{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:47Z","timestamp":1750307627340,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,16]],"date-time":"2008-10-16T00:00:00Z","timestamp":1224115200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,16]]},"DOI":"10.1145\/1414558.1414591","type":"proceedings-article","created":{"date-parts":[[2008,10,22]],"date-time":"2008-10-22T12:25:44Z","timestamp":1224678344000},"page":"113-118","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An open system for transparent firewall authentication and user traffic identification within corporate intranets"],"prefix":"10.1145","author":[{"given":"Roberto D.","family":"Rubino","sequence":"first","affiliation":[{"name":"New Jersey Institute of Technology, Newark, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/357744.357914"},{"volume-title":"Microsoft Research","year":"2000","author":"Bahl V.","key":"e_1_3_2_1_2_1"},{"volume-title":"Proceedings of the 6th Australian Information Warfare & IT Security Conference","year":"2005","author":"Candolin C.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","unstructured":"Cisco Systems. IPv6 Extension Headers Review and Considerations. http:\/\/www.cisco.com\/en\/US\/technologies\/tk648\/tk872\/technologies_white_paper0900aecd8054d37d.pdf (October 2006)  Cisco Systems. IPv6 Extension Headers Review and Considerations. http:\/\/www.cisco.com\/en\/US\/technologies\/tk648\/tk872\/technologies_white_paper0900aecd8054d37d.pdf (October 2006)"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Dierks T. and Rescorla E. The Transport Layer Security (TLS) Protocol Version 1.1. Request for Comments 4346 (April 2006).  Dierks T. and Rescorla E. The Transport Layer Security (TLS) Protocol Version 1.1. Request for Comments 4346 (April 2006).","DOI":"10.17487\/rfc4346"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Fenner B. Experimental Values in IPv4 IPv6 ICMPv4 ICMPv6 UDP and TCP Headers. Request for Comments 4727 (November 2006)  Fenner B. Experimental Values in IPv4 IPv6 ICMPv4 ICMPv6 UDP and TCP Headers. Request for Comments 4727 (November 2006)","DOI":"10.17487\/rfc4727"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378221"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Harkins D. and Carrel D. The Internet Key Exchange (IKE). Request for Comments 2409 (November 1998).   Harkins D. and Carrel D. The Internet Key Exchange (IKE). Request for Comments 2409 (November 1998).","DOI":"10.17487\/rfc2409"},{"key":"e_1_3_2_1_9_1","unstructured":"Hucaby D. Cisco ASA PIX and FWSM Firewall Handbook. Cisco Press 2005.   Hucaby D. Cisco ASA PIX and FWSM Firewall Handbook. Cisco Press 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Kent S. and Atkinson R. IP Authentication Header. Request for Comments 2401 (November 1998).   Kent S. and Atkinson R. IP Authentication Header. Request for Comments 2401 (November 1998).","DOI":"10.17487\/rfc2402"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Krawczyk H. Bellare M. and Canetti R. HMAC: Keyed-Hashing for Message Authentication. Request for Comments 2104 (February 1997)   Krawczyk H. Bellare M. and Canetti R. HMAC: Keyed-Hashing for Message Authentication. Request for Comments 2104 (February 1997)","DOI":"10.17487\/rfc2104"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Leech M. Ganis M. Lee Y. Kuris R. Koblas D. and Jones L. SOCKS Protocol Version 5. Request for Comments 1928 (March 1996).   Leech M. Ganis M. Lee Y. Kuris R. Koblas D. and Jones L. SOCKS Protocol Version 5. Request for Comments 1928 (March 1996).","DOI":"10.17487\/rfc1928"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Madson C. and Glenn R. The Use of HMAC-MD5-96 within ESP and AH. Request for Comments 2403 (November 1998).   Madson C. and Glenn R. The Use of HMAC-MD5-96 within ESP and AH. Request for Comments 2403 (November 1998).","DOI":"10.17487\/rfc2403"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Madson C. and Glenn R. The Use of HMAC-SHA-1-96 within ESP and AH. Request for Comments 2404 (November 1998).   Madson C. and Glenn R. The Use of HMAC-SHA-1-96 within ESP and AH. Request for Comments 2404 (November 1998).","DOI":"10.17487\/rfc2404"},{"key":"e_1_3_2_1_15_1","unstructured":"Microsoft Corporation. Windows Filtering Platform. http:\/\/www.microsoft.com\/whdc\/device\/network\/wfp.mspx (May 2008)  Microsoft Corporation. Windows Filtering Platform. http:\/\/www.microsoft.com\/whdc\/device\/network\/wfp.mspx (May 2008)"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Mogul J. and Deering S. Path MTU Discovery. Request for Comments 1191 (November 1990).   Mogul J. and Deering S. Path MTU Discovery. Request for Comments 1191 (November 1990).","DOI":"10.17487\/rfc1191"},{"volume-title":"Sams","year":"2007","author":"Noel M.","key":"e_1_3_2_1_17_1"}],"event":{"name":"SIGITE08: ACM Special Interest Group for Information Technology Education Conference","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Cincinnati OH USA","acronym":"SIGITE08"},"container-title":["Proceedings of the 9th ACM SIGITE conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1414558.1414591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1414558.1414591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:55Z","timestamp":1750250755000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1414558.1414591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,16]]},"references-count":17,"alternative-id":["10.1145\/1414558.1414591","10.1145\/1414558"],"URL":"https:\/\/doi.org\/10.1145\/1414558.1414591","relation":{},"subject":[],"published":{"date-parts":[[2008,10,16]]},"assertion":[{"value":"2008-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}