{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:23:39Z","timestamp":1771705419180,"version":"3.50.1"},"reference-count":24,"publisher":"Zhejiang University Press","issue":"8","license":[{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Zhejiang Univ. - Sci. C"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1631\/jzus.c1200370","type":"journal-article","created":{"date-parts":[[2013,8,9]],"date-time":"2013-08-09T03:26:42Z","timestamp":1376018802000},"page":"642-651","source":"Crossref","is-referenced-by-count":4,"title":["A 10 Gbps in-line network security processor based on configurable hetero-multi-cores"],"prefix":"10.1631","volume":"14","author":[{"given":"Yun","family":"Niu","sequence":"first","affiliation":[]},{"given":"Li-ji","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiang-min","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hong-yi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2013,8,10]]},"reference":[{"key":"ref1","volume-title":"Research on Pattern Matching Algorithm in 40Gbps Application Awareness System","author":"Chen","year":"2011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/fccm.2005.34"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/waina.2008.168"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ngi.2007.371211"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ngi.2005.1431672"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88653-2_14"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/40.748793"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/APASIC.2004.1349439"},{"key":"ref9","year":"2008","journal-title":"Flow Through Security Processor"},{"key":"ref10","volume-title":"IEEE Standard for Ethernet. IEEE Computer Society, NY, USA"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/26.168785"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2003.1235745"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2009.2030188"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/cis.2012.60"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/90.769767"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2010.5433917"},{"key":"ref17","volume-title":"Implementation of an On-Chip Interconnect Using the i-SLIP Scheduling Algorithm","author":"Pape","year":"2006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/vlsid.2006.102"},{"key":"ref19","volume-title":"Security Architecture for the Internet Protocol","year":"1998"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1146909.1147039"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/asap.2008.4580160"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/00207210903289383"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSICT.2010.5667343"},{"issue":"S2","key":"ref24","first-page":"2097","volume-title":"Power analysis resistant AES crypto engine design for a network security co-processor","volume":"49","author":"Wu","year":"2009"}],"container-title":["Journal of Zhejiang University SCIENCE C"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/jzus.C1200370.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/jzus.C1200370\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/jzus.C1200370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:15:02Z","timestamp":1771658102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/jzus.C1200370"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":24,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["1431"],"URL":"https:\/\/doi.org\/10.1631\/jzus.c1200370","relation":{},"ISSN":["1869-1951","1869-196X"],"issn-type":[{"value":"1869-1951","type":"print"},{"value":"1869-196X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8]]}}}