{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T13:30:59Z","timestamp":1673530259364},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2009,3,25]],"date-time":"2009-03-25T00:00:00Z","timestamp":1237939200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s12243-009-0089-y","type":"journal-article","created":{"date-parts":[[2009,3,24]],"date-time":"2009-03-24T14:10:33Z","timestamp":1237903833000},"page":"391-400","source":"Crossref","is-referenced-by-count":5,"title":["MPLS security: an approach for unicast and multicast environments"],"prefix":"10.1007","volume":"64","author":[{"given":"Sahel","family":"Alouneh","sequence":"first","affiliation":[]},{"given":"Abdeslam","family":"En-Nouaary","sequence":"additional","affiliation":[]},{"given":"Anjali","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,3,25]]},"reference":[{"key":"89_CR1","doi-asserted-by":"crossref","unstructured":"Andersson L, Doolan P, Feldman N, Fredette A, Thomas B (2001) \u201cLDP Specification\u201d, IETF, RFC 3036, 2001","DOI":"10.17487\/rfc3036"},{"key":"89_CR2","doi-asserted-by":"crossref","unstructured":"Asmuth C (1983) A modular approach to key safeguarding. IEEE Transactions on Information Theory IT-29(2)","DOI":"10.1109\/TIT.1983.1056651"},{"key":"89_CR3","doi-asserted-by":"crossref","unstructured":"Awduche D, Malcolm (1999) J Requirements for Traffic Engineering over MPLS RFC 2702","DOI":"10.17487\/rfc2702"},{"key":"89_CR4","doi-asserted-by":"crossref","unstructured":"Barlow D, Vassilio V, Owen H (2003) A cryptographic protocol to protect MPLS Labels. Proceeding of IEEE Workshop of Information Assurance","DOI":"10.1109\/SMCSIA.2003.1232428"},{"key":"89_CR5","volume-title":"MPLS VPN-Security","author":"M Behringer","year":"2005","unstructured":"Behringer M, Morrow MJ (2005) MPLS VPN-Security. Cisco, Indianapolis"},{"key":"89_CR6","doi-asserted-by":"crossref","unstructured":"Blakley GR (1979) Safeguarding cryptographic keys. Proceedings of the National Computer Conference, 1979, American Federation of Information Processing Societies 48:","DOI":"10.1109\/MARK.1979.8817296"},{"key":"89_CR7","doi-asserted-by":"crossref","unstructured":"Blesa M, Blum C (2004) Ant colony optimization for the- maximum edge-disjoint paths problem. In: Raidl et al. (ed). 1st (EvoCOMNET'04), volume 3005f of Lecture Notes in Computer Science, pages 160\u2013169, Coimbra","DOI":"10.1007\/978-3-540-24653-4_17"},{"key":"89_CR8","unstructured":"Chung J, Panguluru S, Garcia R (2002) Multiple LSP routing network security for MPLS networking. IEEE-MWSCAS"},{"key":"89_CR9","unstructured":"GMP \u201cGNU Multiple Precision Arithmetic Library\u201d, http:\/\/www.swox.com\/gmp\/ ."},{"key":"89_CR10","unstructured":"Lou W, Fang Y (2001) A multipath routing approach for secure data delivery. IEEE Milcom\u201901, 2001"},{"key":"89_CR11","unstructured":"Lewis M (2005) Troubleshooting any transport over MPLS based VPNs. Cisco Press article"},{"key":"89_CR12","unstructured":"MPLS World Congress (\u20192006, \u20192007)."},{"key":"89_CR13","doi-asserted-by":"crossref","unstructured":"Ramaswamy R, Weng N, Wolf T (2003) Considering processing cost in network simulations\u201d, Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research, Germany","DOI":"10.1145\/944773.944782"},{"key":"89_CR14","unstructured":"Rosen E, Viswanathan A, Callon R (2001) Multi-protocol label switching architecture. IETF, RFC 3031"},{"key":"89_CR15","unstructured":"Ren R, Feng D, Ma K (2004) A detailed implement and analysis of MPLS VPN based on IPSEC\u201d, Proceeding of the IEEE Third International Conference on Machine Learning and