{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:13:06Z","timestamp":1725664386372},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540586180"},{"type":"electronic","value":"9783540490340"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58618-0_54","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T11:38:12Z","timestamp":1330256292000},"page":"19-30","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Security versus performance requirements in data communication systems"],"prefix":"10.1007","author":[{"given":"Vasilios","family":"Zorkadis","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,7]]},"reference":[{"issue":"No.10","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"D. Chaum: Security Without Identification: Transaction Systems to Make Big Brother Obsolete, Communications of the ACM, Oct. 1985, V. 28, No. 10, pp. 1030\u20131044.","journal-title":"Communications of the ACM"},{"key":"2_CR2","unstructured":"D. W. Davies, W. L. Price: Security for Computer Networks, John Willey & Sons, Inc., Second Edition, 1989."},{"key":"2_CR3","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1016\/0167-4048(93)90041-3","volume":"12","author":"D. Gollmann","year":"1993","unstructured":"D. Gollmann, T. Beth, F. Damm: Authentication services in distributed systems, Computers & Security, 12 (1993), pp. 753\u2013764.","journal-title":"Computers & Security"},{"key":"2_CR4","unstructured":"M. J. Johnson: Using high-performance networks to enable computational aerosciences applications, Proc. of the IFIP WG6.1\/WG6.4 Third International Workshop on Protocols for High-Speed Networks, Stockholm, Sweden, 13\u201315 May, 1992, pp. 137\u2013152."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"R. R. Jueneman: Analysis of Certain Aspects of Output Feedback Mode, Proc. of CRYPTO 1982, Advances in Cryptology, Plenum Press 1983, pp. 99\u2013127.","DOI":"10.1007\/978-1-4757-0602-4_10"},{"key":"2_CR6","unstructured":"L. Kleinrock: Queueing Systems, Volume I: Theory, John Willey & Sons, Inc. 1975."},{"key":"2_CR7","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/0167-4048(87)90087-3","volume":"6","author":"A. Pfitzmann","year":"1987","unstructured":"A. Pfitzmann, M. Waidner: Networks without User Observability, Computers & Security, 6 (1987), pp. 158\u2013166.","journal-title":"Computers & Security"},{"key":"2_CR8","unstructured":"W. Stallings: SNMP, SNMPv2 and CMIP: the practical guide to network management standards, Addison-Wesley Publishing Company, Inc., 1993."},{"key":"2_CR9","unstructured":"J. J. Tardo, K. Alagappan: SPX: Global Authentication Using Public Key Certificates, Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20\u201322, 1991, pp. 232\u2013244."},{"key":"2_CR10","unstructured":"A. S. Tanenbaum: Computer Networks, Prentice-Hall International Editions, Second Edition, 1989."},{"key":"2_CR11","unstructured":"ISO 7498-2: Security Architecture."},{"key":"2_CR12","unstructured":"CCITT 509: Authentication Framework."},{"key":"2_CR13","unstructured":"ANS CO+RE Systems, Inc.: Interlock 2.1 and ANSKeyRing, (18.08.1993)."},{"key":"2_CR14","unstructured":"D. Bertsekas, R. Gallager: Data Netwotks, Prentice-Hall International Editions, 1987."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 94"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58618-0_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:05:21Z","timestamp":1559505921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58618-0_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540586180","9783540490340"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-58618-0_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]},"assertion":[{"value":"7 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}