{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:42:40Z","timestamp":1725727360319},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642388644"},{"type":"electronic","value":"9783642388651"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38865-1_27","type":"book-chapter","created":{"date-parts":[[2013,5,26]],"date-time":"2013-05-26T21:42:02Z","timestamp":1369604522000},"page":"258-267","source":"Crossref","is-referenced-by-count":1,"title":["Extending the TLS Protocol by EAP Handshake to Build a Security Architecture for Heterogenous Wireless Network"],"prefix":"10.1007","author":[{"given":"Krzysztof","family":"Grochla","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Stolarz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: RFC 4346: The Transport Layer Security (TLS) Protocol. Version 1.1 (April 2006)","key":"27_CR1","DOI":"10.17487\/rfc4346"},{"unstructured":"Freier, A., Kocher, P., Karlton, P.: The Secure Sockets Layer (SSL) Protocol Version 3.0, \n                  \n                    http:\/\/tools.ietf.org\/html\/rfc6101","key":"27_CR2"},{"unstructured":"Information technology \u2013 Open Systems Interconnection \u2013 The Directory: Public-key and attribute certificate frameworks. ISO\/IEC standard 9594-8:2005","key":"27_CR3"},{"unstructured":"Aboba, B., Levkowetz, H., Vollbrecht, J.R., Blunk, L.J., Carlson, J.: Extensible Authentication Protocol (EAP), \n                  \n                    http:\/\/tools.ietf.org\/html\/rfc3748","key":"27_CR4"},{"unstructured":"Tschofenig, H., Sheffer, Y., Nir, Y., Gutmann, P.: A Flexible Authentication Framework for the Transport Layer Security (TLS) Protocol using the Extensible Authentication Protocol (EAP), \n                  \n                    http:\/\/tools.ietf.org\/html\/draft-nir-tls-eap-13","key":"27_CR5"},{"unstructured":"Aboba, B., Simon, D.: PPP EAP TLS Authentication Protocol, \n                  \n                    http:\/\/tools.ietf.org\/html\/rfc2716","key":"27_CR6"},{"unstructured":"Funk, P., Blake-Wilson, S.: EAP Tunneled TLS Authentication Protocol, \n                  \n                    http:\/\/tools.ietf.org\/html\/draft-ietf-pppext-eap-ttls-05","key":"27_CR7"},{"unstructured":"Zorn, G., Palekar, A., Simon, D., Josefsson, S.: Protected EAP Protocol (PEAP) Version 2, \n                  \n                    http:\/\/tools.ietf.org\/html\/draft-josefsson-pppext-eap-tls-eap-10","key":"27_CR8"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/11542322_6","volume-title":"Security Protocols","author":"N. Asokan","year":"2005","unstructured":"Asokan, N., Niemi, V., Nyberg, K.: Man-in-the-middle in tunnelled authentication protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol.\u00a03364, pp. 28\u201341. Springer, Heidelberg (2005)"},{"unstructured":"Bidgoli, H.: Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations, vol.\u00a02. Wiley (2006)","key":"27_CR10"}],"container-title":["Communications in Computer and Information Science","Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38865-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T03:12:10Z","timestamp":1557717130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38865-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642388644","9783642388651"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38865-1_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}