{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T18:32:42Z","timestamp":1730313162706,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,5,4]]},"DOI":"10.1145\/1062261.1062298","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"221-229","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A QoS-enabled packet scheduling algorithm for IPSec multi-accelerator based systems"],"prefix":"10.1145","author":[{"given":"Alberto","family":"Ferrante","sequence":"first","affiliation":[{"name":"University of Milan, Milano, Italy"}]},{"given":"Vincenzo","family":"Piuri","sequence":"additional","affiliation":[{"name":"University of Milan, Milano, Italy"}]},{"given":"Fabien","family":"Castanier","sequence":"additional","affiliation":[{"name":"ST Microelectronics, Milano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2005,5,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Security Architecture For the Internet Protocol -- RFC2401,\" IETF RFC","author":"Kent S.","year":"1998","unstructured":"S. Kent and R. Atkinson , \" Security Architecture For the Internet Protocol -- RFC2401,\" IETF RFC , 1998 . {Online}. Available: http:\/\/www.ietf.org\/rfc.html]] S. Kent and R. Atkinson, \"Security Architecture For the Internet Protocol -- RFC2401,\" IETF RFC, 1998. {Online}. Available: http:\/\/www.ietf.org\/rfc.html]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"IP Authentication Header -- RFC2402 \" IETF RFC 1998. {Online}. Available: http:\/\/www.ietf.org\/rfc.html]]  IP Authentication Header -- RFC2402 \" IETF RFC 1998. {Online}. Available: http:\/\/www.ietf.org\/rfc.html]]","DOI":"10.17487\/rfc2402"},{"key":"e_1_3_2_1_3_1","unstructured":"IP Encapsulating Security Payload (ESP) -- RFC2406 \" IETF RFC 1998. {Online}. Available: http:\/\/www.ietf.org\/rfc.html]]  IP Encapsulating Security Payload (ESP) -- RFC2406 \" IETF RFC 1998. {Online}. Available: http:\/\/www.ietf.org\/rfc.html]]"},{"key":"e_1_3_2_1_4_1","volume-title":"The Internet Key Exchange (IKE) -- RFC2409,\" IETF RFC","author":"Harkins D.","year":"1998","unstructured":"D. Harkins and D. Carrell , \" The Internet Key Exchange (IKE) -- RFC2409,\" IETF RFC , 1998 . {Online}. Available: http:\/\/www.ietf.org\/rfc.html]] D. Harkins and D. Carrell, \"The Internet Key Exchange (IKE) -- RFC2409,\" IETF RFC, 1998. {Online}. Available: http:\/\/www.ietf.org\/rfc.html]]"},{"key":"e_1_3_2_1_5_1","volume-title":"IP Payload Compression Protocol (IPComp) -- RFC2393,\" IETF RFC","author":"Shacham A.","year":"1998","unstructured":"A. Shacham , R. Monsour , R. Pereira , and M. Thomas , \" IP Payload Compression Protocol (IPComp) -- RFC2393,\" IETF RFC , 1998 . {Online}. Available: http:\/\/www.ietf.org\/rfc.html]] A. Shacham, R. Monsour, R. Pereira, and M. Thomas, \"IP Payload Compression Protocol (IPComp) -- RFC2393,\" IETF RFC, 1998. {Online}. Available: http:\/\/www.ietf.org\/rfc.html]]"},{"key":"e_1_3_2_1_6_1","volume-title":"Secure Networking with Windows 2000 and Trust Services","author":"Feghhi J.","year":"2001","unstructured":"J. Feghhi and J. Feghhi , Secure Networking with Windows 2000 and Trust Services . Addison Wesley , 2001 .]] J. Feghhi and J. Feghhi, Secure Networking with Windows 2000 and Trust Services. Addison Wesley, 2001.]]"},{"key":"e_1_3_2_1_7_1","volume-title":"Virtual Private Networks","author":"Yuan R.","year":"2001","unstructured":"R. Yuan and W. T. Strayer , Virtual Private Networks . Addison Wesley , 2001 .]] R. Yuan and W. T. Strayer, Virtual Private Networks. Addison Wesley, 2001.]]"