{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:06Z","timestamp":1750220886333,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371681","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"128-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Design and Implementation of Integrated Access VPN Gateway"],"prefix":"10.1145","author":[{"given":"Jiang","family":"Hua","sequence":"first","affiliation":[{"name":"Beijing Electronics Science and Technology Institute, Beijing, China"}]},{"given":"Fan","family":"Jinpo","sequence":"additional","affiliation":[{"name":"Beijing Electronics Science and Technology Institute, Beijing, China"}]},{"given":"Zhang","family":"Gang","sequence":"additional","affiliation":[{"name":"Beijing Electronics Science and Technology Institute, Beijing, China"}]},{"given":"Hu","family":"Ronglei","sequence":"additional","affiliation":[{"name":"Beijing Electronics Science and Technology Institute, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"issue":"10","key":"e_1_3_2_1_1_1","first-page":"2111","article-title":"Survey of Smart Home Security [J].","volume":"55","author":"Jice Wang","year":"2018","unstructured":"Wang Jice , Li Yilian , Jia Yan , Survey of Smart Home Security [J]. Journal of Computer Research and Development , 2018 , 55 ( 10 ): 2111 -- 2124 . Wang Jice, Li Yilian, Jia Yan, et al. Survey of Smart Home Security [J].Journal of Computer Research and Development, 2018, 55(10):2111--2124.","journal-title":"Journal of Computer Research and Development"},{"key":"e_1_3_2_1_2_1","volume-title":"Xidian University","author":"Tianjiu Zhang","year":"2014","unstructured":"Zhang Tianjiu . Design and Implementation of State Cryptography IPsec VPN Server Software based on Openswan [D] . Xidian University , 2014 . Zhang Tianjiu.Design and Implementation of State Cryptography IPsec VPN Server Software based on Openswan [D]. Xidian University, 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"Design and implementation of SSL VPN based on state secret algorithm[D]","author":"Wenqi Yin","year":"2015","unstructured":"Yin Wenqi . Design and implementation of SSL VPN based on state secret algorithm[D] . Xidian University , 2015 . Yin Wenqi. Design and implementation of SSL VPN based on state secret algorithm[D]. Xidian University, 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"Netinfo Security","author":"Xinming Yin","year":"2017","unstructured":"Yin Xinming , Cao Zhiwei , Huang Haiye , Fan zhijie. Application of SSL VPN Technology in Mobile Police Video Access Link[J] . Netinfo Security , 2017 . Yin Xinming, Cao Zhiwei, Huang Haiye, Fan zhijie.Application of SSL VPN Technology in Mobile Police Video Access Link[J]. Netinfo Security, 2017."},{"key":"e_1_3_2_1_5_1","volume-title":"Netinfo Security","author":"Zhaobin Li","year":"2016","unstructured":"Li Zhaobin , Liu Dandan , Huang Xin , Cao Hao . Design and Implementation of Secure Access Device Based on Guomi Algorithm [J] . Netinfo Security , 2016 . Li Zhaobin, Liu Dandan, Huang Xin, Cao Hao.Design and Implementation of Secure Access Device Based on Guomi Algorithm [J]. Netinfo Security, 2016."},{"key":"e_1_3_2_1_6_1","volume-title":"Xidian University","author":"Yue Zhang","year":"2018","unstructured":"Zhang Yue . The RESEARCH and Implement of National Standard IPsec VPN Security Mechanism[D] . Xidian University , 2018 . Zhang Yue.The RESEARCH and Implement of National Standard IPsec VPN Security Mechanism[D]. Xidian University, 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"Standards Press of China","author":"People's T","year":"2014","unstructured":"GM\/ T 0022-2014 People's Republic of China cipher industry standard:IPSec VPN specification[S].Beijing , Standards Press of China , 2014 . GM\/T 0022-2014 People's Republic of China cipher industry standard:IPSec VPN specification[S].Beijing, Standards Press of China, 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"Yanshan University","author":"Chengzong Ye","year":"2006","unstructured":"Ye Chengzong . Recearch on IKE Protocol in VPN Based on IPSec[D] . Yanshan University , 2006 . Ye Chengzong.Recearch on IKE Protocol in VPN Based on IPSec[D]. Yanshan University, 2006."