{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:08:27Z","timestamp":1725570507217},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642175688"},{"type":"electronic","value":"9783642175695"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17569-5_38","type":"book-chapter","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T06:24:09Z","timestamp":1290752649000},"page":"383-393","source":"Crossref","is-referenced-by-count":5,"title":["End-to-End Security Methods for UDT Data Transmissions"],"prefix":"10.1007","author":[{"given":"Danilo Valeros","family":"Bernardo","sequence":"first","affiliation":[]},{"given":"Doan B.","family":"Hoang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Bellovin, S.: Defending Against Sequence Number Attacks. RFC 1948 (1996)","DOI":"10.17487\/rfc1948"},{"key":"38_CR2","unstructured":"Bellovin, S.: Guidelines for Mandating the Use of IPsec, Work in Progress, IETF (October 2003)"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Bernardo, D.V., Hoang, D.B.: A Conceptual Approach against Next Generation Security Threats: Securing a High Speed Network Protocol \u2013 UDT. In: Proc. IEEE the 2nd ICFN 2010, Shanya, China (2010)","DOI":"10.1109\/ICFN.2010.80"},{"key":"38_CR4","unstructured":"Bernardo, D.V., Hoang, D.B.: Security Requirements for UDT, IETF Internet-Draft \u2013 working paper (September 2009)"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Bernardo, D.V., Hoang, D.B.: \u201cNetwork Security Considerations for a New Generation Protocol UDT. In: Proc. IEEE the 2nd ICCIST Conference 2009, Beijing, China (2009)","DOI":"10.1109\/ICCSIT.2009.5234768"},{"key":"38_CR6","unstructured":"Bernardo, D.V., Hoang, D.B.: A Security Framework and its Implementation in Fast Data Transfer Next Generation Protocol UDT. Journal of Information Assurance and Security\u00a04(354-360) (2009) ISN 1554-1010"},{"key":"38_CR7","unstructured":"Chown, T., Juby, B.: Overview of Methods for Encryption of H.323 Data Streams. Technical Paper, University of Southampton (March 2001)"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Blumenthal, M., Clark, D.: Rethinking the Design of the Internet: End-to-End Argument vs. the Brave New World. In: Proc. ACM Trans Internet Technology, vol.\u00a01 (August 2001)","DOI":"10.21236\/ADA629281"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Clark, D., Sollins, L., Wroclwski, J., Katabi, D., Kulik, J., Yang, X.: New Arch: Future Generation Internet Architecture, Technical Report, DoD \u2013 ITO (2003)","DOI":"10.21236\/ADA425221"},{"key":"38_CR10","unstructured":"Falby, N., Fulp, J., Clark, P., Cote, R., Irvine, C., Dinolt, G., Levin, T., Rose, M., Shifflett, D.: Information assurance capacity building: A case study. In: Proc. 2004 IEEE Workshop on Information Assurance, pp. 31\u201336. U.S. Military Academy (June 2004)"},{"volume-title":"Information Assurance in Computer Networks: Methods, Models, and Architecture for Network Security","year":"2001","key":"38_CR11","unstructured":"Gorodetsky, V., Skormin, V., Popyack, L. (eds.): Information Assurance in Computer Networks: Methods, Models, and Architecture for Network Security. St. Petersburg, Springer, Heidelberg (2001)"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Gu, Y., Grossman, R.: UDT: UDP-based Data Transfer for High-Speed Wide Area Networks. Computer Networks\u00a051(7) (2007)","DOI":"10.1016\/j.comnet.2006.11.009"},{"issue":"3","key":"38_CR13","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.dss.2003.11.004","volume":"39","author":"J. Hamill","year":"2005","unstructured":"Hamill, J., Deckro, R., Kloeber, J.: Evaluating information assurance strategies. Decision Support Systems\u00a039(3), 463\u2013484 (2005)","journal-title":"Decision Support Systems"},{"key":"38_CR14","unstructured":"H.I. for