},{"key":"e_1_3_2_1_8_1","volume-title":"A Study Of the Relative Costs of Network Security Protocols.\" Monterey","author":"Miltchev S.","year":"2002","unstructured":"S. Miltchev , S. Ioannidis , and A. D. Keromytis , \" A Study Of the Relative Costs of Network Security Protocols.\" Monterey , CA : USENIX Annual Technical Program , June 2002 .]] S. Miltchev, S. Ioannidis, and A. D. Keromytis, \"A Study Of the Relative Costs of Network Security Protocols.\" Monterey, CA: USENIX Annual Technical Program, June 2002.]]"},{"key":"e_1_3_2_1_9_1","volume-title":"Yokohama","author":"Ariga S.","year":"2000","unstructured":"S. Ariga , K. Nagahashi , M. Minami , H. Esaki , and J. Murai , \" Performance Evaluation Of Data Transmission Using IPSec Over IPv6 Networks,\" in INET , Yokohama , Japan , July 2000 .]] S. Ariga, K. Nagahashi, M. Minami, H. Esaki, and J. Murai, \"Performance Evaluation Of Data Transmission Using IPSec Over IPv6 Networks,\" in INET, Yokohama, Japan, July 2000.]]"},{"key":"e_1_3_2_1_10_1","volume-title":"NGI 2005","author":"Ferrante Alberto","year":"2005","unstructured":"Alberto Ferrante , Vincenzo Piuri , and Jeff Owen , \"IP Sec Hardware Resource Requirements Evaluation ,\" in NGI 2005 , IEEE, Ed. Rome, Italy : EuroNGI, 18 Apr. 2005 .]] Alberto Ferrante, Vincenzo Piuri, and Jeff Owen, \"IPSec Hardware Resource Requirements Evaluation,\" in NGI 2005, IEEE, Ed. Rome, Italy: EuroNGI, 18 Apr. 2005.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2003.1220692"},{"key":"e_1_3_2_1_12_1","first-page":"191","volume-title":"Morgan Kaufmann","volume":"1","author":"Freeman John","year":"2003","unstructured":"John Freeman , \" An Industry Analyst's Perspective on Network Processors ,\" in Network Processor Design , P. Crowley , M. A. Franklin , H. Hadimioglu , and P. Z. Onufryk , Eds . Morgan Kaufmann , 2003 , vol. 1 , ch. 9, pp. 191 -- 218 .]] John Freeman, \"An Industry Analyst's Perspective on Network Processors,\" in Network Processor Design, P. Crowley, M. A. Franklin, H. Hadimioglu, and P. Z. Onufryk, Eds. Morgan Kaufmann, 2003, vol. 1, ch. 9, pp. 191--218.]]"},{"key":"e_1_3_2_1_13_1","first-page":"49","volume-title":"Internetworking Technologies Handbook","author":"Convery Sean","year":"2004","unstructured":"Sean Convery , Internetworking Technologies Handbook . Cisco Press , 19 Apr. 2004 , no. ISBN158705115X, ch. 49, pp. 49 -- 41 -- 49--32.]] Sean Convery, Internetworking Technologies Handbook. Cisco Press, 19 Apr. 2004, no. ISBN158705115X, ch. 49, pp. 49--1 -- 49--32.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"Dec.","author":"Blake S.","year":"1998","unstructured":"S. Blake , D. Black , M. Carlson , E. Davies , Z. Wang , and W. Weiss , \" An Architecture for Differentiated Services -- RFC2475,\" IETF RFC , Dec. 1998 . {Online}. Available: http:\/\/www.ietf.org\/rfc.html]] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, \"An Architecture for Differentiated Services -- RFC2475,\" IETF RFC, Dec. 1998. {Online}. Available: http:\/\/www.ietf.org\/rfc.html]]"},{"key":"e_1_3_2_1_15_1","volume-title":"Version 6 (IPv6) Specification -- RFC2460,\" IETF RFC","author":"Deering S.","year":"1998","unstructured":"S. Deering and R. Hinden , \" Internet Protocol , Version 6 (IPv6) Specification -- RFC2460,\" IETF RFC , Dec. 1998 . {Online}. Available: http:\/\/www.ietf.org\/rfc.html]] S. Deering and R. Hinden, \"Internet Protocol, Version 6 (IPv6) Specification -- RFC2460,\" IETF RFC, Dec. 1998. {Online}. Available: