{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T19:22:54Z","timestamp":1649100174159},"reference-count":0,"publisher":"Centro de Innovacion y Desarrollo Tecnologico en Computo","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.17562\/pb-32-4","type":"journal-article","created":{"date-parts":[[2015,6,26]],"date-time":"2015-06-26T00:40:00Z","timestamp":1435279200000},"page":"16-21","source":"Crossref","is-referenced-by-count":0,"title":["Introducci\u00f3n a la Seguridad con IP Seguro en Internet (IPSec)"],"prefix":"10.17562","volume":"32","author":[{"given":"Mauricio","family":"Olgu\u00edn Carbajal","sequence":"first","affiliation":[]},{"given":"Israel","family":"Rivera Z\u00e1rate","sequence":"additional","affiliation":[]},{"given":"Adri\u00e1n","family":"Mart\u00ednez Ram\u00edrez","sequence":"additional","affiliation":[]},{"given":"Erika","family":"Roc\u00edo Barr\u00f3n","sequence":"additional","affiliation":[]},{"given":"Luis Arturo","family":"Rivera Quimby","sequence":"additional","affiliation":[]},{"given":"Fausto Israel","family":"Padilla God\u00ednez","sequence":"additional","affiliation":[]}],"member":"7641","published-online":{"date-parts":[[2005,7,31]]},"container-title":["Polibits"],"original-title":[],"deposited":{"date-parts":[[2015,6,26]],"date-time":"2015-06-26T00:40:08Z","timestamp":1435279208000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.polibits.cidetec.ipn.mx\/2005_32\/Introduccion%20a%20la%20Seguridad%20con%20IP%20Seguro%20en%20Internet%20_IPSec_.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7,31]]},"references-count":0,"URL":"https:\/\/doi.org\/10.17562\/pb-32-4","relation":{},"ISSN":["2395-8618","1870-9044"],"issn-type":[{"value":"2395-8618","type":"electronic"},{"value":"1870-9044","type":"print"}],"subject":[],"published":{"date-parts":[[2005,7,31]]}}}