{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:26:40Z","timestamp":1725550000868},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540291138"},{"type":"electronic","value":"9783540319986"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11560326_8","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:29:26Z","timestamp":1127831366000},"page":"104-118","source":"Crossref","is-referenced-by-count":0,"title":["A Secure Way to Combine IPsec, NAT &amp; DHCP"],"prefix":"10.1007","author":[{"given":"Jacques","family":"Demerjian","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Hajjeh","sequence":"additional","affiliation":[]},{"given":"Mohamad","family":"Badra","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Ferraz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Aboda, B., Dixon, W.: IPsec-Network Address Translation (NAT) Compatibility Requirements, IETF, RFC 3715 (2004)","DOI":"10.17487\/rfc3715"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R., Masinter, L.: Uniform Resource Identifiers (URI): Generic Syntax, IETF, RFC 3986 (2005)","DOI":"10.17487\/rfc3986"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Borella, M., Lo., J., Grabelsky, D., Montenegro, G.: Realm Specific IP: Framework, IETF, RFC 3102 (2001)","DOI":"10.17487\/rfc3102"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Borella, M., Lo., J., Grabelsky, D., Taniguchi, K.: Realm Specific IP: Protocol Specification, IETF, RFC 3103 (2001)","DOI":"10.17487\/rfc3103"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Carpenter, B., Moore, K.: Connection of IPv6 Domains via IPv4 Clouds, IETF, RFC 3056 (2001)","DOI":"10.17487\/rfc3056"},{"key":"8_CR6","unstructured":"Demerjian, J., Serhrouchni, A., Achemlal, M.: E-DHCP: Extended Dynamic Host Configuration Protocol, IETF, Internet Draft (2004)"},{"key":"8_CR7","unstructured":"Demerjian, J., Serhrouchni, A., Achemlal, M.: Certificate-based Access Control and Authentication for DHCP. In: ACM\/IEEE ICETE 2004. International Conference on E-Business and Telecommunication Networks. ICETE Conference, Set\u00fabal, Portugal (2004)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Demerjian, J., Serhrouchni, A.: DHCP authentication using certificates. In: SEC 2004, 19th IFIP International Information Security Conference. SEC Conference, Toulouse, France (2004)","DOI":"10.1007\/1-4020-8143-X_30"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Droms, R.: Dynamic Host Configuration Protocol, IETF, RFC 2131 (1997)","DOI":"10.17487\/rfc2131"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Droms, R., Alexander, S.: DHCP Options and BOOTP Vendor Extensions, IETF, RFC 2132 (1997)","DOI":"10.17487\/rfc2132"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Droms, R.: Procedure for Defining New DHCP Options, IETF, RFC 2489 (1999)","DOI":"10.17487\/rfc2489"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, IETF, RFC 3281 (2002)","DOI":"10.17487\/rfc3281"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Hajjeh, I., Serhrouchni, A., Tastet, F.: New Key Management Protocol for SSL\/TLS. In: IEEE-IFIP NETCOM 2003. Network Control and Engineering for QoS, Security and Mobility. NETCOM Conference, Muscat, Oman (2003)","DOI":"10.1007\/978-0-387-35703-4_19"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), IETF, RFC 2409 (1998)","DOI":"10.17487\/rfc2409"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, IETF, RFC 3280 (2002)","DOI":"10.17487\/rfc3280"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Huttunen, et al.: UDP Encapsulation of IPsec ESP Packets, IETF, RFC 3948 (2005)","DOI":"10.17487\/rfc3948"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Jonsson, J., Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1, IETF, RFC 3447 (2003)","DOI":"10.17487\/rfc3447"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, IETF, RFC 2401 (1998a)","DOI":"10.17487\/rfc2401"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Kent, S.: Atkinson. R.: IP Authentication Header (AH), IETF, RFC 2402 (1998)","DOI":"10.17487\/rfc2402"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP Encapsulating Security Payload (ESP), IETF, RFC 2406 (1998)","DOI":"10.17487\/rfc2406"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Kivinen, T., Swander, B., Huttunen, A., Volpe, V.: Negotiation of NAT-Traversal in the IKE, IETF, RFC 3947 (2005)","DOI":"10.17487\/rfc3947"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Maughan, D., Schertler, M., Schneider, M., Turner, J.: Internet Security Association and Key Management Protocol (ISAKMP), IETF, RFC 2408 (1998)","DOI":"10.17487\/rfc2408"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Montenegro, G., Borella, M.: RSIP Support for End-to-end IPsec, IETF, RFC 3104 (2001)","DOI":"10.17487\/rfc3104"},{"key":"8_CR24","unstructured":"Phifer, L.: IP Security and NAT: Oil and Water?, ISP-Planet (2000)"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Postel, J.: User Datagram Protocol, IETF, RFC 768 (1980)","DOI":"10.17487\/rfc0768"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Postel, J.: Transmission Control Protocol, IETF, RFC 793 (1981)","DOI":"10.17487\/rfc0793"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Postel, J.: INTERNET PROTOCOL, IETF, RFC 791 (1981)","DOI":"10.17487\/rfc0791"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Srisureh, P.: Security Model with Tunnel-mode IPsec for NAT Domains. IETF, RFC 2709 (1999)","DOI":"10.17487\/rfc2709"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Srisureh, P., Holdrege, M.: IP Network Address Translator (NAT) Terminology and Considerations, IETF, RFC 2663 (1999)","DOI":"10.17487\/rfc2663"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Srisureh, P., Egevang, K.: Traditional IP Network Address Translator (traditional NAT), IETF, RFC 3022 (2001)","DOI":"10.17487\/rfc3022"},{"key":"8_CR31","unstructured":"Sun Microsystems: System Administration Guide: IP Services [Electronic version], Part No: 816-4554-10 (2005), Retrieved from docs.sun.com, Web site http:\/\/docs.sun.com\/app\/docs\/doc\/816-4554\/6maoq020v?a=view"},{"key":"8_CR32","unstructured":"Demerjian, J., Hajjeh, I., Serhrouchni, A., Badra, M.: Network security using E-DHCP over NAT\/IPsec. In: WTAS 2005. International Conference on Web Technologies, Applications and Services. IASTED Conference, Alberta, Canada (2005)"},{"key":"8_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-540-45069-6_23","volume-title":"Computer Aided Verification","author":"L. Bozga","year":"2003","unstructured":"Bozga, L., Lakhnech, Y., P\u00e9rin, M.: Hermes: A tool verifying secrecy properties of unbounded security protocols. In: Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol.\u00a02725, pp. 219\u2013222. Springer, Heidelberg (2003)"},{"key":"8_CR34","unstructured":"Herme\u2019s tool, http:\/\/www-verimag.imag.fr\/~Liana.Bozga\/eva\/hermes.php"},{"key":"8_CR35","unstructured":"French National Projet EVA (Explication et V\u00e9rification Automatique pour les Protocoles Cryptographiques), url: http:\/\/www-eva.imag.fr"},{"key":"8_CR36","unstructured":"Le Metayer, D., Jacquemard, F.: Langage de sp\u00e9cification de protocoles cryptographiques de EVA: syntaxe concr\u00e8te. Technical Report EVA-1-v3.17, Trusted Logic (November 2001), Available from http:\/\/www-eva.imag.fr"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11560326_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:50:17Z","timestamp":1605642617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11560326_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540291138","9783540319986"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/11560326_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}