http:\/\/www.ietf.org\/rfc.html]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025114.1025192"},{"key":"e_1_3_2_1_17_1","volume-title":"Joseph Y. Leung","author":"Carpenter J.","year":"2004","unstructured":"J. Carpenter , S. Funk , P. Holman , A. Srinivasan , J. Anderson , and S. Baruah , \" A Categorization of Real-Time Multiprocessor Scheduling Problems and Algorithms,\" in Hanbook of Scheduling: Algorithms, Models, and Performance Analysis , Joseph Y. Leung , Ed. CRC Press , 2004 , ch. 31.]] J. Carpenter, S. Funk, P. Holman, A. Srinivasan, J. Anderson, and S. Baruah, \"A Categorization of Real-Time Multiprocessor Scheduling Problems and Algorithms,\" in Hanbook of Scheduling: Algorithms, Models, and Performance Analysis, Joseph Y. Leung, Ed. CRC Press, 2004, ch. 31.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/277651.277669"},{"key":"e_1_3_2_1_19_1","unstructured":"(2002) PCI comparison 32 vs. 64-bit and 33MHz vs. 66MHz. {Online}. Available: http:\/\/www.buildorbuy.org\/pdf\/64bitpci.pdf]]  (2002) PCI comparison 32 vs. 64-bit and 33MHz vs. 66MHz. {Online}. Available: http:\/\/www.buildorbuy.org\/pdf\/64bitpci.pdf]]"},{"key":"e_1_3_2_1_20_1","volume-title":"Sept.","author":"Frankel S.","year":"2003","unstructured":"S. Frankel , R. Glenn , and S. Kelly , \" The AES-CBC Cipher Algorithm and Its Use with IPsec - RFC 3602,\" IETF RFC , Sept. 2003 .]] S. Frankel, R. Glenn, and S. Kelly, \"The AES-CBC Cipher Algorithm and Its Use with IPsec - RFC 3602,\" IETF RFC, Sept. 2003.]]"},{"issue":"0","key":"e_1_3_2_1_21_1","first-page":"2246","volume":"1","author":"Dierks T.","year":"1999","unstructured":"T. Dierks and C. Allen , \"The TLS Protocol Version 1 . 0 -- RFC 2246 ,\" IETF RFC, Jan. 1999 . {Online}. Available: http:\/\/www.ietf.org\/rfc.html]] T. Dierks and C. Allen, \"The TLS Protocol Version 1.0 -- RFC 2246,\" IETF RFC, Jan. 1999. {Online}. Available: http:\/\/www.ietf.org\/rfc.html]]","journal-title":"\"The TLS Protocol Version"},{"key":"e_1_3_2_1_22_1","unstructured":"\"SystemC Official Website.\" {Online}. Available: http:\/www.systemc.org\/]]  \"SystemC Official Website.\" {Online}. Available: http:\/www.systemc.org\/]]"},{"key":"e_1_3_2_1_23_1","unstructured":"(2000) The Internet Traffic Archive. {Online}. Available: http:\/\/ita.ee.lbl.gov\/]]  (2000) The Internet Traffic Archive. {Online}. Available: http:\/\/ita.ee.lbl.gov\/]]"},{"key":"e_1_3_2_1_24_1","unstructured":"TCPDUMP Public Repository. {Online}. Available: http:\/\/www.tcpdump.org\/]]  TCPDUMP Public Repository. {Online}. Available: http:\/\/www.tcpdump.org\/]]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2004.10024"}],"event":{"name":"CF05: Computing Frontiers Conference","sponsor":["ACM Association for Computing Machinery","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Ischia Italy","acronym":"CF05"},"container-title":["Proceedings of the 2nd conference on Computing frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1062261.1062298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T04:06:17Z","timestamp":1673409977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1062261.1062298"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,5,4]]},"references-count":25,"alternative-id":["10.1145\/1062261.1062298","10.1145\/1062261"],"URL":"https:\/\/doi.org\/10.1145\/1062261.1062298","relation":{},"subject":[],"published":{"date-parts":[[2005,5,4]]},"assertion":[{"value":"2005-05-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}