{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T08:07:28Z","timestamp":1649146048349},"reference-count":34,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[1989,12,1]],"date-time":"1989-12-01T00:00:00Z","timestamp":628473600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1989,12]]},"DOI":"10.1016\/0167-4048(89)90009-6","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T13:56:18Z","timestamp":1034344578000},"page":"709-720","source":"Crossref","is-referenced-by-count":1,"title":["Security architecture for data transfer through TCP\/IP protocols"],"prefix":"10.1016","volume":"8","author":[{"given":"Raju","family":"Ramaswamy","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(89)90009-6_BIB1","series-title":"Enhanced TCP\/IP WIN\/3B: Administrator Guide for the ATT 3B2 Computers, Document #308-320","author":"AT&T","year":"1986"},{"key":"10.1016\/0167-4048(89)90009-6_BIB2","series-title":"Enhanced TCP\/IP WIN\/3B: User Guide for the ATT 3B2 Computers, Document #308-323","author":"AT&T","year":"1986"},{"key":"10.1016\/0167-4048(89)90009-6_BIB3","series-title":"Enhanced TCP\/IP WIN\/3B: Programmer Reference Manual for the ATT 3B2 Computers, Document #308-325","author":"AT&T","year":"1986"},{"issue":"2","key":"10.1016\/0167-4048(89)90009-6_BIB4","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/378444.378449","article-title":"Security problems in the TCP\/IP protocol suite","volume":"19","author":"Bellovin","year":"1989","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"2","key":"10.1016\/0167-4048(89)90009-6_BIB5","article-title":"Considerations for security in the OSI architecture","volume":"1","author":"Brandstad","year":"1987","journal-title":"IEEE Network Mag."},{"key":"10.1016\/0167-4048(89)90009-6_BIB6","series-title":"Proc. 10th National Computer Security Conf.","first-page":"158","article-title":"SP4: A Transport Encapsulation Security Protocol","author":"Brandstad","year":"1987"},{"key":"10.1016\/0167-4048(89)90009-6_BIB7","series-title":"Proc. IEEE INFOCOM'87 Conf.","first-page":"693","article-title":"Data telecommunications: developing a security architecture","author":"Cohen","year":"1987"},{"key":"10.1016\/0167-4048(89)90009-6_BIB8","series-title":"Internetworking with TCP\/IP","author":"Comer","year":"1988"},{"key":"10.1016\/0167-4048(89)90009-6_BIB9","series-title":"Cryptography and Data Security","author":"Denning","year":"1983"},{"issue":"6","key":"10.1016\/0167-4048(89)90009-6_BIB10","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"IT-22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10.1016\/0167-4048(89)90009-6_BIB11","doi-asserted-by":"crossref","unstructured":"W. Diffie, Security for the DoD transmission control protocol, Advances in Cryptology, CRYPTO'85 Proc., Lecture Notes in Computer Science, # 218, Springer, Berlin, pp. 108\u2013127.","DOI":"10.1007\/3-540-39799-X_11"},{"issue":"5","key":"10.1016\/0167-4048(89)90009-6_BIB12","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/5.4442","article-title":"The first ten years of public-key cryptography","volume":"76","author":"Diffie","year":"1988","journal-title":"Proc. IEEE"},{"key":"10.1016\/0167-4048(89)90009-6_BIB13","series-title":"ISO-Information Processing Systems-Open Systems Basic Reference Model-ISO-7498","year":"1984"},{"key":"10.1016\/0167-4048(89)90009-6_BIB14","series-title":"ISO\/C97\/CS21 N931, Information Processing Systems\u2014Open Systems Interconnection\u2014Proposed Draft Addendum 2 to ISO 7498 on Security Architecture","year":"1988"},{"key":"10.1016\/0167-4048(89)90009-6_BIB15","series-title":"ISO-Information Processing Systems-Open Systems Interconnection-Transport Service Definition-ISO 8072","year":"1986"},{"key":"10.1016\/0167-4048(89)90009-6_BIB16","series-title":"ISO-Information Processing Systems-Open Systems Interconnection-Connection Oriented Transport Protocol Specification-ISO 8073","year":"1986"},{"key":"10.1016\/0167-4048(89)90009-6_BIB17","series-title":"Local Network Note","article-title":"Some Thoughts on TCP and Communication Security","author":"Kent","year":"1977"},{"issue":"3","key":"10.1016\/0167-4048(89)90009-6_BIB18","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/74674.74675","article-title":"Comments on security problems in the TCP\/IP protocol suite","volume":"19","author":"Kent","year":"1989","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"2","key":"10.1016\/0167-4048(89)90009-6_BIB19","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1147\/sj.172.0126","article-title":"Generation, distribution, and installation of cryptographic keys","volume":"17","author":"Matyas","year":"1978","journal-title":"IBM Syst. J."