{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T06:29:02Z","timestamp":1744871342759},"reference-count":32,"publisher":"Elsevier BV","issue":"1-6","license":[{"start":{"date-parts":[[2000,6,1]],"date-time":"2000-06-01T00:00:00Z","timestamp":959817600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2000,6]]},"DOI":"10.1016\/s1389-1286(00)00084-0","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T15:58:42Z","timestamp":1027612722000},"page":"789-802","source":"Crossref","is-referenced-by-count":5,"title":["MicroISPs: providing convenient and low-cost high-bandwidth Internet access"],"prefix":"10.1016","volume":"33","author":[{"given":"Jos\u00e9","family":"Brustoloni","sequence":"first","affiliation":[]},{"given":"Juan","family":"Garay","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(00)00084-0_BIB1","doi-asserted-by":"crossref","unstructured":"M. Bellare, R. Canetti and H. Krawczyk, Keyed hash functions and message authentication, in: N. Koblitz (Ed.), Advances in Cryptology \u2014 Crypto \u201996, Lecture Notes in Computer Science 1109, Springer-Verlag, Berlin, 1996, pp. 1\u201315.","DOI":"10.1007\/3-540-68697-5_1"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB2","doi-asserted-by":"crossref","unstructured":"J. Brustoloni and J. Garay, Application-independent end-to-end security in shared-link access networks, in: Proc. IFIP Networking'2000, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2000.","DOI":"10.1007\/3-540-45551-5_51"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB3","unstructured":"CyberCash, Home page at http:\/\/www.CyberCash.com\/."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB4","unstructured":"Data-Over-Cable Service Interface Specifications, Baseline Privacy Plus Interface Specification, SP-BPI+-101-990316, CableLabs, 1999, available at http:\/\/www.cablemodem.com."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB5","doi-asserted-by":"crossref","unstructured":"T. Dierks and C. Allen, The TLS Protocol Version 1.0, IETF, RFC 2246, Jan. 1999.","DOI":"10.17487\/rfc2246"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB6","doi-asserted-by":"crossref","unstructured":"W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory IT-22 (1976) 644\u2013654.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB7","unstructured":"N. Doraswamy and D. Harkins, IPSec: The New Security Standard for the Internet, Intranets and Virtual Private Networks, Prentice-Hall, Englewood Cliffs, NJ, 1st ed., 1999."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB8","doi-asserted-by":"crossref","unstructured":"R. Droms, Dynamic Host Configuration Protocol, IETF, RFC 2131, Mar. 1997.","DOI":"10.17487\/rfc2131"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB9","unstructured":"eCash Technologies, Inc., Home page at http:\/\/www.ecashtechnologies.com\/."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB10","unstructured":"FreeS\/WAN, Homepage at http:\/\/www.xs4all.nl\/\u223cfreeswan\/."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB11","unstructured":"A. Freier, P. Karlton and P. Kocher, The SSL Protocol Version 3.0, Netscape, Mar. 1996, available at http:\/\/home.netscape.com\/eng\/ssl3\/ssl-toc.html."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB12","doi-asserted-by":"crossref","unstructured":"S. Glassman, M. Manasse, M. Abadi, P. Gauthier and P. Sobalvarro, The Millicent protocol for inexpensive electronic commerce, in: Proc. 4th International World Wide Web Conference, W3C, Boston, MA, Dec. 1995, available at http:\/\/www.w3.org\/conferences\/WWW4\/.","DOI":"10.1145\/3592626.3592675"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB13","doi-asserted-by":"crossref","unstructured":"R. Glenn and S. Kent, The NULL Encryption Algorithm and its Use with IPsec, IETF, RFC 2410, Nov. 1998.","DOI":"10.17487\/rfc2410"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB14","unstructured":"J. Hardin, Linux VPN Masquerade, Homepage at http:\/\/www.wolfenet.com\/\u223cjhardin\/ip_masq_vpn.html."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB15","doi-asserted-by":"crossref","unstructured":"D. Harkins and D. Carrel, The Internet Key Exchange (IKE), IETF, RFC 2409, Nov. 1998.","DOI":"10.17487\/rfc2409"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB16","unstructured":"A. Herzberg and H. Yochai, MiniPay: charging per click on the Web, in: Proc. 6th International World Wide Web Conference, W3C, Santa Clara, CA, 1997, available at http:\/\/www.scope.gmd.de\/info\/www6\/, Now called IBM Micro Payments, Home page at http:\/\/www.hrl.il.ibm.com\/mpay\/."