{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T22:49:50Z","timestamp":1725922190422},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319710747"},{"type":"electronic","value":"9783319710754"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_27","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:37:18Z","timestamp":1511872638000},"page":"247-253","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security from Disjoint Paths: Is It Possible?"],"prefix":"10.1007","author":[{"given":"Sergiu","family":"Costea","sequence":"first","affiliation":[]},{"given":"Marios O.","family":"Choudary","sequence":"additional","affiliation":[]},{"given":"Costin","family":"Raiciu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"issue":"6","key":"27_CR1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"12","key":"27_CR2","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"issue":"11","key":"27_CR3","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Wee, H.: The OPTLS protocol and TLS 1.3. In: 2016 IEEE European Symposium on Security and Privacy, pp. 81\u201396 (2016)","DOI":"10.1109\/EuroSP.2016.18"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Ford, A., Raiciu, C., Handley, M., Bonaventure, O.: TCP Extensions for Multipath Operation with Multiple Addresses, IETF RFC 6824, January 2013","DOI":"10.17487\/rfc6824"},{"key":"27_CR6","unstructured":"GigaLTE, news of Multipath TCP in Korea. http:\/\/blog.multipath-tcp.org\/blog\/html\/2015\/07\/24\/korea.html"},{"issue":"4","key":"27_CR7","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MPRV.2007.76","volume":"6","author":"FL Wong","year":"2007","unstructured":"Wong, F.L., Stajano, F.: Multichannel security protocols. IEEE Pervasive Comput. 6(4), 31\u201339 (2007)","journal-title":"IEEE Pervasive Comput."},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Olteanu, V., Raiciu, C.: Datacenter-scale load balancing for multipath transport. In: Proceedings of the 2016 Workshop on Hot Topics in Middleboxes and Network Function Virtualization, HotMiddlebox 16 (2016)","DOI":"10.1145\/2940147.2940154"},{"key":"27_CR9","unstructured":"Namecoin. https:\/\/namecoin.org\/"},{"key":"27_CR10","unstructured":"Bittau, A., Hamburg, M., Handley, M., Mazieres, D., Boneh, D.: The case for ubiquitous transport-level encryption. In: USENIX Security Symposium, pp. 403\u2013418 (2010)"},{"key":"27_CR11","unstructured":"The Guardian: Diginotar SSL certificate hack amounts to cyberwar. https:\/\/www.theguardian.com\/technology\/2011\/sep\/05\/diginotar-certificate-hack-cyberwar"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T20:42:54Z","timestamp":1570394574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}