{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:44:11Z","timestamp":1725551051604},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007326"},{"type":"electronic","value":"9783540365556"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36555-9_24","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T21:12:04Z","timestamp":1269897124000},"page":"231-238","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis and Design of Secure and Reliable Transmission Protocol in Diameter"],"prefix":"10.1007","author":[{"given":"Sang","family":"Keun Yoo","sequence":"first","affiliation":[]},{"given":"Hyun","family":"Gon Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"C. Rigney, A. Rubens, W. Simpson, S. Willens, \u201cRemote Authentication Dial In User Service (RADIUS)\u201d, RFC 2865, June 2000.","DOI":"10.17487\/rfc2865"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"P. Calhoun et al., \u201cDiameter Base Protocol\u201d, Internet-Draft, July 2002.","DOI":"10.17487\/rfc3588"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Aboba, Wood, \u201cAuthentication, Authorization and Accounting (AAA) Transport Profile\u201d, Internet-Draft, April 2002.","DOI":"10.17487\/rfc3539"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Postel, J. \u201cTransmission Control Protocol\\rd, RFC 793, January 1981.","DOI":"10.17487\/rfc0793"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"R. Stewart et al., \u201cStream Control Transmission Protocol\u201d, RFC 2960, October 2000.","DOI":"10.17487\/rfc2960"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"T. Dierks, C. Allen, \u201cThe TLS Protocol Version 1.0\u201d, RFC 2246, January 1999.","DOI":"10.17487\/rfc2246"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"S. Kent, R. Atkinson, \u201cSecurity Architecture for the Internet Protocol\u201d, RFC 2401, November 1998.","DOI":"10.17487\/rfc2401"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Nagle, J., \u201cCongestion Control in IP\/TCP\u201d, RFC 896, January 1984.","DOI":"10.17487\/rfc0896"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Handley, M., Padhye, J., Floyd, S., \u201cTCP Congestion Window Validation\u201d, RFC 2861, June 2000.","DOI":"10.17487\/rfc2861"}],"container-title":["Lecture Notes in Computer Science","Mobile Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36555-9_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T14:49:25Z","timestamp":1558277365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36555-9_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007326","9783540365556"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-36555-9_24","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}