{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T01:43:55Z","timestamp":1773366235421,"version":"3.50.1"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,28]]},"DOI":"10.1109\/icct50939.2020.9295700","type":"proceedings-article","created":{"date-parts":[[2020,12,24]],"date-time":"2020-12-24T22:56:24Z","timestamp":1608850584000},"page":"1567-1571","source":"Crossref","is-referenced-by-count":3,"title":["Password Acquisition and Traffic Decryption Based on L2TP\/IPSec"],"prefix":"10.1109","author":[{"given":"Jie","family":"Luo","sequence":"first","affiliation":[]},{"given":"Qingbing","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2016.7535336"},{"key":"ref3","article-title":"Research and Implementation of PPTP_VPN Communication Data Decryption Scheme Based on Heterogeneous Platform[D]","author":"yu","year":"2019"},{"key":"ref10","article-title":"The Dangers of Key Reuse: Practical Attacks on IPsec IKE","year":"2019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.06.025"},{"key":"ref11","article-title":"Research on Key Technologies of VPN Penetration Against Intermediary [D]","author":"xi-jie","year":"2014"},{"key":"ref5","first-page":"224","article-title":"Talking about the Application of VPN Technology in Military LAN [J]","author":"jian","year":"2012","journal-title":"Scientific Information[J]"},{"key":"ref12","author":"sanchez","year":"2016","journal-title":"SLOTH Downgrades TLS 1 2 Encrypted Channels security intelligence blog"},{"key":"ref8","article-title":"Hackers break  SSL encryption used by millions of sites","author":"goodin","year":"2011","journal-title":"TheRegister"},{"key":"ref7","article-title":"Research and implementation of man-in-the-middle attacks in IKE protocol [D]","author":"bin","year":"2014","journal-title":"Beijing Beijing University of Posts and Telecommunications"},{"key":"ref2","first-page":"97","article-title":"Analysis and verification of IPSec VPN security vulnerabilities[J]","author":"yi-min","year":"2019","journal-title":"Electronic Technology & Information Science"},{"key":"ref9","article-title":"Comparison and analysis of various VPN technologies at different protocol layers [D]","author":"zhao-qian","year":"2013"},{"key":"ref1","first-page":"47","article-title":"Analysis of VPN virtual private network technology and security issues [J]","author":"shao-guo","year":"2020","journal-title":"Electronic Technology & Information Science"}],"event":{"name":"2020 IEEE 20th International Conference on Communication Technology (ICCT)","location":"Nanning, China","start":{"date-parts":[[2020,10,28]]},"end":{"date-parts":[[2020,10,31]]}},"container-title":["2020 IEEE 20th International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9295648\/9295649\/09295700.pdf?arnumber=9295700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:28:08Z","timestamp":1656376088000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9295700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,28]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icct50939.2020.9295700","relation":{},"subject":[],"published":{"date-parts":[[2020,10,28]]}}}