{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:40:49Z","timestamp":1743115249648,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780792375586"},{"type":"electronic","value":"9780306469589"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/0-306-46958-8_10","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T04:49:39Z","timestamp":1140410979000},"page":"139-151","source":"Crossref","is-referenced-by-count":2,"title":["Extending a Campus Network with Remote Bubbles Using IPsec"],"prefix":"10.1007","author":[{"given":"Aur\u00e9lien","family":"Bonnet","sequence":"first","affiliation":[]},{"given":"Marc","family":"Lobelle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Ranch, D. (2000). Linux IP Masquerading HOWTO. Technical report. http:\/\/www.linuxdoc.org\/HOWTO\/IP-Masquerade-HOWTO.html ."},{"key":"10_CR2","unstructured":"Doraswamy, N.; Harkins, D. (1999). IPSec:The New Security Standard for the Internet, Intranets and Virtual Private Network. Prentice Hall PTR."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Kent, S.; Atkinson, R. (1998). Security Architecture for the Internet Protocol. Request for Comments 2401. Network Working Group.","DOI":"10.17487\/rfc2401"},{"key":"10_CR4","unstructured":"Kent, S.; Atkinson, R. (1998). IP Authentication Header (AH). Request for Comments 2402. Network Working Group."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Kent, S.; Atkinson, R. (1998). IP Encapsulating Security Payload (ESP). Request for Comments 2406. Network Working Group.","DOI":"10.17487\/rfc2406"},{"key":"10_CR6","unstructured":"Droms, R. (1997). Dynamic Host Configuration Protocol (DHCP). Request for Comments 2131. Network Working Group."},{"key":"10_CR7","unstructured":"Droms, R.; Lemon, T. (1999). The DHCP Handbook. Macmillan Technical Publishing."},{"key":"10_CR8","unstructured":"Dutcher, B. (2001). The NAT Handbook. Wiley Computer Publishing."},{"key":"10_CR9","volume-title":"Realm Specific IP: Protocol Specification","author":"M. Borella","year":"2000","unstructured":"Borella M.; Grabelsky D.; Taniguchi K. (2000). Realm Specific IP: Protocol Specification. Draft. Network Working Group."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Network and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-46958-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T20:47:04Z","timestamp":1555447624000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-46958-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9780792375586","9780306469589"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/0-306-46958-8_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2002]]}}}