{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T03:16:01Z","timestamp":1775013361336,"version":"3.50.1"},"reference-count":17,"publisher":"Pleiades Publishing Ltd","issue":"1","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1134\/s0361768811010038","type":"journal-article","created":{"date-parts":[[2011,2,16]],"date-time":"2011-02-16T16:52:46Z","timestamp":1297875166000},"page":"26-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Development of a test suite for the verification of implementations of the IPsec v2 security protocol"],"prefix":"10.1134","volume":"37","author":[{"given":"A. V.","family":"Nikeshin","sequence":"first","affiliation":[]},{"given":"N. V.","family":"Pakulin","sequence":"additional","affiliation":[]},{"given":"V. Z.","family":"Shnitman","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2011,2,17]]},"reference":[{"key":"6089_CR1","doi-asserted-by":"crossref","unstructured":"Kent, S. and Seo, K., RFC 4301. Security Architecture for the Internet Protocol, 2005.","DOI":"10.17487\/rfc4301"},{"key":"6089_CR2","doi-asserted-by":"crossref","unstructured":"Kent, S., RFC 4302. IP Authentication Header, 2005.","DOI":"10.17487\/rfc4302"},{"key":"6089_CR3","doi-asserted-by":"crossref","unstructured":"Kent, S., RFC 4303. IP Encapsulating Security Payload (ESP), 2005.","DOI":"10.17487\/rfc4303"},{"key":"6089_CR4","unstructured":"RFC 4306. Internet Key Exchange (IKEv2) Protocol, Kaufman, C., Ed., 2005."},{"key":"6089_CR5","doi-asserted-by":"crossref","unstructured":"Schiller, J., RFC 4307. Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2), 2005.","DOI":"10.17487\/rfc4307"},{"key":"6089_CR6","doi-asserted-by":"crossref","unstructured":"Baer, M., Charlet, R., Hardaker, W., Story, R., and Wang, C., RFC 4807. IPsec Security Policy Database Configuration MIB, 2007.","DOI":"10.17487\/rfc4807"},{"key":"6089_CR7","doi-asserted-by":"crossref","unstructured":"Kelly, S. and Frankel, S., Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec, 2007.","DOI":"10.17487\/rfc4868"},{"key":"6089_CR8","doi-asserted-by":"crossref","unstructured":"Bourdonov, I.B., Kossatchev, A.S., Kuliamin, V.V., and Petrnko, A., UniTesk Test Suite Architecture, in Proc. of FME, Lect. Notes Comput. Sci., no. 2391, Springer, 2002, pp. 77\u201388.","DOI":"10.1007\/3-540-45614-7_5"},{"key":"6089_CR9","unstructured":"CTesK 2.1: SeC Language Reference, Moscow: Institute for System Programming, Russian Academy of Sciences, 2005."},{"key":"6089_CR10","volume-title":"Cand. Sci. (Math.) Dissertation","author":"N.V. Pakulin","year":"2006","unstructured":"Pakulin, N.V., Formalization of Standards and Test Suites for Internet Protocols, Cand. Sci. (Math.) Dissertation, Moscow: Institute for System Programming, Russian Academy of Sciences, 2006."},{"key":"6089_CR11","unstructured":"Pakulin, N.V. and A.V. Khoroshilov, Development of Formal Models and Conformance Testing for Systems with Asynchronous Interfaces and Telecommunications Protocols, Programmirovanie, 2007, no. 5, pp. 1\u201329 [Programming Comput. Software (Engl. Transl.), 2007, vol. 33, no. 6, pp. 316\u2013335]."},{"key":"6089_CR12","doi-asserted-by":"crossref","unstructured":"Postel, J. and Reynolds, J., IETF RFC 2223. Instructions to RFC Authors, IETF, 1997.","DOI":"10.17487\/rfc2223"},{"key":"6089_CR13","doi-asserted-by":"crossref","unstructured":"Bradner, S., IETF BCP 14 | IETF RFC 2119. Key Words in Use in RFCs to Indicate Requirement Levels, 1997.","DOI":"10.17487\/rfc2119"},{"key":"6089_CR14","doi-asserted-by":"crossref","unstructured":"McCloghrie, K. and Rose, M.T., IETF RFC 1213. Management Information Base for Network Management of TCP\/IP-based Internets: MIB-II, 1991.","DOI":"10.17487\/rfc1213"},{"key":"6089_CR15","unstructured":"IETF RFC 2011. SNMPv2 Management Information Base for the Internet Protocol Using SMIv2, McCloghrie, K., Ed., 1996."},{"key":"6089_CR16","doi-asserted-by":"crossref","unstructured":"Srinivasan, R., IETF RFC 1831. RPC: Remote Procedure Call Protocol Specification, Version 2, 1995.","DOI":"10.17487\/rfc1831"},{"key":"6089_CR17","doi-asserted-by":"crossref","unstructured":"Srinivasan, R. IETF RFC 1832. XDR: External Data Representation Standard, 1995.","DOI":"10.17487\/rfc1832"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768811010038.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768811010038","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768811010038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768811010038.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:07:23Z","timestamp":1775009243000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768811010038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["6089"],"URL":"https:\/\/doi.org\/10.1134\/s0361768811010038","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1]]},"assertion":[{"value":"15 July 2010","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2011","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}