{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:07:13Z","timestamp":1725566833050},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540234234"},{"type":"electronic","value":"9783540301783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30178-3_20","type":"book-chapter","created":{"date-parts":[[2010,9,23]],"date-time":"2010-09-23T15:55:07Z","timestamp":1285257307000},"page":"217-223","source":"Crossref","is-referenced-by-count":0,"title":["Scalability, Security Technologies and Mobile Applications"],"prefix":"10.1007","author":[{"given":"Larry","family":"Korba","sequence":"first","affiliation":[]},{"given":"Ronggong","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. IETF RFC 2401 (November 1998)","DOI":"10.17487\/rfc2401"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP Authentication Header. IETF RFC 2402 (November 1998)","DOI":"10.17487\/rfc2402"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP Encapsulating Security Payload. IETF RFC 2406 November (1998)","DOI":"10.17487\/rfc2406"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet Key Exchange. IETF RFC 2409 (November 1998)","DOI":"10.17487\/rfc2409"},{"issue":"2","key":"20_CR5","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of ACM"},{"key":"20_CR6","unstructured":"JADE \u2013 Java Agent Development Framework, http:\/\/sharon.cselt.it\/projects\/jade\/"},{"key":"20_CR7","unstructured":"PISA web site: http:\/\/www.pet-pisa.nl\/"},{"key":"20_CR8","unstructured":"Institute for Applied Information Processing and Communications Home Page, http:\/\/jcewww.iaik.tu-graz.ac.at\/"}],"container-title":["Lecture Notes in Computer Science","Mobility Aware Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30178-3_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:45:22Z","timestamp":1605743122000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30178-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540234234","9783540301783"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30178-3_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}