},{"key":"e_1_3_2_1_9_1","volume-title":"IP Authentication Header[EB\/OL]. https:\/\/tools.ietf.org\/html\/rfc4302","author":"Kent S.","year":"2005","unstructured":"S. Kent .RFC4302 : IP Authentication Header[EB\/OL]. https:\/\/tools.ietf.org\/html\/rfc4302 , 2005 . S. Kent.RFC4302: IP Authentication Header[EB\/OL]. https:\/\/tools.ietf.org\/html\/rfc4302, 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.17487\/RFC4303"},{"key":"e_1_3_2_1_11_1","volume-title":"Internet Key Exchange Protocol Version 2 (IKEv2) [EB\/OL]. https:\/\/tools.ietf.org\/html\/rfc7296","author":"Kaufman C.","year":"2014","unstructured":"C. Kaufman , P. Hoffman , Y. Nir , P. Eronen , T. Kivinen . Internet Key Exchange Protocol Version 2 (IKEv2) [EB\/OL]. https:\/\/tools.ietf.org\/html\/rfc7296 , 2014 --10. C. Kaufman, P. Hoffman, Y. Nir, P. Eronen, T. Kivinen. Internet Key Exchange Protocol Version 2 (IKEv2) [EB\/OL]. https:\/\/tools.ietf.org\/html\/rfc7296, 2014--10."},{"doi-asserted-by":"crossref","unstructured":"K. Igoe D. Stebila.RFC6187:X.509v3 Certificates for Secure Shell Authentication[EB\/OL].https:\/\/tools.ietf.org\/html\/rfc61-87 2011-5.  K. Igoe D. Stebila.RFC6187:X.509v3 Certificates for Secure Shell Authentication[EB\/OL].https:\/\/tools.ietf.org\/html\/rfc61-87 2011-5.","key":"e_1_3_2_1_12_1","DOI":"10.17487\/rfc6187"},{"key":"e_1_3_2_1_13_1","volume-title":"Research and Development of Vehicle Remote Monitoring System Based on 4G and FlexRay[D]","author":"Fengxi Gao","year":"2018","unstructured":"Gao Fengxi . Research and Development of Vehicle Remote Monitoring System Based on 4G and FlexRay[D] . Jilin University , 2018 . Gao Fengxi. Research and Development of Vehicle Remote Monitoring System Based on 4G and FlexRay[D].Jilin University, 2018."},{"unstructured":"Zhang Yilin.The Design and Achievement of Smart Home Based on WIFI-ZIGBEE Network[D].Fujian Normal University 2016.  Zhang Yilin.The Design and Achievement of Smart Home Based on WIFI-ZIGBEE Network[D].Fujian Normal University 2016.","key":"e_1_3_2_1_14_1"},{"unstructured":"Li Kun.A RESEARCH ON 3G SMART INTEGRATED ACCESS GATEWAY[D].Beijing University of Posts and Telecommunications 2012.  Li Kun.A RESEARCH ON 3G SMART INTEGRATED ACCESS GATEWAY[D].Beijing University of Posts and Telecommunications 2012.","key":"e_1_3_2_1_15_1"},{"volume-title":"Marketwire (English)","year":"2017","unstructured":"Marketwired. Newest Access Gateway and NSE Software from Nomadix Ensure an Optimal Internet Experience[J] . Marketwire (English) , 2017 . Marketwired. Newest Access Gateway and NSE Software from Nomadix Ensure an Optimal Internet Experience[J]. Marketwire (English), 2017.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1016\/j.comnet.2013.08.001"},{"key":"e_1_3_2_1_18_1","first-page":"2016","article-title":"VPN based on StrongSwan[J].","author":"Chen","year":"2016","unstructured":"Chen chen, Shi liang, Zhu Lanjuan , Xu Xiaoqing . Efficiency optimization of IP Sec VPN based on StrongSwan[J]. CPCC 2016 , 2016 . Chen chen, Shi liang, Zhu Lanjuan, Xu Xiaoqing.Efficiency optimization of IPSec VPN based on StrongSwan[J].CPCC 2016, 2016.","journal-title":"CPCC"}],"event":{"sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"acronym":"ICCNS 2019","name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","location":"Chongqing China"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371681","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:23Z","timestamp":1750203863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371681"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":18,"alternative-id":["10.1145\/3371676.3371681","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371681","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}