{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:23:22Z","timestamp":1725809002225},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/infocom.2017.8057011","type":"proceedings-article","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T16:28:21Z","timestamp":1507220901000},"page":"1-9","source":"Crossref","is-referenced-by-count":20,"title":["Securing multipath TCP: Design & implementation"],"prefix":"10.1109","author":[{"given":"Mathieu","family":"Jadin","sequence":"first","affiliation":[]},{"given":"Gautier","family":"Tihon","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1504\/IJIPT.2011.043675"},{"key":"ref31","article-title":"TLS Authentication for MPTCP","author":"paasch","year":"2016","journal-title":"internet draft draft-paasch-mptcp-tls-authentication-00 work in progress"},{"key":"ref30","article-title":"Secure MPTCP","author":"bagnulo","year":"2014","journal-title":"internet draft draft-bagnulo-mptcp-secure-00 work in progress"},{"key":"ref10","first-page":"26","article-title":"The case for ubiquitous transport-level encryption","author":"bittau","year":"2010","journal-title":"USENIX Security'10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6181"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7430"},{"key":"ref13","article-title":"Security assessment of the transmission control protocol (TCP)","author":"gont","year":"2009","journal-title":"Internet-Draft draft-gont-tcp-security-00"},{"journal-title":"MultiPath TCP in the Linux Kernel","year":"0","author":"paasch","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2342468.2342476"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452342"},{"key":"ref17","first-page":"29","article-title":"How hard can it be? Designing and implementing a deployable Multipath TCP","author":"raiciu","year":"2012","journal-title":"NSDI'12"},{"key":"ref18","article-title":"TCP extensions for Multipath operation with multiple addresses","author":"ford","year":"2016","journal-title":"Internet-Draft draft-ietf-mptcp-rfc6824bis-07"},{"key":"ref19","article-title":"TCP-ENO: Encryption negotiation option","author":"bittau","year":"2016","journal-title":"Internet-Draft draft-ietf-tcpinc-tcpeno-06"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04918-2_18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7258"},{"journal-title":"Scapy","year":"2007","author":"biondi","key":"ref27"},{"key":"ref3","article-title":"Multipath TCP deployments","author":"bonaventure","year":"2016","journal-title":"IET Journal"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5927"},{"key":"ref29","article-title":"MPTLS: Making TLS and Multipath TCP stronger together","author":"bonaventure","year":"2014","journal-title":"internet draft draft-bonaventure-mptcp-tls-00 work in progress"},{"journal-title":"SSL and TLS Designing and Building Secure Systems","year":"2000","author":"rescorla","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2385"},{"journal-title":"Improving TCP's Robustness to Blind In-Window Attacks","year":"2010","author":"ramaiah","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6824"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5925"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0793"},{"key":"ref20","article-title":"Cryptographic protection of TCP streams (tcpcrypt)","author":"bittau","year":"2016","journal-title":"Internet-Draft draft-ietf-tcpinc-tcpcrypt-03"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5116"},{"key":"ref21","article-title":"Using TLS to protect TCP streams","author":"rescorla","year":"2016","journal-title":"Internet draft draft-ietf-tcpinc-use-tls-01"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_34"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5705"},{"journal-title":"The GNU\/Linux CryptoAPI","year":"0","author":"mueller","key":"ref26"},{"key":"ref25","article-title":"QUIC: A UDP-Based Multiplexed and Secure Transport","author":"hamilton","year":"2017","journal-title":"internet draft draft-ietf-quic-transport-01"}],"event":{"name":"IEEE INFOCOM 2017 - IEEE Conference on Computer Communications","start":{"date-parts":[[2017,5,1]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2017,5,4]]}},"container-title":["IEEE INFOCOM 2017 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8049192\/8056940\/08057011.pdf?arnumber=8057011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T17:51:05Z","timestamp":1509126665000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8057011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/infocom.2017.8057011","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}