Information Technology, H. U. of Technology, et al.: Infrastructure for HIP (2008)"},{"key":"38_CR15","unstructured":"Harrison, D.: RPI NS2 Graphing and Statistics Package, http:\/\/networks.ecse.rpi.edu\/~harrisod\/graph.html"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"Jokela, P., Moskowitz, R., Nikander, P.: Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP). RFC 5202, IETF (April 2008)","DOI":"10.17487\/rfc5202"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401 (1998)","DOI":"10.17487\/rfc2401"},{"key":"38_CR18","volume-title":"Communication Networks","author":"A. Leon-Garcia","year":"2000","unstructured":"Leon-Garcia, A., Widjaja, I.: Communication Networks. McGraw Hill, New York (2000)"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Mathis, M., Mahdavi, J., Floyd, S., Romanow, A.: TCP selective acknowledgment options. IETF RFC 2018 (April 1996)","DOI":"10.17487\/rfc2018"},{"key":"38_CR20","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"38_CR21","unstructured":"NIST SP 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems (May 2004)"},{"key":"38_CR22","unstructured":"NS2, http:\/\/isi.edu\/nsna\/ns"},{"key":"38_CR23","unstructured":"PSU Evaluation Methods for Internet Security Technology, EMIST (2004), http:\/\/emist.ist.psu.edu (visited December 2009)"},{"key":"38_CR24","unstructured":"Rabin, M.: Digitized signatures and public-key functions as intractable as Factorization. MIT\/LCS Technical Report, TR-212 (1979)"},{"key":"38_CR25","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Modadugu, N.: Datagram Transport Layer Security. RFC 4347, IETF (April 2006)","DOI":"10.17487\/rfc4347"},{"key":"38_CR26","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signature and public-keycryptosystems. Communication of ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communication of ACM"},{"key":"38_CR27","volume-title":"Broadband Integrated Networks","author":"M. Schwartz","year":"1996","unstructured":"Schwartz, M.: Broadband Integrated Networks. Prentice Hall, Englewood Cliffs (1996)"},{"key":"38_CR28","doi-asserted-by":"crossref","unstructured":"Stewart, R. (ed.): Stream Control Transmission Protocol, RFC 4960 (2007)","DOI":"10.17487\/rfc4960"},{"key":"38_CR29","doi-asserted-by":"crossref","unstructured":"Stoica, I., Adkins, D., Zhuang, S., Shenker, S., Surana, S.: Internet Indirection Infrastructure. In: Proc. ACM SIGCOMM 2002 (2002)","DOI":"10.1145\/633025.633033"},{"key":"38_CR30","doi-asserted-by":"crossref","unstructured":"Szalay, A., Gray, J., Thakar, A., Kuntz, P., Malik, T., Raddick, J., Stoughton, C., Vandenberg, J.: The SDSS SkyServer - Public access to the Sloan digital sky server data. In: ACM SIGMOD 2002 (2002)","DOI":"10.1145\/564691.564758"},{"key":"38_CR31","unstructured":"Wang, G., Xia, Y.: An NS2 TCP Evaluation Tool, http:\/\/labs.nec.com.cn\/tcpeval.html"},{"key":"38_CR32","unstructured":"Globus XIO: unix.globus.org\/toolkit\/docs\/3.2\/xio\/index.html (retrieved on November 1, 2009)"},{"key":"38_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, M., Karp, B., Floyd, S., Peterson, L.: RR-TCP: A reordering-robust TCP with DSACK. In: Proc. the Eleventh IEEE International Conference on Networking Protocols (ICNP 2003), Atlanta, GA (November 2003)","DOI":"10.1109\/ICNP.2003.1249760"}],"container-title":["Lecture Notes in Computer Science","Future Generation Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17569-5_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T15:20:30Z","timestamp":1559834430000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17569-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642175688","9783642175695"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17569-5_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}