{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T15:06:04Z","timestamp":1743347164007},"reference-count":18,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2001,3,1]],"date-time":"2001-03-01T00:00:00Z","timestamp":983404800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Technical Report"],"published-print":{"date-parts":[[2001,3]]},"DOI":"10.1016\/s1363-4127(01)00107-8","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T13:19:59Z","timestamp":1027603199000},"page":"49-64","source":"Crossref","is-referenced-by-count":1,"title":["VPNs and Lightweight Clients"],"prefix":"10.1016","volume":"6","author":[{"given":"Samantha","family":"Donovan","sequence":"first","affiliation":[]},{"given":"Peter","family":"Drabwell","sequence":"additional","affiliation":[]},{"given":"Rae","family":"Harbird","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1363-4127(01)00107-8_BIB1","unstructured":"Crypto Research at Certicom Corporation, www.certicom.com"},{"key":"10.1016\/S1363-4127(01)00107-8_BIB2","unstructured":"VPN Client at Certicom Corporation, www.certicom.com"},{"key":"10.1016\/S1363-4127(01)00107-8_BIB3","unstructured":"Eric Chien, Virus Bulletin Conference, Palm Beach, FA, USA, July 2000."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB4","unstructured":"Meng Yuan Huang, Investigation of the Efficiency of the Elliptic Curve Cryptosystem for Multi-application Smart Card, IEEE Knowledge-Based Intelligent Systems, 1998."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB5","unstructured":"Bruce Schneier, Applied Cryptography, Second Edition, 1996."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB6","doi-asserted-by":"crossref","unstructured":"Frank Stajano and Ross Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, April 1999.","DOI":"10.1007\/10720107_24"},{"key":"10.1016\/S1363-4127(01)00107-8_BIB7","doi-asserted-by":"crossref","unstructured":"Frank Stajano, The Resurrecting Duckling: what next? May 1999.","DOI":"10.1007\/10720107_25"},{"key":"10.1016\/S1363-4127(01)00107-8_BIB8","unstructured":"Howard C. Berkowitz, Requirements Taxonomy for Virtual Private Networks (draft-berkowitz-vpn-tax-00.txt), 1999."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB9","doi-asserted-by":"crossref","unstructured":"Ian Brown and Ben Laurie, Security Against Compelled Disclosure, December 2000.","DOI":"10.1109\/ACSAC.2000.898852"},{"key":"10.1016\/S1363-4127(01)00107-8_BIB10","unstructured":"draft-mamros-pskeyext-00.txt, Mamros (Expired)."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB11","unstructured":"ietf-IPsec-isakmp-xauth-06.txt, R. Pereira, S. Beaulieu (Expired)."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB12","unstructured":"IKE\/ISAKMP considered Harmful, Simpson, Usenix, ;login, December 1999."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB13","unstructured":"Weak Authentication in XAUTH and IKE, Pliam, discussion from IPsec mailing list from 19 August 1999 to 23 August 1999."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB14","unstructured":"draft-ietf-IPsec-isakmp-hybrid-auth-05.txt, Litvin."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB15","unstructured":"draft-orman-public-key-lengths-01.txt, Orman."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB16","unstructured":"draft-ietf-ipsra-reqmts-00.txt, Kelly, Ramamoorthi, March 2000."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB17","unstructured":"draft-jacquenet-ip-vpn-needs-00.txt, Jacquenet, July 2000."},{"key":"10.1016\/S1363-4127(01)00107-8_BIB18","unstructured":"PalmOS Password Retrieval and Decoding (A092600-1), Atstake Advisory, Neohapsis Archives, http:\/\/archives.neohapsis.com\/archives\/bugtraq\/2000-12\/0314.html"}],"container-title":["Information Security Technical Report"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1363412701001078?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1363412701001078?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,13]],"date-time":"2020-01-13T02:58:41Z","timestamp":1578884321000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1363412701001078"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,3]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2001,3]]}},"alternative-id":["S1363412701001078"],"URL":"https:\/\/doi.org\/10.1016\/s1363-4127(01)00107-8","relation":{},"ISSN":["1363-4127"],"issn-type":[{"value":"1363-4127","type":"print"}],"subject":[],"published":{"date-parts":[[2001,3]]}}}