{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:55:34Z","timestamp":1725566134464},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/iscc.2013.6754946","type":"proceedings-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T17:14:57Z","timestamp":1394212497000},"page":"000203-000206","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of IPv6 with IPSec in IEEE 802.11n wireless LAN using Fedora 15 operating system"],"prefix":"10.1109","author":[{"given":"Samad S.","family":"Kolahi","sequence":"first","affiliation":[]},{"family":"Yuqing Cao","sequence":"additional","affiliation":[]},{"family":"Hong Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2002.1179632"},{"journal-title":"CSVPN Certification Guide","year":"2003","author":"roland","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.89"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00016-4"},{"key":"7","first-page":"1","article-title":"The impact of security on the performance of IPv4 and IPv6 using 802.lln wireless LAN","author":"kolahi","year":"0","journal-title":"Third International Conference on New Technologies Mobility and Security"},{"key":"6","first-page":"575","article-title":"WPA2 securitybandwidth trade-off in 802.11 n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems","author":"kolahi","year":"2012","journal-title":"IEEE Symposium on Computers and Communications (LSCC)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.367"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20040283"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIEA.2009.5356462"},{"journal-title":"Netperf","year":"0","author":"jones","key":"8"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1200301"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2008.ECP.51"}],"event":{"name":"2013 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2013,7,7]]},"location":"Split, Croatia","end":{"date-parts":[[2013,7,10]]}},"container-title":["2013 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6746555\/6754912\/06754946.pdf?arnumber=6754946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:41:53Z","timestamp":1490290913000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6754946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iscc.2013.6754946","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}