{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T21:39:29Z","timestamp":1648935569623},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2009,4,21]],"date-time":"2009-04-21T00:00:00Z","timestamp":1240272000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s12243-009-0105-2","type":"journal-article","created":{"date-parts":[[2009,4,20]],"date-time":"2009-04-20T14:25:18Z","timestamp":1240237518000},"page":"325-338","source":"Crossref","is-referenced-by-count":0,"title":["Using tunneling techniques to realize virtual routers"],"prefix":"10.1007","volume":"64","author":[{"given":"Ting-Chao","family":"Hou","sequence":"first","affiliation":[]},{"given":"Ming-Chieh","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Chien-Tse","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,4,21]]},"reference":[{"key":"105_CR1","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/S1383-7621(99)00028-4","volume":"46","author":"J Aweya","year":"2000","unstructured":"Aweya J (2000) On the design of IP routers, part 1: router architectures. J Systems Archit 46:483\u2013511","journal-title":"J Systems Archit"},{"key":"105_CR2","doi-asserted-by":"crossref","unstructured":"Yang L et al (2004) Forwarding and control element separation (ForCES) framework, vol\u00a03746. IETF RFC","DOI":"10.17487\/rfc3746"},{"key":"105_CR3","doi-asserted-by":"crossref","unstructured":"Perkins C (1996) IP encapsulation within IP, vol\u00a02003. IETF RFC","DOI":"10.17487\/rfc2003"},{"key":"105_CR4","doi-asserted-by":"crossref","unstructured":"Hanks S et al (1994) Generic routing encapsulation (GRE), vol\u00a01701. IETF RFC","DOI":"10.17487\/rfc1701"},{"key":"105_CR5","doi-asserted-by":"crossref","unstructured":"Hanks S et al (1994) Generic routing encapsulation over IPv4 networks, vol\u00a01702. IETF RFC","DOI":"10.17487\/rfc1702"},{"key":"105_CR6","doi-asserted-by":"crossref","unstructured":"Kent S, Atkinson R (1998) Security architecture for the internet protocol, vol\u00a02401. IETF RFC","DOI":"10.17487\/rfc2401"},{"key":"105_CR7","doi-asserted-by":"crossref","unstructured":"Kent S, Atkinson R (1998) IP authentication header, vol\u00a02402. IETF RFC","DOI":"10.17487\/rfc2402"},{"key":"105_CR8","doi-asserted-by":"crossref","unstructured":"Kent S, Atkinson R (1998) IP encapsulating security payload (ESP), vol\u00a02406. IETF RFC","DOI":"10.17487\/rfc2406"},{"key":"105_CR9","doi-asserted-by":"crossref","unstructured":"Harkins D, Carrel D (1998) The internet key exchange (IKE), vol\u00a02409. IETF RFC","DOI":"10.17487\/rfc2409"},{"key":"105_CR10","doi-asserted-by":"crossref","unstructured":"Townsley W et al (1999) Layer two tunneling protocol (L2TP), vol\u00a02661. IETF RFC","DOI":"10.17487\/rfc2661"},{"key":"105_CR11","unstructured":"Ishiguro K et al (2006) A routing software package for TCP\/IP networks (Quagga 0.99.4). www.quagga.net"},{"key":"105_CR12","doi-asserted-by":"crossref","unstructured":"Moy J (1998) OSPF version 2, vol\u00a02328. IETF RFC","DOI":"10.17487\/rfc2328"},{"key":"105_CR13","doi-asserted-by":"crossref","unstructured":"Coltun R et al (1999) OSPF for IPv6, vol\u00a02740. IETF RFC","DOI":"10.17487\/rfc2740"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-009-0105-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-009-0105-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-009-0105-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T06:38:00Z","timestamp":1559457480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-009-0105-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,21]]},"references-count":13,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["105"],"URL":"https:\/\/doi.org\/10.1007\/s12243-009-0105-2","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,4,21]]}}}