{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T10:01:07Z","timestamp":1771668067515,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905219","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["A New Approach for the Security of VPN"],"prefix":"10.1145","author":[{"given":"Kuwar Kuldeep V. V.","family":"Singh","sequence":"first","affiliation":[{"name":"Amity Institute of Information Technology, Amity University Campus, Noida, Uttar Pradesh, India"}]},{"given":"Himanshu","family":"Gupta","sequence":"additional","affiliation":[{"name":"Amity Institute of Information Technology, Amity University Campus, Noida, Uttar Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2013.V5.765"},{"key":"e_1_3_2_1_2_1","first-page":"132","author":"Baukari","year":"1996","unstructured":"Baukari N., and Ali Aljane , Security and auditing of VPN. In sdne , IEEE , 1996 , 132 . Baukari N., and Ali Aljane, Security and auditing of VPN. In sdne, IEEE, 1996, 132.","journal-title":"IEEE"},{"key":"e_1_3_2_1_3_1","volume-title":"Research of A VPN secure networking model.Proceedings of 2013 2nd International Conference on Measurement, Information and Control","year":"2013","unstructured":"Luo, Zhiyong, , Research of A VPN secure networking model.Proceedings of 2013 2nd International Conference on Measurement, Information and Control . 2013 , 567--569. Luo, Zhiyong, et al., Research of A VPN secure networking model.Proceedings of 2013 2nd International Conference on Measurement, Information and Control. 2013, 567--569."},{"key":"e_1_3_2_1_4_1","first-page":"7","volume":"10181","author":"Security Audit OSI","year":"1993","unstructured":"OSI , \" Security Audit Framework in Open Systems-Part 7\" , ISO\/IEC CD 10181 , 1993 , 7 . OSI, \"Security Audit Framework in Open Systems-Part 7\", ISO\/IEC CD 10181, 1993, 7.","journal-title":"ISO\/IEC CD"},{"key":"e_1_3_2_1_5_1","volume-title":"Cisco Secure Virtual Private Network","author":"Andrew","year":"2002","unstructured":"Mason, Andrew G , Cisco Secure Virtual Private Network , Cisco Press , January 4, 2002 . Mason, Andrew G, Cisco Secure Virtual Private Network, Cisco Press, January 4, 2002."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNS.2008.8"},{"key":"e_1_3_2_1_7_1","volume-title":"International Journal of Network Security & Its Applications (IJNSA) 3.6","author":"Sharma Vinod Kumar","year":"2011","unstructured":"Gupta, Himanshu, and Vinod Kumar Sharma . Role of multiple encryption in secure electronic transaction . International Journal of Network Security & Its Applications (IJNSA) 3.6 ( 2011 ), 89--96. Gupta, Himanshu, and Vinod Kumar Sharma. Role of multiple encryption in secure electronic transaction. International Journal of Network Security & Its Applications (IJNSA) 3.6 (2011), 89--96."},{"key":"e_1_3_2_1_8_1","volume-title":"US 7096383 B2","author":"Talaugon Wilson","year":"2006","unstructured":"Wilson Talaugon , Sridhar Subramaniam , Bill Chin , Itai Aaronson , System and method for virtual router failover in a network routing system , US 7096383 B2 , Aug 22, 2006 . Wilson Talaugon, Sridhar Subramaniam, Bill Chin, Itai Aaronson, System and method for virtual router failover in a network routing system, US 7096383 B2, Aug 22, 2006."},{"key":"e_1_3_2_1_9_1","unstructured":"Chris Partsenidis History of VPN: Disadvantages of early virtual privatenetwork Search Enterprise WAN http:\/\/searchenterprisewan.techtarget.com\/tip\/A-history-of-VPN-Disadvantages-of-early-virtual-private-networks.  Chris Partsenidis History of VPN: Disadvantages of early virtual privatenetwork Search Enterprise WAN http:\/\/searchenterprisewan.techtarget.com\/tip\/A-history-of-VPN-Disadvantages-of-early-virtual-private-networks."},{"key":"e_1_3_2_1_10_1","unstructured":"Wikipedia: The Free Encyclopaedia Tunneling Protocol http:\/\/en.wikipedia.org\/wiki\/Tunneling_protocol  Wikipedia: The Free Encyclopaedia Tunneling Protocol http:\/\/en.wikipedia.org\/wiki\/Tunneling_protocol"},{"key":"e_1_3_2_1_11_1","unstructured":"MicrosoftTechNet: VPN Tunneling Protocols https:\/\/technet.microsoft.com\/en-us\/library\/cc771298  MicrosoftTechNet: VPN Tunneling Protocols https:\/\/technet.microsoft.com\/en-us\/library\/cc771298"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","location":"Udaipur India","acronym":"ICTCS '16"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905219","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:50Z","timestamp":1750221530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905219"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":11,"alternative-id":["10.1145\/2905055.2905219","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905219","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}