{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:14Z","timestamp":1725560894954},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_2","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"16-26","source":"Crossref","is-referenced-by-count":0,"title":["Remote Access VPN with Port Protection Function by Mobile Codes"],"prefix":"10.1007","author":[{"given":"Yoshiaki","family":"Shiraishi","sequence":"first","affiliation":[]},{"given":"Youji","family":"Fukuta","sequence":"additional","affiliation":[]},{"given":"Masakatu","family":"Morii","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W. Stallings","year":"1998","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice Hall, New Jersey (1998)","edition":"2"},{"key":"2_CR2","volume-title":"Firewalls and Internet Security","author":"W.R. Cheswick","year":"1994","unstructured":"Cheswick, W.R., Bellovin, S.M.: Firewalls and Internet Security. Addison-Wesley, Boston (1994)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, RFC 2401 (November 1998)","DOI":"10.17487\/rfc2401"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Hamzeh, K., Pall, G., Verthein, W., Taarud, J., Little, W., Zorn, G.: Point-to-Point Tunneling Protocol (PPTP), RFC 2637 (July 1999)","DOI":"10.17487\/rfc2637"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Leech, M., Ganes, M., Lee, Y., Kuris, R., Koblas, D., Jones, L.: SOCKS Protocol Version 5, RFC 1928 (March 1996)","DOI":"10.17487\/rfc1928"},{"key":"2_CR6","unstructured":"Freier, A., Karlton, P., Kocher, P.: The SSL 3.0 Protocol, Netscape Communications Corp., November 18 (1996)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS Protocol Version 1.0, RFC 2246 (January 1999)","DOI":"10.17487\/rfc2246"},{"key":"2_CR8","unstructured":"Ylonen, T., Kivinen, T., Saarinen, M., Rinne, T., Lehtinen, S.: SSH Protocol Architecture, draft-ietf-secsh-architecture-14.txt, IETF (July 2003)"},{"key":"2_CR9","unstructured":"Aventail Corp., http:\/\/www.aventail.com\/"},{"key":"2_CR10","unstructured":"ArrayNetworks Inc., https:\/\/www.arraynetworks.net\/"},{"key":"2_CR11","unstructured":"Sun Microsystems, Inc., Java Remote Method Invocation, http:\/\/java.sun.com\/products\/jdk\/rmi\/"},{"key":"2_CR12","unstructured":"netfilter\/iptables, http:\/\/www.netfilter.org\/"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:40:42Z","timestamp":1559331642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}