{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:24:18Z","timestamp":1755221058072,"version":"3.43.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[1997,8,1]],"date-time":"1997-08-01T00:00:00Z","timestamp":870393600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1997,8,1]],"date-time":"1997-08-01T00:00:00Z","timestamp":870393600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommunication Systems"],"published-print":{"date-parts":[[1997,8]]},"DOI":"10.1023\/a:1019192916871","type":"journal-article","created":{"date-parts":[[2003,2,19]],"date-time":"2003-02-19T18:30:27Z","timestamp":1045679427000},"page":"391-408","source":"Crossref","is-referenced-by-count":1,"title":["ATM cell encryption and key update synchronization"],"prefix":"10.1007","volume":"7","author":[{"given":"James P.","family":"Gray","sequence":"first","affiliation":[]},{"given":"Ajay D.","family":"Kshemkalyani","sequence":"additional","affiliation":[]},{"given":"Stephan M.","family":"Matyas","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Peyravian","sequence":"additional","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"329660_CR1","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/35.20262","volume":"27","author":"R. Ballart","year":"1989","unstructured":"R. Ballart and C. Ching, SONET: now it's the standard optical network, IEEE Communications 27(3) (March 1989) 8\u201315.","journal-title":"IEEE Communications"},{"key":"329660_CR2","volume-title":"Data Networks","author":"D. Bertsekas","year":"1987","unstructured":"D. Bertsekas and R. Gallager, Data Networks (Prentice-Hall, Englewood Cliffs, NJ, 1987)."},{"key":"329660_CR3","unstructured":"S. Chuang, Securing ATM networks, Technical Report, University of Cambridge Computer Laboratory (October 1995). Available from http:\/\/www.cl.cam.ac.uk\/Research\/SRG\/greenbook.html."},{"key":"329660_CR4","unstructured":"Data Encryption Standard, Ferderal Information Processing Standards, U.S. National Bureau of Standards (FIPS PUB) 46 (January 1977)."},{"key":"329660_CR5","doi-asserted-by":"crossref","unstructured":"R. Deng, L. Gong and A. Lazar, Securing data transfer in asynchronous transfer mode networks, in: '95 (November 1995) pp. 1198\u20131202. Full paper appears as TR95\u2013189, Institut of Systems Science, National University of Singapore (1995).","DOI":"10.1109\/GLOCOM.1995.502593"},{"key":"329660_CR6","volume-title":"Cryptography and Data Security","author":"D. Denning","year":"1982","unstructured":"D. Denning, Cryptography and Data Security (Addison-Wesley, Reading, MA, 1982)."},{"issue":"3","key":"329660_CR7","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/356778.356782","volume":"11","author":"D. Denning","year":"1979","unstructured":"D. Denning and P. Denning, Data security, ACM Computing Surveys 11(3) (September 1979) 227\u2013249.","journal-title":"ACM Computing Surveys"},{"key":"329660_CR8","unstructured":"DES Modes of Operation, Ferderal Information Processing Standards, U.S. National Bureau of Standards, (FIPS PUB) 81 (December 1980)."},{"issue":"6","key":"329660_CR9","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"W. Diffie and M. Hellman, Exhaustive cryptoanalysis of the NBS data encryption standards, IEEE Computer 10(6) (June 1977) 74\u201384.","journal-title":"IEEE Computer"},{"key":"329660_CR10","volume-title":"Computers and Interactability","author":"M.R. Garey","year":"1979","unstructured":"M.R. Garey and D.S. Johnson, Computers and Interactability (Freeman, San Francisco, CA, 1979)."},{"issue":"2","key":"329660_CR11","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences 28(2) (April 1984) 270\u2013299.","journal-title":"Journal of Computer and System Sciences"},{"key":"329660_CR12","unstructured":"ITU TSS Study Groups 13, Contribution Number T1S1.5\/93\u2013181 (1993)."},{"key":"329660_CR13","unstructured":"B. Lyles, Authenticated signaling for ATM, T1S1.5\/94\u2013118, Xerox Parc (1994)."},{"key":"329660_CR14","volume-title":"ATM: Theory and Application","author":"D.E. McDysan","year":"1994","unstructured":"D.E. McDysan and D.L. Spohn, ATM: Theory and Application (McGraw-Hill, New York, 1994)."},{"key":"329660_CR15","unstructured":"M. Nelson, The Data Compression Book, 2nd. edition (1995)."},{"key":"329660_CR16","unstructured":"Phase I ATM security specification (draft), ATM Forum\/95\u20131473R5 (August 1996)."},{"key":"329660_CR17","unstructured":"PNNI draft specification, ATM Forum 95\u20130471R14 (December 1995)."},{"issue":"4","key":"329660_CR18","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1145\/356789.356794","volume":"11","author":"G. Popek","year":"1979","unstructured":"G. Popek and C. Kline, Encryption and secure computer networks, ACM Computing Surveys 11(4) (December 1979) 331\u2013356.","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"329660_CR19","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM 21(2) (February 1978) 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"329660_CR20","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1994","unstructured":"B. Schneier, Applied Cryptography (Wiley, New York, 1994)."},{"key":"329660_CR21","volume-title":"Cryptography: An Introduction to Computer Security","author":"J. Seberry","year":"1989","unstructured":"J. Seberry and J. Pieprzyk, Cryptography: An Introduction to Computer Security (Prentice-Hall, Englewood Cliffs, NJ, 1989)."},{"issue":"4","key":"329660_CR22","first-page":"656","volume":"28","author":"C. Shannon","year":"1949","unstructured":"C. Shannon, Communication theory of secrecy systems, Bell Systems Journal 28(4) (October 1949) 656\u2013715.","journal-title":"Bell Systems Journal"},{"key":"329660_CR23","unstructured":"J. Steiner, C. Neuman and J. Schiller, Kerberos: An authentication service for open network system, in: Proc. of the Winter USENIX Conf. (February 1988)."},{"issue":"2","key":"329660_CR24","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/204826.204844","volume":"38","author":"D. Stevenson","year":"1995","unstructured":"D. Stevenson, N. Hillery and G. Byrd, Secure communication in ATM networks, Communications of the ACM 38(2) 45\u201352 (February 1995).","journal-title":"Communications of the ACM"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019192916871.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1019192916871\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019192916871.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T06:25:02Z","timestamp":1754634302000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1019192916871"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,8]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1997,8]]}},"alternative-id":["329660"],"URL":"https:\/\/doi.org\/10.1023\/a:1019192916871","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[1997,8]]}}}