{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:36:12Z","timestamp":1725496572644},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540404569"},{"type":"electronic","value":"9783540450368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45036-x_55","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T07:33:07Z","timestamp":1196667187000},"page":"548-557","source":"Crossref","is-referenced-by-count":0,"title":["New Mechanisms for End-to-End Security Using IPSec in NAT-Based Private Networks"],"prefix":"10.1007","author":[{"given":"Sung Yong","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jin Wook","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Sun Young","family":"Sim","sequence":"additional","affiliation":[]},{"given":"Dong Sun","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"55_CR1","doi-asserted-by":"crossref","unstructured":"K. Egevang, P. Francis, The IP Network Address Translator (NAT). RFC 1631, May. 1994.","DOI":"10.17487\/rfc1631"},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Kent, Stephen and Atakinson, Randall, The Security Architecture for the Internet Protocol. RFC 2401, 1998.","DOI":"10.17487\/rfc2401"},{"key":"55_CR3","unstructured":"John D., Linux VPN Masquerade HOWTO."},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"B. Sivasubramanian, M. K. Sundareshan, \u201cManagement of end-to-end security in collaborative IP network environments,\u201d Integrated Network Management Proceedings. IEEE\/IFIP International Symposium, pp. 639\u2013655, 2001.","DOI":"10.1109\/INM.2001.918071"},{"key":"55_CR5","unstructured":"A. Huttunen et al., \u201cUDP Encapsulation of IPSec Packets,\u201d draft-ietf-ipsecudp-encaps-01.txt, Internet draft, June 2001."},{"key":"55_CR6","unstructured":"Ivan Wallis, \u201cSolving the Incompatibility between NAT and IPSec,\u201d SSH Communications Security, March 6, 2002."},{"key":"55_CR7","unstructured":"A. Huttunen et al., \u201cIPSec over NAT Justification for UDP Encapsulation,\u201d draft-ietf-ipsec-udp-encaps-justification-00.txt, Internet draft, June 2001."},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, E. Lear, Address Allocation for Private Internets. RFC 1918, Feb. 1996.","DOI":"10.17487\/rfc1918"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Kent, Stephen, Atakinson, Randall, IP Authentication Header. RFC 2402, 1998.","DOI":"10.17487\/rfc2402"},{"key":"55_CR10","unstructured":"Kent, Stephen, Atakinson, Randall, IP Encapsulating Payload. RFC 2406, 1998."},{"key":"55_CR11","doi-asserted-by":"crossref","unstructured":"D. Maughan, M. Schneider, J. Turner, Internet Security Association and Key Management Protocol (ISAKMP). RFC 2408, 1998.","DOI":"10.17487\/rfc2408"},{"key":"55_CR12","doi-asserted-by":"crossref","unstructured":"T. Dierks, C. Allen, The TLS Protocol Version 1.0. RFC 2246, Jan. 1999.","DOI":"10.17487\/rfc2246"},{"key":"55_CR13","unstructured":"Y. Zhang, E. Singh, \u201cA Multi-Layer IPsec Protocol,\u201d USENIX Security Symposium, vol 9, Aug. 2000."},{"key":"55_CR14","doi-asserted-by":"crossref","unstructured":"J. C. Brustoloni, \u201cApplication-Independent End-to-End Security in Shared-Link Access Networks,\u201d Proceedings of the Networking Conference, pp. 608\u2013619, 2000.","DOI":"10.1007\/3-540-45551-5_51"}],"container-title":["Lecture Notes in Computer Science","Web and Communication Technologies and Internet-Related Social Issues \u2014 HSI 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45036-X_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T09:19:08Z","timestamp":1557047948000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45036-X_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540404569","9783540450368"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45036-x_55","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}