},{"key":"10.1016\/0167-4048(89)90009-6_BIB20","series-title":"Proc. 10th National Computer Security Conf.","first-page":"153","article-title":"Secure data network system (SDNS) services and architecture","author":"Nelson","year":"1987"},{"key":"10.1016\/0167-4048(89)90009-6_BIB21","series-title":"Proc. IEEE Symp. on Security and Privacy","first-page":"204","article-title":"Factors affecting distributed system security","author":"Nessett","year":"1986"},{"issue":"2","key":"10.1016\/0167-4048(89)90009-6_BIB22","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MNET.1987.6434186","article-title":"Public Key management for network security","volume":"1","author":"Newman","year":"1987","journal-title":"IEEE Network Mag."},{"issue":"4","key":"10.1016\/0167-4048(89)90009-6_BIB23","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1109\/49.17711","article-title":"Key distribution system based on identification information","volume":"7","author":"Okamoto","year":"1989","journal-title":"IEEE J. Selected Areas Commun."},{"key":"10.1016\/0167-4048(89)90009-6_BIB24","series-title":"Project Rep. CSTP-RR-88.1","article-title":"A secure communication system for integrated voice\/data packet networks","author":"Ramaswamy","year":"1988"},{"key":"10.1016\/0167-4048(89)90009-6_BIB25","series-title":"Proc. Int. Conf. on Computing and Information","article-title":"A scheme for providing security services on transport layer in open systems interconnection architecture","author":"Ramaswamy","year":"1989"},{"key":"10.1016\/0167-4048(89)90009-6_BIB26","series-title":"DoD Standard, Internet Protocol","year":"1981"},{"key":"10.1016\/0167-4048(89)90009-6_BIB27","series-title":"DoD Standard, Transmission Control Protocol","year":"1981"},{"key":"10.1016\/0167-4048(89)90009-6_BIB28","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(89)90009-6_BIB29","series-title":"Telecommunication Networks: Protocols, Modeling and Analysis","author":"Schwartz","year":"1987"},{"issue":"5","key":"10.1016\/0167-4048(89)90009-6_BIB30","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1109\/5.4441","article-title":"The data encryption standard: past and future","volume":"76","author":"Smid","year":"1988","journal-title":"Proc. IEEE"},{"key":"10.1016\/0167-4048(89)90009-6_BIB31","volume":"Volume 3","author":"Stallings","year":"1987"},{"issue":"7","key":"10.1016\/0167-4048(89)90009-6_BIB32","doi-asserted-by":"crossref","DOI":"10.1109\/MCOM.1985.1092606","article-title":"Security in high-level network protocols","volume":"23","author":"Voydock","year":"1985","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/0167-4048(89)90009-6_BIB33","series-title":"WIN\/TCP for VAX and MicroVAX MS Computers: Programmers Guide, WIN version # 3.0","year":"1987"},{"issue":"9","key":"10.1016\/0167-4048(89)90009-6_BIB34","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MC.1986.1663326","article-title":"A proposed standard format for RSA cryptosystems","volume":"19","author":"Zimmermann","year":"1986","journal-title":"IEEE Comput. Mag."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404889900096?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404889900096?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T15:17:55Z","timestamp":1583421475000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404889900096"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,12]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1989,12]]}},"alternative-id":["0167404889900096"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(89)90009-6","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1989,12]]}}}