{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:18:05Z","timestamp":1725488285498},"publisher-location":"New York, NY","reference-count":7,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387971964"},{"type":"electronic","value":"9780387347998"}],"license":[{"start":{"date-parts":[[1990,1,1]],"date-time":"1990-01-01T00:00:00Z","timestamp":631152000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/0-387-34799-2_36","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:17:36Z","timestamp":1186363056000},"page":"507-519","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Developing Ethernet Enhanced-Security System"],"prefix":"10.1007","author":[{"given":"B. J.","family":"Herbison","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"36_CR1","unstructured":"The Ethernet, A Local Area Network, Data Link Layer and Physical Layer, Version 2.0, (Digital, Intel, and Xerox), November 1982."},{"key":"36_CR2","unstructured":"Data Encryption Standard, Federal Information Processing Standards Publication 46 (FIPS PUB 46), National Bureau of Standards, 15 January 1977."},{"key":"36_CR3","unstructured":"DES Modes of Operations, Federal Information Processing Standards Publication 81 (FIPS PUB 81), National Bureau of Standards, 2 December 1980."},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"D.E. Bell and L.J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, ESD-TR-75-306, MITRE Corporation, March 1976.","DOI":"10.21236\/ADA023588"},{"key":"36_CR5","unstructured":"K.J. Biba, Integrity Considerations for Secure Computer Systems, ESD-TR-76-372, MITRE TR-3153, MITRE Corporation, April 1977."},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"R.M. Needham and M.D. Schroeder, \u201cUsing Encryption for Authentication in Large Networks of Computers\u201d, Communications of the ACM, December 1978.","DOI":"10.1145\/359657.359659"},{"key":"36_CR7","unstructured":"V.L. Voydock and S.T. Kent, Security in Higher Level Protocols: Approaches, Alternatives and Recommendations, Report No. ICST\/HLNP-81-19, National Bureau of Standards, September 1981."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 88"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34799-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T15:24:46Z","timestamp":1576164286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34799-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9780387971964","9780387347998"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/0-387-34799-2_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1990]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}