{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:24:40Z","timestamp":1775017480693,"version":"3.50.1"},"reference-count":23,"publisher":"Pleiades Publishing Ltd","issue":"7","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1134\/s0361768819070090","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T11:02:45Z","timestamp":1576494165000},"page":"417-423","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Testing the Conformance of Implementations of the EAP Protocol and Its Methods to Internet Specifications"],"prefix":"10.1134","volume":"45","author":[{"given":"A. V.","family":"Nikeshin","sequence":"first","affiliation":[]},{"given":"V. Z.","family":"Shnitman","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2019,12,16]]},"reference":[{"key":"7087_CR1","doi-asserted-by":"crossref","unstructured":"Aboba, B. et al., IETF RFC 3748. Extensible Authentication Protocol (EAP), June 2004.\nhttps:\/\/tools.ietf.org\/html\/rfc3748","DOI":"10.17487\/rfc3748"},{"key":"7087_CR2","doi-asserted-by":"crossref","unstructured":"Aboba, B. and Calhoun, P., IETF RFC 3579. RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP), September 2003. https:\/\/tools.ietf.org\/html\/rfc3579","DOI":"10.17487\/rfc3579"},{"key":"7087_CR3","doi-asserted-by":"crossref","unstructured":"Bourdonov, I., Kossatchev, A., Kuliamin, V., and Petrenko, A., UniTesK test suite architecture, Proc. of FME 2002. Lect. Notes Comput. Sci. 2001, vol. 2391, pp. 77\u201388.","DOI":"10.1007\/3-540-45614-7_5"},{"issue":"1","key":"7087_CR4","doi-asserted-by":"publisher","first-page":"109","DOI":"10.15514\/ISPRAS-2014-26(1)-4","volume":"26","author":"Nikolay Pakulin","year":"2014","unstructured":"Pakulin, N.V., Nikeshin, A.V., and Shnitman, V.Z., Automation of conformance testing for communication protocols, Trudy ISP RAN, 2014, vol. 26, no. 1, pp.\u00a0109\u2013148.","journal-title":"Proceedings of the Institute for System Programming of RAS"},{"key":"7087_CR5","unstructured":"Nikeshin, A.V., Pakulin, N.V., and Shnitman, V.Z., Mutation testing of network protocols using formal models, Nauchnyi servis v seti Internet: trudy XVII Vserossiiskoi nauchnoi konferentsii, 2015, Novorossiisk), Moscow: Keldysh Inst. Prkl. Mat., 2015, pp. 259\u2013266."},{"key":"7087_CR6","doi-asserted-by":"crossref","unstructured":"Nikeshin, A.V. and Shnitman, V.Z., The verification of tunnel methods of the Extensible Authentication Protocol (EAP), CEUR Workshop Proceedings, 2018, Vol. 2260, pp. 406\u2013416.","DOI":"10.20948\/abrau-2018-17"},{"key":"7087_CR7","unstructured":"Burdonov, I.B., Evtushenko, N.V., and Kossatchev, A.S., Deriving tests for the synchronous composition of deterministic complete Finite State Machines, CEUR Workshop Proceedings, 2018, Vol. 2260, pp. 100\u2013110."},{"issue":"2","key":"7087_CR8","doi-asserted-by":"publisher","first-page":"113","DOI":"10.15514\/ISPRAS-2018-30(2)-7","volume":"30","author":"A.V. Nikeshin","year":"2018","unstructured":"Nikeshin, A.V. and Shnitman, V.Z., The review of extensible authentication protocol and its methods, Trudy ISP RAN, 2018, vol. 30, no. 2, pp. 113\u2013148.","journal-title":"Proceedings of the Institute for System Programming of the RAS"},{"key":"7087_CR9","doi-asserted-by":"crossref","unstructured":"Haverinen and Salowey, IETF RFC 4186. Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM), January 2006.\nhttps:\/\/tools.ietf.org\/html\/rfc4186","DOI":"10.17487\/rfc4186"},{"key":"7087_CR10","unstructured":"IEEE Standard 802.1X-2010 - IEEE Standard for Local and metropolitan area networks \u2013\u00a0Port-Based Network Access Control, 2010."},{"key":"7087_CR11","unstructured":"JavaTESK. http:\/\/www.unitesk.ru\/content\/category\/5\/25\/60\/"},{"key":"7087_CR12","unstructured":"FreeRADIUS. http:\/\/freeradius.org"},{"key":"7087_CR13","unstructured":"Clearbox Enterprise Server. http:\/\/xperiencetech.com\/"},{"key":"7087_CR14","unstructured":"TekRADIUS. https:\/\/www.kaplansoft.com\/tekradius\/"},{"key":"7087_CR15","unstructured":"Windows Server 2012 R2. https:\/\/www.microsoft.com\/"},{"key":"7087_CR16","doi-asserted-by":"crossref","unstructured":"Arkko and Haverinen. IETF RFC 4187, Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), January 2006. https:\/\/tools.ietf.org\/html\/rfc4187\/","DOI":"10.17487\/rfc4187"},{"key":"7087_CR17","doi-asserted-by":"crossref","unstructured":"Arkko, et al., IETF RFC 5448. Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), May 2009. https:\/\/tools.ietf.org\/html\/rfc5448\/","DOI":"10.17487\/rfc5448"},{"key":"7087_CR18","unstructured":"European Telecommunications Standards Institute, GSM Technical Specification GSM 03.20 (ETS 300 534): Digital cellular telecommunication system (Phase 2), Security related network functions, August 1997."},{"key":"7087_CR19","unstructured":"Protected Extensible Authentication Protocol (PEAP), [MS-PEAP], Microsoft Corporation, December 2017.\nhttps:\/\/msdn.microsoft.com\/en-us\/library\/ cc238354.aspx"},{"key":"7087_CR20","doi-asserted-by":"crossref","unstructured":"Funk and Blake-Wilson, IETF RFC 5281. Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol, Version 0 (EAP-TTLSv0), August 2008. https:\/\/tools.ietf.org\/html\/rfc5281\/","DOI":"10.17487\/rfc5281"},{"key":"7087_CR21","doi-asserted-by":"crossref","unstructured":"Cam-Winget, et al., IETF RFC 4851. The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST), May 2007. https:\/\/tools.ietf.org\/html\/rfc4851\/","DOI":"10.17487\/rfc4851"},{"key":"7087_CR22","doi-asserted-by":"crossref","unstructured":"Zhou, et al., IETF RFC 7170. Tunnel Extensible Authentication Protocol (TEAP), Version 1, May 2014. https:\/\/tools.ietf.org\/html\/rfc7170","DOI":"10.17487\/rfc7170"},{"key":"7087_CR23","doi-asserted-by":"crossref","unstructured":"Dierks, T. and Rescorla, E., IETF RFC 5246. The Transport Layer Security (TLS) Protocol Version 1.2, August 2008. https:\/\/tools.ietf.org\/html\/rfc5246\/","DOI":"10.17487\/rfc5246"}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768819070090.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768819070090","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768819070090.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:45:41Z","timestamp":1775011541000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768819070090"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":23,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7087"],"URL":"https:\/\/doi.org\/10.1134\/s0361768819070090","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"15 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}