{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:17:09Z","timestamp":1771701429398,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540886525","type":"print"},{"value":"9783540886532","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88653-2_14","type":"book-chapter","created":{"date-parts":[[2008,11,1]],"date-time":"2008-11-01T02:14:25Z","timestamp":1225505665000},"page":"188-200","source":"Crossref","is-referenced-by-count":1,"title":["IPSec Database Query Acceleration"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Ferrante","sequence":"first","affiliation":[]},{"given":"Satish","family":"Chandra","sequence":"additional","affiliation":[]},{"given":"Vincenzo","family":"Piuri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol \u2013 RFC2401. IETF RFC (1998)","DOI":"10.17487\/rfc2401"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP Authentication Header \u2013 RFC2402. IETF RFC (1998)","DOI":"10.17487\/rfc2402"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP Encapsulating Security Payload (ESP) \u2013 RFC2406. IETF RFC (1998)","DOI":"10.17487\/rfc2406"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrell, D.: The Internet Key Exchange (IKE) \u2013 RFC2409. IETF RFC (1998)","DOI":"10.17487\/rfc2409"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Kent, S.: IP Authentication Header \u2013 RFC4302. IETF RFC (2005)","DOI":"10.17487\/rfc4302"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Kent, S.: IP Encapsulating Security Payload (ESP) \u2013 RFC4303. IETF RFC (2005)","DOI":"10.17487\/rfc4303"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Shacham, A., Monsour, R., Pereira, R., Thomas, M.: IP Payload Compression Protocol (IPComp) \u2013 RFC2393. IETF RFC (1998)","DOI":"10.17487\/rfc2393"},{"key":"14_CR8","volume-title":"Secure Networking with Windows 2000 and Trust Services","author":"J. Feghhi","year":"2001","unstructured":"Feghhi, J., Feghhi, J.: Secure Networking with Windows 2000 and Trust Services. Addison-Wesley, Reading (2001)"},{"key":"14_CR9","volume-title":"Virtual Private Networks","author":"R. Yuan","year":"2001","unstructured":"Yuan, R., Strayer, W.T.: Virtual Private Networks. Addison-Wesley, Reading (2001)"},{"key":"14_CR10","unstructured":"Miltchev, S., Ioannidis, S., Keromytis, A.D.: A Study of the Relative Costs of Network Security Protocols. In: USENIX Annual Technical Program, Monterey, CA (2002)"},{"key":"14_CR11","unstructured":"Ariga, S., Nagahashi, K., Minami, M., Esaki, H., Murai, J.: Performance Evaluation of Data Transmission Using IPSec Over IPv6 Networks. In: INET, Yokohama, Japan (2000)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Ferrante, A., Piuri, V., Owen, J.: IPSec Hardware Resource Requirements Evaluation. In: NGI 2005, Rome, Italy, EuroNGI (2005)","DOI":"10.1109\/NGI.2005.1431672"},{"key":"14_CR13","volume-title":"NGI 2007","author":"A. Ferrante","year":"2007","unstructured":"Ferrante, A., Piuri, V.: High-level Architecture of an IPSec-dedicated System on Chip. In: NGI 2007, Trondheim, Norway. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2004.30","volume":"37","author":"R. Friend","year":"2004","unstructured":"Friend, R.: Making the Gigabit IPSec VPN Architecture Secure. IEEE Computer\u00a037, 54\u201360 (2004)","journal-title":"IEEE Computer"},{"key":"14_CR15","unstructured":"Pagiamtzis, K.: CAM Primer (n.a.), http:\/\/www.eecg.toronto.edu\/pagiamt\/cam\/camintro.html"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Pagiamtzis, K., Sheikholeslami, A.: Pipelined Match-lines and Hierarchical Search-lines for Low-power Content-addressable Memories. In: IEEE Custom Integrated Circuits Conference, pp. 383\u2013386 (2003)","DOI":"10.1109\/CICC.2003.1249423"},{"key":"14_CR17","first-page":"259","volume-title":"Network Processor Design","author":"P. Chandra","year":"2003","unstructured":"Chandra, P., Lakshmanamurty, S., Yavatkar, R.: Intel Corporation \u2013 Intel IXP2400 Network Processor: A Second-Generation Intel NPU. In: Crowley, P., Franklin, M.A., Hadimioglu, H., Onufryk, P.Z. (eds.) Network Processor Design, vol.\u00a01, pp. 259\u2013275. Morgan Kaufmann, San Francisco (2003)"},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1109\/49.772436","volume":"17","author":"H.H.-Y. Tzeng","year":"1999","unstructured":"Tzeng, H.H.-Y., Przygienda, T.: On Fast Address-Lookup Algorithms. IEEE Journal on Selected Areas in Communications\u00a017, 1067\u20131082 (1999)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"14_CR19","volume-title":"Computer Architecture: a Quantitative Approach","author":"J. Hennessy","year":"2002","unstructured":"Hennessy, J., Patterson, D.: Computer Architecture: a Quantitative Approach, 3rd edn. Morgan Kaufmann Publishers, San Francisco (2002)","edition":"3"},{"key":"14_CR20","unstructured":"SystemC Official Website (n.a.), http:\/\/www.systemc.org\/"},{"key":"14_CR21","unstructured":"The Internet Traffic Archive (n.a.), http:\/\/ita.ee.lbl.gov\/"},{"key":"14_CR22","unstructured":"TCPDUMP Public Repository (n.a.), http:\/\/www.tcpdump.org\/"},{"key":"14_CR23","first-page":"128","volume-title":"Real-Time and Embedded Technology Applications","author":"A. Ferrante","year":"2005","unstructured":"Ferrante, A., Piscopo, G., Scaldaferri, S.: Application-driven Optimization of VLIW Architectures: a Hardware-Software Approach. In: Real-Time and Embedded Technology Applications, pp. 128\u2013137. IEEE Computer Society, Los Alamitos (2005)"},{"key":"14_CR24","unstructured":"Jouppi, N., Reinman, G., Shivakumar, P., Wilton, S.: CACTI (n.a.), http:\/\/research.compaq.com\/wrl\/people\/jouppi\/CACTI.html"}],"container-title":["Communications in Computer and Information Science","E-business and Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88653-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T21:30:53Z","timestamp":1557869453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88653-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540886525","9783540886532"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88653-2_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}