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB17","doi-asserted-by":"crossref","unstructured":"R. Housley, W. Ford, W. Polk and D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, IETF, RFC 2459, Jan. 1999.","DOI":"10.17487\/rfc2459"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB18","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson, IP Authentication Header, IETF, RFC 2402, Nov. 1998.","DOI":"10.17487\/rfc2402"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB19","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson, Security Architecture for the Internet Protocol, IETF, RFC 2401, Nov. 1998.","DOI":"10.17487\/rfc2401"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB20","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson, IP Encapsulating Security Payload (ESP), IETF, RFC 2406, Nov. 1998.","DOI":"10.17487\/rfc2406"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB21","doi-asserted-by":"crossref","unstructured":"C. Madson and N. Doraswamy, The ESP DES-CBC Cipher Algorithm with Explicit IV, IETF, RFC 2405, Nov. 1998.","DOI":"10.17487\/rfc2405"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB22","doi-asserted-by":"crossref","unstructured":"C. Madson and R. Glenn, The Use of HMAC-MD5-96 within ESP and AH, IETF, RFC 2403, Nov. 1998.","DOI":"10.17487\/rfc2403"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB23","doi-asserted-by":"crossref","unstructured":"D. Maughan, M. Schertler, M. Schneider and J. Turner, Internet Security Association and Key Management Protocol (ISAKMP), IETF, RFC 2408, Nov. 1998.","DOI":"10.17487\/rfc2408"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB24","doi-asserted-by":"crossref","unstructured":"Y. Rekhter, B. Moskowitz, D. Karrenberg, G.J. de Groot and E. Lear, Address Allocation for Private Internets, IETF, RFC 1918, Feb. 1996.","DOI":"10.17487\/rfc1918"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB25","doi-asserted-by":"crossref","unstructured":"R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21 (2) (1978).","DOI":"10.1145\/359340.359342"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB26","unstructured":"B. Schneier, Applied Cryptography, Wiley, New York, 1996, 2nd ed."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB27","unstructured":"Secure Electronic Marketplace for Europe (SEMPER), Homepage at http:\/\/www.semper.org\/."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB28","unstructured":"SET, Homepage at http:\/\/www.setco.org\/."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB29","doi-asserted-by":"crossref","unstructured":"P. Srisuresh and M. Holdrege, IP Network Address Translator (NAT) Technology and Considerations, IETF, RFC 2663, Aug. 1999.","DOI":"10.17487\/rfc2663"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB30","doi-asserted-by":"crossref","unstructured":"G. Tsudik, Message authentication with one-way hash functions, in: Proc. INFOCOM \u201992, IEEE, 1992, pp. 2055\u20132059.","DOI":"10.1109\/INFCOM.1992.263477"},{"key":"10.1016\/S1389-1286(00)00084-0_BIB31","unstructured":"W3C Joint Electronic Payments Initiative (JEPI), Homepage at http:\/\/www13.w3.org\/ECommerce\/Overview-JEPI.html."},{"key":"10.1016\/S1389-1286(00)00084-0_BIB32","unstructured":"Recommendation X.509 (1197 E), Information Technology \u2014 Open Systems Interconnection \u2014 The Directory: Authentication Framework, ITU-T."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600000840?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600000840?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,12,31]],"date-time":"2023-12-31T17:41:13Z","timestamp":1704044473000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128600000840"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,6]]},"references-count":32,"journal-issue":{"issue":"1-6","published-print":{"date-parts":[[2000,6]]}},"alternative-id":["S1389128600000840"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(00)00084-0","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2000,6]]}}}