{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:28:12Z","timestamp":1730237292778,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T00:00:00Z","timestamp":1668124800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,11]]},"DOI":"10.1109\/icct56141.2022.10073198","type":"proceedings-article","created":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T18:29:19Z","timestamp":1679941759000},"page":"1318-1322","source":"Crossref","is-referenced-by-count":1,"title":["Implementing Continuous Authentication in Network Connection Based on Improved SPA"],"prefix":"10.1109","author":[{"given":"Kun","family":"Jiang","sequence":"first","affiliation":[{"name":"China Telecom Research Institute,Research Department of Security Technology,Shanghai,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yao","family":"Xiao","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute,Research Department of Security Technology,Shanghai,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shumei","family":"Yuan","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute,Research Department of Security Technology,Shanghai,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuan","family":"Si","sequence":"additional","affiliation":[{"name":"China Telecom Research Institute,Research Department of Security Technology,Shanghai,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","first-page":"12","article-title":"Port Knocking: Network Authentication Across Closed Ports","volume-title":"SysAdmin Magazine","volume":"12","author":"Krzywinski"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800324"},{"key":"ref3","article-title":"Software-Defined Perimeter (SDP) Specification v2.0","author":"Garbis","year":"2022","journal-title":"Working Group: SDP and Zero Trust"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2012.129"},{"key":"ref5","article-title":"Associating the Authentication and Connection Establishment Phases in Passive Authorization Techniques","volume-title":"Proceedings of the World Congress on Engineering 2008","volume":"I","author":"Tariq"},{"issue":"8","key":"ref6","article-title":"Network Security Using Hybrid Port Knocking","volume":"10","author":"Al-Bahadili","year":"2010","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref7","first-page":"8","article-title":"SDP for IaaS","year":"2017","journal-title":"Working Group: SDP and Zero Trust"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICETC.2010.5529780"},{"key":"ref9","article-title":"US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)","author":"Hansen","year":"2011","journal-title":"RFC 6234"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICETC.2010.5529780"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2012.V4.564"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5120\/9438-3834"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CLEI.2018.00090"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BSC.2018.8494695"},{"volume-title":"Manpage of FWKNOP","year":"2017","key":"ref15"}],"event":{"name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2022,11,11]]},"location":"Nanjing, China","end":{"date-parts":[[2022,11,14]]}},"container-title":["2022 IEEE 22nd International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10072013\/10072295\/10073198.pdf?arnumber=10073198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T06:59:42Z","timestamp":1709449182000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10073198\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icct56141.2022.10073198","relation":{},"subject":[],"published":{"date-parts":[[2022,11,11]]}}}