{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:42:59Z","timestamp":1762868579004},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1109\/isdfs52919.2021.9486356","type":"proceedings-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:37:12Z","timestamp":1626813432000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Analysis of Network Protocols for Secure Communication"],"prefix":"10.1109","author":[{"given":"David","family":"Caballero","sequence":"first","affiliation":[]},{"given":"Francisco","family":"Gonzalez","sequence":"additional","affiliation":[]},{"given":"Sheikh Ariful","family":"Islam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2019.8763773"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5321"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2007.4621740"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMMST.2018.8632026"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3411740.3411742"},{"key":"ref15","article-title":"The Secure Shell (SSH) Transport Layer Protocol","author":"sheffer","year":"2015","journal-title":"RFC 4253 RFC Editor"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3372199"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3372802"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23456"},{"journal-title":"SSH Protocol","year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"journal-title":"Http definition & meaning","year":"0","author":"dykes","key":"ref3"},{"year":"0","key":"ref6","article-title":"What is an ssl certificate?"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2014.7019737"},{"key":"ref8","first-page":"567","article-title":"The Dangers of Key Reuse: Practical Attacks on IPsec IKE","author":"felsch","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"article-title":"Rfc2616: Hypertext transfer protocol &#x2013; http\/1.1","year":"1999","author":"fielding","key":"ref7"},{"journal-title":"What are network protocols? - definition from techopedia","year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4253"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.5"},{"article-title":"SMTP (Simple Mail Transfer Protocol)","year":"2005","author":"riabov","key":"ref22"},{"key":"ref21","article-title":"On the (in)security of IPsec in MACthen-encrypt configurations","author":"degabriele","year":"2010","journal-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security - CCS 10"}],"event":{"name":"2021 9th International Symposium on Digital Forensics and Security (ISDFS)","start":{"date-parts":[[2021,6,28]]},"location":"Elazig, Turkey","end":{"date-parts":[[2021,6,29]]}},"container-title":["2021 9th International Symposium on Digital Forensics and Security (ISDFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9486290\/9486287\/09486356.pdf?arnumber=9486356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:48:20Z","timestamp":1652197700000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9486356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isdfs52919.2021.9486356","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]}}}