Cybernetics, Shanghai"},{"key":"89_CR16","doi-asserted-by":"crossref","unstructured":"Saad T, Alawieh B, Mouftah H (2006) Tunneling techniques for end-to-end VPNs: Generic deployment in an optical testbed environment. IEEE Communication Magazine","DOI":"10.1109\/MCOM.2006.1637957"},{"key":"89_CR17","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"24","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 24:612\u2013613","journal-title":"Commun ACM"},{"key":"89_CR18","volume-title":"Applied cryptography, 2nd edn. Chapters 3 and 23","author":"B Schneier","year":"1996","unstructured":"Schneier B (1996) Applied cryptography, 2nd edn. Chapters 3 and 23. Wiley, New York"},{"key":"89_CR19","doi-asserted-by":"crossref","unstructured":"Sidhu D, Nair R, Abdallah S (1991) Finding disjoint paths in networks\u201d, proceeding ACM-SIGCOMM\u201991 Symposium,","DOI":"10.1145\/115992.115998"},{"key":"89_CR20","volume-title":"Survivable networks","author":"R Bhandari","year":"1999","unstructured":"Bhandari R (1999) Survivable networks. algorithms for diverse routing, Kluwer, New York"},{"issue":"3","key":"89_CR21","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1145\/322203.322207","volume":"27","author":"Y Shiloach","year":"1980","unstructured":"Shiloach Y (1980) A polynomial solution to the undirected two paths problem. JACM 27(3):445\u2013456","journal-title":"JACM"},{"key":"89_CR22","unstructured":"Lee H, Hwang J, Kang B, Jun K (2000)End-to-end QoS architecture for VPNs: MPLS VPN deployment in a backbone network. Proceedings the International Workshops on Parallel Processing, Canada pp. 479\u2013483"},{"key":"89_CR23","doi-asserted-by":"crossref","unstructured":"Iwaki M, Toraichi K, Ishii R (1993) Fast polynomial interpolation for Remez exchange method. IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 411\u2013414, 1993","DOI":"10.1109\/PACRIM.1993.407334"},{"issue":"5","key":"89_CR24","first-page":"1","volume":"2","author":"F Palmieri","year":"2007","unstructured":"Palmieri F (2007) Fiore U (2007) Enhanced security strategies for MPLS signaling. J Netw 2(5):1\u201313","journal-title":"J Netw"},{"key":"89_CR25","doi-asserted-by":"crossref","unstructured":"Palmieri F, Fiore U (2005) Securing the MPLS Control Plane. HPCC 2005, LNCS 3726, Springer, pp. 511\u2013523","DOI":"10.1007\/11557654_60"},{"key":"89_CR26","unstructured":"Finite Field Arithmetic, http:\/\/www.springer.com\/?SGWID=2-102-45-110359-4 , Chapter 2, (last time accessed May, 2008)."},{"key":"89_CR27","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s10550-006-0040-y","volume":"24","author":"B Harman","year":"2006","unstructured":"Harman B, Burness L, Corliano G, Murgu A, El-moussa F, He L (2006) Securing network availability. BT Technol J 24:65\u201371","journal-title":"BT Technol J"},{"key":"89_CR28","unstructured":"S. Avallone, V. Manetti, M. Mariano, S. Romano (2007) A splitting infrastructure for load balancing and security in an MPLS network\u201d, 3rd international conference on testbeds and research infrastructure for the development of networks and communities, pp. 1\u20136"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-009-0089-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-009-0089-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-009-0089-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T01:47:02Z","timestamp":1589680022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-009-0089-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,25]]},"references-count":28,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["89"],"URL":"https:\/\/doi.org\/10.1007\/s12243-009-0089-y","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,3,25]]}}}