{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:34:17Z","timestamp":1725568457833},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/cic.2017.00063","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T22:04:38Z","timestamp":1513289078000},"page":"443-448","source":"Crossref","is-referenced-by-count":1,"title":["Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications"],"prefix":"10.1109","author":[{"given":"Fadi","family":"Mohsen","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Shehab","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076773"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.90"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480709"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"journal-title":"OAuth 2 0 Threat Model and Security Considerations","year":"2011","author":"mcgloin","key":"ref14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2014.15"},{"key":"ref3","first-page":"138","article-title":"Bifocals: Analyzing webview vulnerabilities in android applications","author":"chin","year":"2013","journal-title":"Information Security Applications ? 14th International Workshop WISA 2013 Jeju Island Korea August 19–21 2013 Revised Selected Papers"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484317"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055101"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.036"},{"journal-title":"Android WebView","year":"2017","key":"ref2"},{"journal-title":"Internet Engineering Task Force (IETF)","article-title":"The OAuth 2.0 Authorization Framework","year":"2017","key":"ref1"},{"key":"ref9","first-page":"137","article-title":"Gathering evidence: Use of visual security cues in web browsers","author":"whalen","year":"2005","journal-title":"Proceedings of Graphics Interface ser GI School of Computer Science University of Waterloo Waterloo"}],"event":{"name":"2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)","start":{"date-parts":[[2017,10,15]]},"location":"San Jose, CA","end":{"date-parts":[[2017,10,17]]}},"container-title":["2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8170182\/8181461\/08181524.pdf?arnumber=8181524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T22:43:57Z","timestamp":1516661037000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8181524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cic.2017.00063","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}