{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T02:31:42Z","timestamp":1722911502382},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ccnc.2006.1593123","type":"proceedings-article","created":{"date-parts":[[2006,2,15]],"date-time":"2006-02-15T19:29:31Z","timestamp":1140031771000},"page":"676-680","source":"Crossref","is-referenced-by-count":0,"title":["Scheduling small packets in IPSec-based systems"],"prefix":"10.1109","volume":"2","author":[{"given":"A.V.","family":"Taddeo","sequence":"first","affiliation":[]},{"given":"A.","family":"Ferrante","sequence":"additional","affiliation":[]},{"given":"V.","family":"Piuri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The internet traffic archive","year":"2000","key":"19"},{"key":"17","article-title":"The TLS protocol version 1.0 - RFC 2246","author":"dierks","year":"1999","journal-title":"IETF RFC"},{"journal-title":"SystemC Official Website","year":"0","key":"18"},{"journal-title":"PCI Comparison 32 Vs 64-bit and 33MHz Vs 66MHz","year":"2002","key":"15"},{"key":"16","article-title":"The AES-CBC cipher algorithm and its use with IPsec - RFC 3602","author":"frankel","year":"2003","journal-title":"IETF RFC"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2004.1342487"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1062261.1062298"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860875-7.50027-2"},{"key":"12","article-title":"Packet length distributions at NASA Ames Internet Exchange (AIX)","author":"mccreary","year":"0","journal-title":"Internet Analisys of the Cooperative Association for Internet Data Analysis (CAIDA)"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2004.10024"},{"journal-title":"IETF RFC","article-title":"IP Encapsulating Security Payload (ESP) - RFC2406","year":"1998","key":"3"},{"journal-title":"Tcpdump public repository","year":"0","key":"20"},{"journal-title":"IETF RFC","article-title":"IP authentication header - RFC2402","year":"1998","key":"2"},{"key":"1","article-title":"Security architecture for the Internet protocol - RFC2401","author":"kent","year":"1998","journal-title":"IETF RFC"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2003.1220692"},{"key":"7","article-title":"A study of the relative costs of network security protocols","author":"miltchev","year":"2002","journal-title":"Proceedings of the USENIX Annual Technical Program"},{"journal-title":"Virtual Private Networks","year":"2001","author":"yuan","key":"6"},{"journal-title":"Secure Networking with Windows 2000 and Trust Services","year":"2001","author":"feghhi","key":"5"},{"key":"4","article-title":"The Internet Key Exchange (IKE) - RFC2409","author":"harkins","year":"1998","journal-title":"IETF RFC"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/NGI.2005.1431672"},{"key":"8","article-title":"Performance evaluation of data transmission using IPSec over IPv6 networks","author":"ariga","year":"2000","journal-title":"INET"}],"event":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","location":"Las Vegas, NV, USA"},"container-title":["CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10599\/33506\/01593123.pdf?arnumber=1593123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T20:08:31Z","timestamp":1489522111000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1593123\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2006.1593123","relation":{},"subject":[]}}