{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:49:44Z","timestamp":1730278184369,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itre.2005.1503158","type":"proceedings-article","created":{"date-parts":[[2005,9,9]],"date-time":"2005-09-09T19:06:22Z","timestamp":1126292782000},"page":"428-433","source":"Crossref","is-referenced-by-count":0,"title":["Design and implementation of WIRE diameter"],"prefix":"10.1109","author":[{"family":"Wen-Ting Wu","sequence":"first","affiliation":[]},{"family":"Jyh-Cheng Chen","sequence":"additional","affiliation":[]},{"family":"Kai-Hsiu Chen","sequence":"additional","affiliation":[]},{"family":"Kuo-Pao Fan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Xerces C++ Parser","year":"0","key":"19"},{"key":"17","article-title":"Microsoft PPP CHAP extensions, version 2","volume":"2759","author":"zorn","year":"2000","journal-title":"IETF RFC"},{"journal-title":"Adaptive Communication Environment (ACE)","year":"0","key":"18"},{"key":"15","article-title":"PPP Challenge Handshake Authentication Protocol (CHAP)","volume":"1994","author":"simpson","year":"1996","journal-title":"IETF RFC"},{"key":"16","article-title":"Microsoft PPP CHAP extensions","volume":"2433","author":"zorn","year":"1998","journal-title":"IETF RFC"},{"key":"13","article-title":"Criteria for evaluating AAA protocols for network access","volume":"2989","author":"aboba","year":"2000","journal-title":"IETF RFC"},{"key":"14","article-title":"PPP authentication protocols","volume":"1334","author":"lloyd","year":"1992","journal-title":"IETF RFC"},{"key":"11","article-title":"Protecting EAP protocol (PEAP)","author":"andersson","year":"2002","journal-title":"IETF Internet Draft"},{"journal-title":"Port-Based Network Access Control","year":"2001","key":"12"},{"journal-title":"PCAP Library","year":"0","key":"21"},{"journal-title":"OpenSSL","year":"0","key":"20"},{"journal-title":"WinPcap Library","year":"0","key":"22"},{"journal-title":"Libnet library","year":"0","key":"23"},{"key":"24","article-title":"State machines for Extensible Authentication Protocol (EAP) peer and authenticator","author":"vollbrecht","year":"2003","journal-title":"IETF Internet Draft"},{"journal-title":"IEEE-802-1X-REV Draft Standard for Local and Metropolitan Ares Networks Port-based Network Access Control (Revision)","year":"2004","key":"25"},{"key":"3","article-title":"Diameter mobile IPv4 application","author":"calhoun","year":"2004","journal-title":"IETF Internet Draft"},{"key":"2","article-title":"Diameter base protocol","volume":"3588","author":"calhoun","year":"2003","journal-title":"IETF RFC"},{"key":"10","article-title":"EAP tunneled TLS authentication protocol","author":"funk","year":"2004","journal-title":"IETF Internet Draft"},{"key":"1","article-title":"Remote Authentication Dial in User Service (RADIUS)","volume":"2865","author":"rigney","year":"2000","journal-title":"IETF RFC"},{"journal-title":"OpenDIAMETER","year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2005.1404570"},{"key":"5","article-title":"PPP Extensible Authentication Protocol (EAP)","volume":"2284","author":"blunk","year":"1998","journal-title":"IETF RFC"},{"key":"4","article-title":"Diameter Extensible Authentication Protocol (EAP) application","author":"eronen","year":"2004","journal-title":"IETF Internet Draft"},{"key":"9","article-title":"PPP EAPTLS authentication protocol","volume":"2716","author":"aboba","year":"1999","journal-title":"IETF RFC"},{"key":"8","article-title":"The MD5 message-digest algorithm","volume":"1321","author":"rivest","year":"1992","journal-title":"IETF RFC"}],"event":{"name":"ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005.","location":"Hsinchu, Taiwan"},"container-title":["ITRE 2005. 3rd International Conference on Information Technology: Research and Education, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10051\/32244\/01503158.pdf?arnumber=1503158","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T19:48:51Z","timestamp":1489520931000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1503158\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/itre.2005.1503158","relation":{},"subject":[]}}