{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:11:52Z","timestamp":1725495112393},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540771555"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77156-2_2","type":"book-chapter","created":{"date-parts":[[2007,11,14]],"date-time":"2007-11-14T12:48:44Z","timestamp":1195044524000},"page":"3-22","source":"Crossref","is-referenced-by-count":1,"title":["Experiences with Host-to-Host IPsec"],"prefix":"10.1007","author":[{"given":"Tuomas","family":"Aura","sequence":"first","affiliation":[]},{"given":"Michael","family":"Roe","sequence":"additional","affiliation":[]},{"given":"Anish","family":"Mohammed","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/10958513_3","volume-title":"Information Security","author":"T. Aura","year":"2003","unstructured":"Aura, T.: Cryptographically generated addresses. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 29\u201343. Springer, Heidelberg (2003)"},{"key":"2_CR2","volume-title":"Proc. 18th Annual Computer Security Applications Conference","author":"T. Aura","year":"2002","unstructured":"Aura, T., Roe, M., Arkko, J.: Security of Internet location management. In: Proc. 18th Annual Computer Security Applications Conference, Las Vegas, IEEE Computer Society, Los Alamitos (2002)"},{"key":"2_CR3","first-page":"205","volume-title":"Proc. 6th Usenix Unix Security Symposium","author":"S.M. Bellovin","year":"1996","unstructured":"Bellovin, S.M.: Problem areas for the IP security protocols. In: Proc. 6th Usenix Unix Security Symposium, pp. 205\u2013214. USENIX Association, San Jose, CA, USA (1996)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Carpenter, B., Crowcroft, J., Rekhter, Y.: IPv4 address behaviour today. RFC 2101, IETF Network Working Group (February 1997)","DOI":"10.17487\/rfc2101"},{"issue":"8","key":"2_CR5","first-page":"198","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public-key protocols. Communications of the ACM\u00a029(8), 198\u2013208 (1983)","journal-title":"Communications of the ACM"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Eastlake, D.: Domain name system security extensions. RFC 2535, IETF Network Working Group (March 1999)","DOI":"10.17487\/rfc2535"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Kaufman, C. (ed.): Internet key exchange (IKEv2) protocol. Internet-Draft draft-ietf-ipsec-ikev2-17.txt, IETF IPsec Working Group, Work in progress (September 2004)","DOI":"10.17487\/rfc4306"},{"key":"2_CR8","unstructured":"Ferguson, N., Schneier, B.: A cryptographic evaluation of IPsec. Technical report, Counterpane Labs (1999)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/10722599_16","volume-title":"Computer Security - ESORICS 2000","author":"J.D. Guttman","year":"2000","unstructured":"Guttman, J.D., Herzog, A.L., Thayer, F.J.: Authentication and confidentiality via IPsec. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 255\u2013272. Springer, Heidelberg (2000)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet key exchange (IKE). RFC 2409, IETF Network Working Group (November 1998)","DOI":"10.17487\/rfc2409"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security architecture for the Internet Protocol. RFC 2401, IETF Network Working Group (November 1998)","DOI":"10.17487\/rfc2401"},{"key":"2_CR12","unstructured":"Kent, S., Seo, K.: Security architecture for the Internet protocol. Internet-Draft draft-ietf-ipsec-rfc2401bis-03, IETF IPsec Working Group, Work in progress (September 2004)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H. Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: The \u2018SIGn-and-MAc\u2019 approach to authenticated Diffie-Hellman and its use in the IKE-protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 400\u2013425. Springer, Heidelberg (2003)"},{"key":"2_CR14","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/ACSAC.2001.991562","volume-title":"Proc. 17th Annual Computer Security Applications Conference","author":"U. Lang","year":"2001","unstructured":"Lang, U., Gollmann, D., Schreiner, R.: Verifiable identifiers in middleware security. In: Proc. 17th Annual Computer Security Applications Conference, New Orleans, LA USA, pp. 450\u2013459. IEEE Computer Society, Los Alamitos (2001)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Linn, J.: Generic security service application program interface version 2, update 1. RFC 2743, IETF (January 2000)","DOI":"10.17487\/rfc2743"},{"key":"2_CR16","volume-title":"IEEE Symposium on Security and Privacy","author":"C. Meadows","year":"1999","unstructured":"Meadows, C.: Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer. In: IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/3-540-45807-7_3","volume-title":"Security Protocols","author":"P. Nikander","year":"2002","unstructured":"Nikander, P.: Denial-of-service, address ownership, and early authentication in the IPv6 world. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol.\u00a02467, pp. 12\u201321. Springer, Heidelberg (2002)"},{"key":"2_CR18","unstructured":"Nikander, P., Ylitalo, J., Wall, J.: Integrating security, mobility, and multi-homing in a HIP way. In: NDSS 2003. Proc. Network and Distributed Systems Security Symposium, San Diego, CA USA, pp. 87\u201399 (February 2003)"},{"issue":"6","key":"2_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/4236.895016","volume":"4","author":"R. Perlman","year":"2000","unstructured":"Perlman, R., Kaufman, C.: Key exchange in IPSec: Analysis of IKE. IEEE Internet Computing\u00a04(6), 50\u201356 (2000)","journal-title":"IEEE Internet Computing"},{"key":"2_CR20","unstructured":"Piper, D., Swander, B.: A GSS-API authentication method for IKE. Internet-Draft draft-ietf-ipsec-isakmp-gss-auth-07, IETF, Expired (July 2001)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Moskowitz, B., Karrenberg, D., De Groot, G J., Lear, E.: Address allocation for private internets. RFC 1918, IETF (February 1996)","DOI":"10.17487\/rfc1918"},{"key":"2_CR22","first-page":"208","volume-title":"Proc. 1997 IEEE Symposium on Security and Privacy","author":"C.L. Schuba","year":"1997","unstructured":"Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spaffold, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. In: Proc. 1997 IEEE Symposium on Security and Privacy, Oakland, CA USA, pp. 208\u2013223. IEEE Computer Society Press, Los Alamitos (1997)"},{"issue":"3","key":"2_CR23","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10207-004-0064-6","volume":"4","author":"J. Trostle","year":"2005","unstructured":"Trostle, J., Gossman, B.: Techniques for improving the security and manageability of IPsec policy. International Journal of Information Security\u00a04(3), 209\u2013226 (2005)","journal-title":"International Journal of Information Security"},{"key":"2_CR24","unstructured":"International\u00a0Telecommunication Union. ITU-T recommendation X.509 (11\/93) - The Directory: Authentication Framework (November 1993)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77156-2_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:03:31Z","timestamp":1619521411000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77156-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540771555"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77156-2_2","relation":{},"subject":[]}}