{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:30Z","timestamp":1725490530345},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_20","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"262-276","source":"Crossref","is-referenced-by-count":0,"title":["Sherlock: Commercial High Assurance Network Computing Extended Abstract"],"prefix":"10.1007","author":[{"given":"Stephen P.","family":"Morgan","sequence":"first","affiliation":[]},{"given":"Stephen W.","family":"Neal","sequence":"additional","affiliation":[]},{"given":"Melissa A.","family":"Hartman","sequence":"additional","affiliation":[]},{"given":"Matthew R.","family":"Laue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Kent S. and R. Atkinson, IETF RFC 2401, \u201cSecurity Architecture for the Internet Protocol,\u201d http:\/\/www.ietf.org\/rfc\/rfc2401.txt , November 1998.","DOI":"10.17487\/rfc2401"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Kent, S. and R. Atkinson, IETF RFC 2402, \u201cIP Authentication Header,\u201d http:\/\/www.ietf.org\/rfc\/rfc2402.txt , November 1998.","DOI":"10.17487\/rfc2402"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Madson, C. and R. Glenn, IETF RFC 2403, \u201cThe Use of HMAC-MD5-96 within ESP and AH,\u201d http:\/\/www.ietf.org\/rfc\/rfc2403.txt, November 1998.","DOI":"10.17487\/rfc2403"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Madson, C. and R. Glenn, IETF RFC 2404, \u201cThe Use of HMAC-SHA-1-96 within ESP and AH,\u201d http:\/\/www.ietf.org\/rfc\/rfc2404.txt , November 1998.","DOI":"10.17487\/rfc2404"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Madson, C. and N. Doraswamy, IETF RFC 2405, \u201cThe ESP DES-CBC Cipher Algorithm With Explicit IV,\u201d http:\/\/www.ietf.org\/rfc\/rfc2405.txt , November 1998.","DOI":"10.17487\/rfc2405"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Kent S. and R. Atkinson, IETF RFC 2406, \u201cIP Encapsulating Security Payload (ESP),\u201d http:\/\/www.ietf.org\/rfc\/rfc2406.txt , November 1998.","DOI":"10.17487\/rfc2406"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Piper, D., IETF RFC 2407, \u201cThe Internet IP Security Domain of Interpretation for ISAKMP,\u201d http:\/\/www.ietf.org\/rfc\/rfc2407.txt , November 1998.","DOI":"10.17487\/rfc2407"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Maughan, D., M. Schertler, M. Schneider, and J. Turner, IETF RFC 2408, \u201cInternet Security Association and Key Management Protocol (ISAKMP),\u201d http:\/\/www.ietf.org\/rfc\/rfc2408.txt , November 1998.","DOI":"10.17487\/rfc2408"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Harkins, D. and D. Carrel, IETF RFC 2409, \u201cThe Internet Key Exchange (IKE),\u201d http:\/\/www.ietf.org\/rfc\/rfc2409.txt , November 1998.","DOI":"10.17487\/rfc2409"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Droms, R., IETF RFC 2131, \u201cDynamic Host Configurtion Protocol,\u201d http:\/\/www.ietf.org\/rfc\/rfc2131.txt , March 1997.","DOI":"10.17487\/rfc2131"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Croft, B. and J. Gilmore, IETF RFC 951, \u201cBootstrap Protocol (BOOTP),\u201d http:\/\/www.ietf.org\/rfc\/rfc0951.txt , September 1985.","DOI":"10.17487\/rfc0951"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,22]],"date-time":"2021-08-22T12:33:46Z","timestamp":1629635626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}