{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:09:01Z","timestamp":1725494941920},"publisher-location":"Boston, MA","reference-count":12,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387741581"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-74159-8_35","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T05:08:19Z","timestamp":1194930499000},"page":"355-366","source":"Crossref","is-referenced-by-count":0,"title":["Secure Networking with NAT Traversal for Enhanced Mobility"],"prefix":"10.1007","author":[{"given":"Lubomir","family":"Cvrk","sequence":"first","affiliation":[]},{"given":"Vit","family":"Vrba","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","volume-title":"Practical Cryptography","author":"N. Fergusson","year":"2003","unstructured":"Fergusson, N., Schneier, B., Practical Cryptography, Wiley Publishing, Inc., Indianopolis USA, 2003"},{"key":"35_CR2","volume-title":"Handbook of applied cryptography","author":"A. J. Menzes","year":"1997","unstructured":"A. J. Menzes, P. C. van Oorschot, S. A. Vanstone, Handbook of applied cryptography, CRC Press LLC, Florida, USA, 1997."},{"key":"35_CR3","unstructured":"D. Kegel, \u201cNAT and Peer-to-peer networking\u201d, Web page, http:\/\/alumnus.caltech.edu\/~dank\/peer-nat.html . 1999"},{"key":"35_CR4","unstructured":"B. Ford, P. Srisuresh, and D. Kegel, \u201cPeer-to-Peer Communication Across Network Address Translators\u201d, Web page, http:\/\/www.brynosaurus.com\/pub\/net\/p2pnat\/ 2005."},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"S. Kent, R. Atkinson, \u201cSecurity Architecture for the Internet Protocol\u201d, RFC 2401, 1998.","DOI":"10.17487\/rfc2401"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"T. Dierks, C. Allen, \u201cThe TLS Protocol Version 1.0\u201d, RFC 2246, 1999.","DOI":"10.17487\/rfc2246"},{"key":"35_CR7","unstructured":"Open VPN project, http:\/\/openvpn.sourceforge.net"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. Bellare, and R. Canetti, \u201cHMAC: Keyed-Hashing for Message Authentication\u201d, RFC 2104, 1997.","DOI":"10.17487\/rfc2104"},{"key":"35_CR9","unstructured":"Free S\/WAN project, http:\/\/www.freeswan.org"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"S. Kent, R. Atkinson, \u201cIP Encapsulating Security Payload (ESP)\u201d, RFC 2406, 1998.","DOI":"10.17487\/rfc2406"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"L. Cvrk, V. Zeman, D. Komosny, \u201cH.323 Client-Independent Security Approach\u201d. Lecture Notes in Computer Science, 2005.","DOI":"10.1007\/978-3-540-31957-3_76"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"S. Kent, and R. Atkinson, \u201cIP Encapsulating Security Payload (ESP)\u201d, RFC 2406, 1998.","DOI":"10.17487\/rfc2406"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Personal Wireless Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-74159-8_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:23:58Z","timestamp":1619670238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-74159-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387741581"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-74159-8_35","relation":{},"subject":[]}}