author":"F Nah","year":"2004","unstructured":"Nah F (2004) Study on tolerable waiting time: How long are web users willing to wait? Behav Inf Technol 23:153\u2013163","journal-title":"Behav Inf Technol"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0546-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0546-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0546-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T06:35:31Z","timestamp":1637130931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0546-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,13]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["546"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0546-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,13]]}}}