{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:11:46Z","timestamp":1729642306891,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/isias.2010.5604188","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T14:59:49Z","timestamp":1287500389000},"page":"277-281","source":"Crossref","is-referenced-by-count":1,"title":["UDT -Authentication Option field: An approach"],"prefix":"10.1109","author":[{"given":"Danilo Valeros","family":"Bernardo","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Defending TCP Against Spoofing Attacks","author":"touch","year":"2007","journal-title":"RFC-4953 Informational"},{"key":"ref32","article-title":"The SDSS SkyServer - Public access to the Sloan digital sky server data","author":"szalay","year":"2002","journal-title":"ACM SIGMOD"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"key":"ref30","article-title":"NAT and Firewall Traversal Issues of Host Identity Protocol (HIP) Communication","author":"stiemerling","year":"2008","journal-title":"RFC 5207 IETF"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1109\/ICNP.2003.1249760","article-title":"RR-TCP: A reordering-robust TCP with DSACK","author":"zhang","year":"2003","journal-title":"Proc the Eleventh IEEE International Conference on Networking Protocols (ICNP 2003)"},{"journal-title":"Globus XIO","year":"2009","key":"ref35"},{"key":"ref34","first-page":"19","article-title":"How to break MD5 and other hash functions","author":"wang","year":"2005","journal-title":"Proc IACR Eurocrypt"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13577-4_9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17569-5_38"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2010.50"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/383034.383037"},{"journal-title":"New Arch Future Generation Internet Architecture","year":"2003","author":"clark","key":"ref14"},{"key":"ref15","article-title":"The TLS Protocol Version 1.0","author":"dierks","year":"1999","journal-title":"RFC 2246"},{"key":"ref16","first-page":"31","article-title":"Information assurance capacity building: A case study","author":"falby","year":"2004","journal-title":"Proc IEEE 2004 Information Assurance Workshop"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45116-1","author":"gorodetsky","year":"2001","journal-title":"Information Assurance in Computer Networks Methods Models and Architecture for Network Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.009"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.17487\/rfc2385","article-title":"Protection of BGP Sessions via the TCP MD5 Signature Option","author":"heffernan","year":"1998"},{"key":"ref28","article-title":"The MD5 Message-Digest Algorithm","author":"rivest","year":"1992","journal-title":"RFC 1321"},{"key":"ref4","article-title":"Authentication for TCP-based Routing and Management Protocols","author":"bonica","year":"2007","journal-title":"draft-bonica-tcp-auth-06 (work in progress)"},{"key":"ref27","article-title":"Digitized signatures and public-key functions as intractable as Factorization","author":"rabin","year":"1979","journal-title":"MIT\/LCS Technical Report TR-212"},{"key":"ref3","article-title":"Problem Statement and Requirements for a TCP Authentication Option","author":"bellovin","year":"2007","journal-title":"draft-bellovin-tcpsec-01 (work in progress)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICFN.2010.80"},{"journal-title":"Broadband Integrated Networks","year":"1996","author":"schwartz","key":"ref29"},{"key":"ref5","article-title":"The Status of MD5 After a Recent Attack","volume":"2","author":"dobbertin","year":"1996","journal-title":"RSA Lab CryptoBytes"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2009.5234768"},{"key":"ref7","article-title":"Security Requirements for UDT","author":"bernardo","year":"2009","journal-title":"IETF Internet-Draft - Working Paper"},{"key":"ref2","article-title":"Guidelines for Mandating the Use of IPsec","author":"bellovin","year":"2003","journal-title":"IETF Work in Progress"},{"key":"ref1","article-title":"Defending Against Sequence Number Attacks","author":"bellovin","year":"1996","journal-title":"RFC 1948"},{"key":"ref9","first-page":"354","article-title":"A Security Framework and its Implementation in Fast Data Transfer Next Generation Protocol UDT","volume":"4","author":"bernardo","year":"2009","journal-title":"Journal of Information Assurance and Security"},{"key":"ref20","article-title":"Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP)","author":"jokela","year":"2008","journal-title":"RFC 5202 IETF"},{"key":"ref22","article-title":"Key Management Considerations for the TCP MD5 Signature Option","author":"leech","year":"2003","journal-title":"RFC-3562 Informational"},{"key":"ref21","article-title":"Security Architecture for the Internet Protocol","author":"kent","year":"1998","journal-title":"RFC 2401"},{"key":"ref24","article-title":"TCP selective acknowledgment options","author":"mathis","year":"1996","journal-title":"IETF RFC 2018"},{"journal-title":"Communication Networks","year":"2000","author":"leon-garcia","key":"ref23"},{"journal-title":"Guide for the Security Certification and Accreditation of Federal Information Systems","article-title":"NIST SP 800&#x2013;37","year":"2004","key":"ref26"},{"journal-title":"Handbook of Applied Cryptograph","year":"1997","author":"menezes van","key":"ref25"}],"event":{"name":"2010 Sixth International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2010,8,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2010,8,25]]}},"container-title":["2010 Sixth International Conference on Information Assurance and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5594714\/5604038\/05604188.pdf?arnumber=5604188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T12:25:33Z","timestamp":1559737533000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5604188\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/isias.2010.5604188","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}