{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T22:09:14Z","timestamp":1725401354448},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1109\/comswa.2008.4554433","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T15:19:59Z","timestamp":1215098399000},"page":"318-326","source":"Crossref","is-referenced-by-count":0,"title":["On implementing security at the transport layer"],"prefix":"10.1109","author":[{"given":"Swaminathan","family":"Pichumani","sequence":"first","affiliation":[]},{"given":"Sneha Kumar","family":"Kasera","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"The IP Network Address Translator (NAT)","author":"egevang","year":"1994","journal-title":"RFC 1631"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945447"},{"article-title":"Tcpsec: A Transport Layer Security Framework","year":"2006","author":"pichumani","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/55483.55524"},{"key":"ref14","article-title":"The Order of Encryption and Authentication for protecting communication (or: How secure is ssl?)","author":"krawczyk","year":"2001","journal-title":"Proc Adv Cryptology?Crypto"},{"key":"ref15","article-title":"IPsec-Network Address Translation (NAT) Compatibility Requirements","author":"aboba","year":"2004","journal-title":"RFC 3715"},{"year":"0","key":"ref16","article-title":"PeerSec Networks MatrixSSL"},{"key":"ref17","article-title":"Resisting SYN flood DoS attacks with a SYN cache","author":"lemon","year":"2002","journal-title":"Proceedings of the BSDCon"},{"key":"ref18","article-title":"HMAC: Keyed-Hashing for Message Authentication","author":"krawczyk","year":"1997","journal-title":"RFC 2104"},{"article-title":"S-Tunnel","year":"0","author":"trojnara","key":"ref19"},{"key":"ref28","article-title":"Secure TCP &#x2013; Providing Security Functions in TCP Layer","author":"tsutsumi","year":"1995","journal-title":"INET'95 HyperMedia"},{"key":"ref4","article-title":"Transmission Control Protocol security considerations","author":"dalal","year":"2004","journal-title":"IETF Internet Draft draft-ietf-tcpm-tcpsecure-02 txt"},{"key":"ref27","article-title":"On Implementing Security Extensions to the TCP Transport Layer","author":"brown","year":"1992","journal-title":"Technical Report CS8\/92"},{"key":"ref3","article-title":"Security Architecture for the Internet Protocol","author":"kent","year":"1998","journal-title":"RFC 2401"},{"key":"ref6","article-title":"Transport-friendly esp (or layer violation for fun and profit)","author":"bellovin","year":"1999","journal-title":"ser IETF-44 TF-ESP BOF"},{"key":"ref29","article-title":"Protection of BGP Sessions via the TCP MD5 Signature Option","author":"heffernan","year":"1998","journal-title":"RFC 2385"},{"key":"ref5","article-title":"IP Encapsulating Security Payload (ESP)","author":"kent","year":"1998","journal-title":"RFC 2406"},{"key":"ref8","article-title":"A Multi-Layer IPsec Protocol","author":"zhang","year":"2000","journal-title":"Proceedings of 9th USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/941311.941321"},{"key":"ref2","article-title":"The TLS Protocol Version 1.0","author":"dierks","year":"1999","journal-title":"RFC 2246"},{"key":"ref9","article-title":"The Internet Key Exchange (IKE)","author":"harkins","year":"1998","journal-title":"RFC 2409"},{"key":"ref1","article-title":"The SSL Protocol Version 3.0","author":"freier","year":"1996","journal-title":"IETF Internet Draft draft-freier-ssl-version3-02 txt"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060313"},{"key":"ref22","article-title":"The TLS Protocol Version 1.1","author":"dierks","year":"2005","journal-title":"IETF Internet Draft draft-ietf-tls-rfc2246-bis-13 txt"},{"article-title":"Security of CBC Ciphersuites in SSL\/TLS: Problems and Countermeasures","year":"2004","author":"moeller","key":"ref21"},{"article-title":"Automatic Verification of Transmission Control Protocol Using NuSMV","year":"1999","author":"lu","key":"ref24"},{"article-title":"Network Security: Private Communication in a Public World","year":"2002","author":"kaufman","key":"ref23"},{"key":"ref26","article-title":"A secure data network system transport protocol","author":"dinkel","year":"1998","journal-title":"NISTIR 90-4228"},{"key":"ref25","article-title":"NuSMV: A new symbolic model verifier","author":"cimatti","year":"1999","journal-title":"Proceedings of CAV"}],"event":{"name":"Middleware and Workshops (COMSWARE '08)","start":{"date-parts":[[2008,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2008,1,10]]}},"container-title":["2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4545865\/4554360\/04554433.pdf?arnumber=4554433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T17:03:16Z","timestamp":1489683796000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4554433\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/comswa.2008.4554433","relation":{},"subject":[],"published":{"date-parts":[[2008,1]]}}}