{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:39:42Z","timestamp":1770334782151,"version":"3.49.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.23919\/mipro.2017.7973470","type":"proceedings-article","created":{"date-parts":[[2017,7,25]],"date-time":"2017-07-25T19:28:35Z","timestamp":1501010915000},"page":"466-471","source":"Crossref","is-referenced-by-count":4,"title":["Performance analysis of virtualized VPN endpoints"],"prefix":"10.23919","author":[{"given":"D.","family":"Lackovic","sequence":"first","affiliation":[]},{"given":"M.","family":"Tomic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"kent","year":"2006","journal-title":"RFC 4301 Security Architecture for the Internet Protocol 2005"},{"key":"ref11","year":"0","journal-title":"StrongSwan"},{"key":"ref12","year":"0","journal-title":"OpenVPN Official Documentation OpenVPN Technologies"},{"key":"ref13","author":"hosner","year":"0","journal-title":"OpenVPN and the SSL VPN Revolution"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2015.7374133"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2514\/6.2004-3207"},{"key":"ref16","year":"0","journal-title":"Intel"},{"key":"ref17","year":"0","journal-title":"KVM"},{"key":"ref4","article-title":"Performance Evaluation of Remote Access VPN Protocols on Wireless Networks","volume":"4","author":"jaha","year":"2015","journal-title":"International journal of computer science &amp; information Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2016.7790333"},{"key":"ref6","article-title":"Speech bandwith requirements in IPsec and TLS environment","author":"voznak","year":"2009","journal-title":"WSEAS International Conference Proceedings Recent Advances in Computer Engineering"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICETA.2011.6112567"},{"key":"ref8","year":"0","journal-title":"Intel"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2016.25"},{"key":"ref2","article-title":"High Performance, Open Standard Virtualization with NFV and SDN","author":"digiglio","year":"0","journal-title":"White paper Intel Corporation and Wind River (2013)"},{"key":"ref1","year":"0","journal-title":"Published E2E Arch REQ Use Case Terminology documents in ETSI NFV Open Area"},{"key":"ref9","author":"stanton","year":"2005","journal-title":"Securing VPNs comparing SSL and IPsec Computer Fraud and Security"}],"event":{"name":"2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","location":"Opatija, Croatia","start":{"date-parts":[[2017,5,22]]},"end":{"date-parts":[[2017,5,26]]}},"container-title":["2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958418\/7973374\/07973470.pdf?arnumber=7973470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T15:57:59Z","timestamp":1502899079000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7973470\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.23919\/mipro.2017.7973470","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}