{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:32:47Z","timestamp":1767339167523},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/date.2008.4484833","type":"proceedings-article","created":{"date-parts":[[2008,4,15]],"date-time":"2008-04-15T22:15:51Z","timestamp":1208297751000},"page":"1148-1153","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Software Architecture for IPSec Acceleration Using a Programmable Security Processor"],"prefix":"10.1109","author":[{"given":"Janar","family":"Thoguluva","sequence":"first","affiliation":[]},{"given":"Anand","family":"Raghunathan","sequence":"additional","affiliation":[]},{"given":"Srimat T.","family":"Chakradhar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Trends in wide area IP traffic patterns","year":"2000","author":"mccreary","key":"19"},{"journal-title":"The story of the TTCP program","year":"0","author":"muuss","key":"17"},{"key":"18","article-title":"internet key exchange (ikev2) protocol","author":"kaufman","year":"2005","journal-title":"RFC 4306 IETF"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2006.102"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2005.1493906"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2000.891091"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.304"},{"journal-title":"Security Processor Solutions","year":"0","key":"11"},{"key":"12","first-page":"41","article-title":"a study of the relative costs of network security protocols","author":"miltchev","year":"2002","journal-title":"Proc USENIX Annual Tech Conf"},{"journal-title":"TI M-Shield? Mobile Security Technology","year":"0","key":"3"},{"journal-title":"The Story of the PING Program","year":"0","author":"muuss","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2003.1253605"},{"journal-title":"Cryptography and Network Security Principles and Practice","year":"1998","author":"stallings","key":"1"},{"journal-title":"Hifn Security Processors","year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/40.977759"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379238"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2002.1012728"},{"journal-title":"MP211 Mobile Application Processor","year":"0","key":"4"},{"journal-title":"Safenet Inc","year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2008 Design, Automation and Test in Europe","start":{"date-parts":[[2008,3,10]]},"location":"Munich, Germany","end":{"date-parts":[[2008,3,14]]}},"container-title":["2008 Design, Automation and Test in Europe"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4475437\/4484624\/04484833.pdf?arnumber=4484833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T21:40:32Z","timestamp":1489700432000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4484833\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/date.2008.4484833","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}