{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:07:03Z","timestamp":1730268423541,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/infocom.2017.8057201","type":"proceedings-article","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T16:28:21Z","timestamp":1507220901000},"page":"1-9","source":"Crossref","is-referenced-by-count":11,"title":["Checks and balances: A tripartite public key infrastructure for secure web-based connections"],"prefix":"10.1109","author":[{"given":"Jing","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shixiong","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Ruiying","family":"Du","sequence":"additional","affiliation":[]},{"given":"Guoliang","family":"Xue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4033"},{"key":"ref11","article-title":"Global authentication in an untrustworthy world","author":"abadi","year":"2013","journal-title":"Proceedings of ACM USENIX Association"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.90"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-140522"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3280"},{"journal-title":"Public Key Pinning","year":"2011","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2560"},{"key":"ref17","article-title":"Forced Perspectives, Evaluating an SSL Trust Enhancement at Scale","author":"bates","year":"2014","journal-title":"Proceedings of the 4th ACM Internet Measurement Conference (IMC)"},{"journal-title":"Convergence","year":"2011","key":"ref18"},{"key":"ref19","article-title":"Towards Short-Lived Certificates","author":"topalovic","year":"2012","journal-title":"Proceedings of Web 2 0 Security and Privacy"},{"journal-title":"Maintaining digital certificate security","year":"2015","key":"ref4"},{"journal-title":"Enhancing digital certificate security","year":"2013","author":"langley","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488448"},{"journal-title":"DSDTestProvider eDellRoot","year":"2015","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Batch identification game model for invalid signatures in wireless mobile networks","volume":"pp","author":"chen","year":"2016","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660298"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566895"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6698"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.41"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2015.23009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6962"},{"journal-title":"Sovereign Key Cryptography for Internet Domains","year":"0","author":"wierzbicki","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660355"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23379"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2011.01.004"},{"key":"ref25","volume":"9085","author":"becker","year":"2008","journal-title":"Merkle Signature Schemes Merkle Trees and Their Cryptanalysis"}],"event":{"name":"IEEE INFOCOM 2017 - IEEE Conference on Computer Communications","start":{"date-parts":[[2017,5,1]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2017,5,4]]}},"container-title":["IEEE INFOCOM 2017 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8049192\/8056940\/08057201.pdf?arnumber=8057201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T15:58:54Z","timestamp":1512057534000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8057201\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/infocom.2017.8057201","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}