{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:30:12Z","timestamp":1730305812524,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wimob.2006.1696366","type":"proceedings-article","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T17:01:13Z","timestamp":1158944473000},"page":"308-314","source":"Crossref","is-referenced-by-count":1,"title":["Enabling VPN and Secure Remote Access using TLS Protocol"],"prefix":"10.1109","author":[{"given":"M.","family":"Badra","sequence":"first","affiliation":[]},{"given":"I.","family":"Hajjeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2821"},{"key":"18","article-title":"Securing FTP with TLS","author":"ford-hutchinson","year":"2005","journal-title":"IETF Internet Draft"},{"key":"15","article-title":"SSH protocol architecture","author":"ylonen","year":"2005","journal-title":"IETF Internet Draft"},{"key":"16","article-title":"File Transfer Protocol","author":"postel","year":"1985","journal-title":"RFC 959"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1832"},{"key":"14","volume":"1","author":"stevens","year":"1994","journal-title":"TCP\/IP Illustrated"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2818"},{"journal-title":"Datagram Transport Layer Security","year":"2004","author":"rescorla","key":"12"},{"journal-title":"Guidelines for Mandating the Use of IPsec","year":"2003","author":"bellovin","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3546"},{"key":"20","article-title":"The SSL 3.0 Protocol","author":"frier","year":"1996","journal-title":"Netscape Communications Corp"},{"year":"0","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3748"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0768"},{"key":"7","article-title":"On the Delivered Performance of the Sun Crypto Accelerator 1000","author":"hung","year":"2002","journal-title":"Sun User Performance Group Conference"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"journal-title":"Internet X 509 PKI operational protocols-LDAPv2e?","year":"1999","author":"boeyen","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2487"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2401"}],"event":{"name":"IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2006. (WiMob'2006)","location":"Montr\u0089al, Qu\u0089bec, Canada"},"container-title":["IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2006. (WiMob'2006)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11150\/35739\/01696366.pdf?arnumber=1696366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T01:38:20Z","timestamp":1489628300000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1696366\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wimob.2006.1696366","relation":{},"subject":[]}}