{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:20:14Z","timestamp":1743088814419,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642375019"},{"type":"electronic","value":"9783642375026"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37502-6_96","type":"book-chapter","created":{"date-parts":[[2013,5,7]],"date-time":"2013-05-07T08:25:55Z","timestamp":1367915155000},"page":"809-814","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Investigation and Realization of IPSec Strategy Based on Linux for IPv6"],"prefix":"10.1007","author":[{"given":"Rui","family":"Su","sequence":"first","affiliation":[]},{"given":"Wei","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"key":"96_CR1","unstructured":"Security architecture for the internet protoco RFC2401"},{"key":"96_CR2","unstructured":"IP authentication header RFC2402"},{"key":"96_CR3","unstructured":"IP encapsulating security payload RFC2406"},{"key":"96_CR4","unstructured":"The internet IP security domain of interpretation for ISAKMP RFC2407"},{"key":"96_CR5","unstructured":"Internet security association and key management protocol RFC2408"},{"key":"96_CR6","unstructured":"The Internet Key Exchange(IKE) RFC2409"},{"key":"96_CR7","unstructured":"IP security document roadmap RFC2411"},{"key":"96_CR8","unstructured":"The OAKLEY key determination protocol RFC2412"},{"key":"96_CR9","unstructured":"PF_KEY key management API, Version 2 RFC2367"},{"key":"96_CR10","unstructured":"The use of HMAC-MD5-96 within ESP and AH RFC2403"},{"key":"96_CR11","unstructured":"The use of HMAC-SHA-1-96 within ESP and AH RFC2404"},{"key":"96_CR12","unstructured":"The ESP DES-CBC Cipher algorithm with explicit IV RFC2405"},{"key":"96_CR13","unstructured":"The NULL Encryption algorithm and its use with IPSec RFC2410"},{"key":"96_CR14","unstructured":"Doraswamy N, Harkins D (2000) IPSec: a new generation of network safety standards, Beijing"},{"key":"96_CR15","unstructured":"Gao X, Tang J (2004) The realization of the Linux IPSec protocol using Embedded mode, Computer application vol 24"},{"key":"96_CR16","unstructured":"FreeS\/WAN. http:\/\/www.freeswan.org\/LinuxFreeS\/WANProject"},{"key":"96_CR17","unstructured":"http:\/\/packetstorm.widexs.nl\/unix\/firewall\/ipchains\/netfilter\/netfilter-howto.html"},{"key":"96_CR18","unstructured":"Satchell ST, Clifford HBJ (2000) Linux IP Protocol stack source code analysis, Beijing"},{"key":"96_CR19","unstructured":"Sklower K (1991) A tree-based packet routing table for Berkeley Unix[A]. In: USENIX Winter 1991 Technical Conference[C], pp 93\u2013104"},{"key":"96_CR20","unstructured":"Openswan. http:\/\/www.Openswan.org\/Linuxopenswanproject"},{"key":"96_CR21","unstructured":"Xu X (2002) The analysis and implementation of IPSec protocol, Zhejiang university"},{"key":"96_CR22","unstructured":"Xujing,Dianfu Ma (2001) The design and implementation of IPSec, J Beijing univ aeronaut astronaut, 27(4)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37502-6_96","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T18:26:12Z","timestamp":1676312772000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-37502-6_96"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642375019","9783642375026"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37502-6_96","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"8 May 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}