{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:44:37Z","timestamp":1725489877902},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_35","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T07:42:01Z","timestamp":1187163721000},"page":"328-337","source":"Crossref","is-referenced-by-count":0,"title":["A Proposal for DoS-Defensive Internet Key Exchange"],"prefix":"10.1007","author":[{"given":"MyungSik","family":"Choi","sequence":"first","affiliation":[]},{"given":"DongJin","family":"Kwak","sequence":"additional","affiliation":[]},{"given":"SangJae","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"D. Moore, G. Voelker, and S. Savage, \u201cInferring Internet Denial-of-Service Activity\u201d, Proceedings of the 10th USENIX Security Symposium, pages 9\u201322, August 2001.","DOI":"10.21236\/ADA400003"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"D. Harkins, D. Carrel: The Internet Key Exchage (IKE), rfc2409, 1998.","DOI":"10.17487\/rfc2409"},{"issue":"6","key":"35_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, and M. Hellman, \u201cNew directions in cryptography\u201d, IEEE Trans, Information Theory, Vol. IT-22,No. 6, pages 644\u2013654, 1976.","journal-title":"IEEE Trans, Information Theory"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"S. Kent, and R. Atkinson: IP Authentication Header (AH), rfc2402, 1998.","DOI":"10.17487\/rfc2402"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"S. Kent, and R. Atkinson: IP Encapsulating Security Payload (ESP), rfc2402, 1998.","DOI":"10.17487\/rfc2406"},{"key":"35_CR6","unstructured":"Dan Harkins, C. Kaufman, S. Kent, T. Kivinen, and R. Perlman: Proposal for the IKEv2 Protocol, draft-ietf-ipsec-ikev2-01.txt, 2002."},{"key":"35_CR7","unstructured":"W. Aiello, S.M. Bellovin, R. Canetti, J. Ioannidis, A.D. Keromytis, and O. Reingold: Just Fast Keying (JFK), draft-ietf-ipsec-jfk-01.txt, 2002."},{"key":"35_CR8","unstructured":"H. krawczyk, and Technion: The IKE-SIGMA Protocol, draft-krawczyk-ipsec-ikesigma-00.txt, 2001."},{"key":"35_CR9","series-title":"Lect Notes Comput Sci","first-page":"139","volume-title":"Advances in Cryptology (CRYPTO\u2019 92)","author":"C. Dwork","year":"1992","unstructured":"C. Dwork and M. Naor., \u201cPricing Via Processing or Combatting Junk Mail\u201d, Advances in Cryptology (CRYPTO\u2019 92), volume 740 of Lecture Notes in Computer Science, pages 139\u2013147, 16\u201320 August 1992."},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Jussipekka Leiwo, Pekka Nikander, and Tuomas Aura, \u201cTowards network denial of service resistant protocols\u201d, Proceedings of the 15th International Information Security Conference (IFIP\/SEC 2000), Beijing, China, August 2000.","DOI":"10.1007\/978-0-387-35515-3_31"},{"key":"35_CR11","unstructured":"K. Matsuura and H. Imai, \u201cProtection of authenticated keyagreement protocol against a denial-of-service attack\u201d, Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA\u201998), pages 466\u2013470, Oct. 1998."},{"key":"35_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/BFb0028465","volume-title":"Proceedings of International Conference on Information and Communications Security (ICICS\u201997)","author":"T. Aura","year":"1997","unstructured":"Tuomas Aura and Pekka Nikander, \u201cStateless connections\u201d, Proceedings of International Conference on Information and Communications Security (ICICS\u201997), Vol. 1334 of LNCS, pages 87\u201397, Beijing, China, November 1997"},{"key":"35_CR13","unstructured":"K. Matsuura and H. Imai, \u201cModification of Internet Key Exchange Resistant against Denial-of-Service\u201d, Pre-Proceedings of Internet Workshop 2000 (IWS2000), pages 167\u2013174, Feb. 2000."},{"key":"35_CR14","unstructured":"NIST: Digital Signature Standard, Federal Information Processing Standards Publication 186, 1994."},{"key":"35_CR15","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"C.P. Schnorr, \u201cEfficient Signature Generation by Smart Cards\u201d, Journal of Cryptology, Vol.4, pages 161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"35_CR16","unstructured":"Faul Hoffman, and VPN Consortium: Features of Proposed Successors to IKE, draft-ietf-ipsec-soi-features-00.txt, 2002."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T02:13:23Z","timestamp":1556763203000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44843-8_35","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}