{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T08:51:41Z","timestamp":1673686301562},"reference-count":0,"publisher":"RFC Editor","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.17487\/rfc5338","type":"report","created":{"date-parts":[[2015,4,11]],"date-time":"2015-04-11T20:09:05Z","timestamp":1428782945000},"source":"Crossref","is-referenced-by-count":7,"title":["Using the Host Identity Protocol with Legacy Applications"],"prefix":"10.17487","author":[{"given":"T.","family":"Henderson","sequence":"first","affiliation":[]},{"given":"P.","family":"Nikander","sequence":"additional","affiliation":[]},{"given":"M.","family":"Komu","sequence":"additional","affiliation":[]}],"member":"7045","published-online":{"date-parts":[[2008,9]]},"container-title":[],"original-title":[],"deposited":{"date-parts":[[2015,4,12]],"date-time":"2015-04-12T01:07:24Z","timestamp":1428800844000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.rfc-editor.org\/info\/rfc5338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":0,"URL":"https:\/\/doi.org\/10.17487\/rfc5338","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}