{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:48:56Z","timestamp":1725572936742},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/ccece.2009.5090095","type":"proceedings-article","created":{"date-parts":[[2009,6,29]],"date-time":"2009-06-29T02:25:58Z","timestamp":1246242358000},"page":"71-76","source":"Crossref","is-referenced-by-count":4,"title":["A framework for implementing IPSec functional architecture"],"prefix":"10.1109","author":[{"given":"M.","family":"Fahandezh","sequence":"first","affiliation":[]},{"given":"M.","family":"Bondy","sequence":"additional","affiliation":[]},{"given":"S.","family":"Erfani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"the cast-128 encryption algorithm","author":"adams","year":"1997","journal-title":"RFC 2144"},{"key":"22","article-title":"the md5 message-digest algorithm","author":"rivest","year":"1992","journal-title":"RFC 1321"},{"key":"17","article-title":"the rc5 encryption algorithm","author":"rivest","year":"1995","journal-title":"Dr Dobb's Journal"},{"journal-title":"PUB 180-1","article-title":"secure hash standard","year":"1995","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_2"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1176985"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"2006","author":"stallings","key":"15"},{"key":"16","article-title":"the rc5 encryption algorithm","author":"rivest","year":"1994","journal-title":"Second International Workshop on Fast Software Encryption"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/800116.803773"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0022-314X(80)90084-0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"PUB 186","article-title":"digital signature standard","year":"1993","key":"12"},{"key":"21","article-title":"the blowfish encryption algorithm","author":"schneier","year":"1994","journal-title":"Dr Dobb's Journal"},{"key":"3","article-title":"ip authentication header","author":"kent","year":"1998","journal-title":"RFC 2402"},{"key":"20","article-title":"description of a new variable-length key, 64-bit block cipher (blowfish)","author":"schneier","year":"1993","journal-title":"Workshop on Fast Software Encryption"},{"key":"2","article-title":"security architecture for the internet protocol","author":"kent","year":"1998","journal-title":"RFC 2401"},{"article-title":"security management system and method","year":"2003","author":"erfani","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"7","article-title":"88-558: network security course notes","author":"erfani","year":"2007","journal-title":"Department of Electrical and Computer Engineering"},{"key":"6","article-title":"the internet key exchange (ike)","author":"harkins","year":"1998","journal-title":"RFC 2409"},{"key":"5","article-title":"internet security association and key management protocol (isakmp)","author":"maughan","year":"1998","journal-title":"RFC 2408"},{"key":"4","article-title":"ip encapsulating security payload (esp)","author":"kent","year":"1998","journal-title":"RFC 2406"},{"key":"9","article-title":"hmac: keyed-hashing for message authentication","author":"krawczyk","year":"1997","journal-title":"RFC 2104"},{"journal-title":"Network Security Essentials Applications and Standards","year":"2007","author":"stallings","key":"8"}],"event":{"name":"2009 Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2009,5,3]]},"location":"St. John's, NL, Canada","end":{"date-parts":[[2009,5,6]]}},"container-title":["2009 Canadian Conference on Electrical and Computer Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5075165\/5090078\/05090095.pdf?arnumber=5090095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T04:58:09Z","timestamp":1489813089000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5090095\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ccece.2009.5090095","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}