{"id":"https://openalex.org/W2273997988","doi":"https://doi.org/10.17487/rfc6054","title":"Using Counter Modes with Encapsulating Security Payload (ESP) and Authentication Header (AH) to Protect Group Traffic","display_name":"Using Counter Modes with Encapsulating Security Payload (ESP) and Authentication Header (AH) to Protect Group Traffic","publication_year":2010,"publication_date":"2010-11-01","ids":{"openalex":"https://openalex.org/W2273997988","doi":"https://doi.org/10.17487/rfc6054","mag":"2273997988"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc6054","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"report","type_crossref":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":"http://www.hakusan.tsg.ne.jp/~tjkawa/www.ietf.org/rfc/pdf/rfc6054.txt.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011885435","display_name":"David McGrew","orcid":"https://orcid.org/0009-0007-4033-8662"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"D. McGrew","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5065785787","display_name":"B. Weis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"B. Weis","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":3,"citation_normalized_percentile":{"value":0.669304,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":75,"max":77},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9976,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9965,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.7988836},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.780174},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5835684},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated Encryption","score":0.49759725}],"concepts":[{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.7988836},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.780174},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6104882},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5835684},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.54124475},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5177057},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5097937},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.50140977},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.49759725},{"id":"https://openalex.org/C60448319","wikidata":"https://www.wikidata.org/wiki/Q154021","display_name":"Block cipher mode of operation","level":2,"score":0.44162387},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4212672},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39976865},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.36057657},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0783425}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc6054","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.639.1024","pdf_url":"http://www.hakusan.tsg.ne.jp/~tjkawa/www.ietf.org/rfc/pdf/rfc6054.txt.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.639.1024","pdf_url":"http://www.hakusan.tsg.ne.jp/~tjkawa/www.ietf.org/rfc/pdf/rfc6054.txt.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.63}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":29,"referenced_works":["https://openalex.org/W1584402831","https://openalex.org/W1659227964","https://openalex.org/W1744779065","https://openalex.org/W1913497436","https://openalex.org/W1923289336","https://openalex.org/W1992371956","https://openalex.org/W2002790712","https://openalex.org/W2042708196","https://openalex.org/W2060108852","https://openalex.org/W2103227860","https://openalex.org/W2140471436","https://openalex.org/W2161015635","https://openalex.org/W2185409408","https://openalex.org/W2234576477","https://openalex.org/W2242153142","https://openalex.org/W2244596055","https://openalex.org/W2253199766","https://openalex.org/W2254691854","https://openalex.org/W2255552078","https://openalex.org/W2268491029","https://openalex.org/W2310118633","https://openalex.org/W4210921465","https://openalex.org/W4213130208","https://openalex.org/W4214744223","https://openalex.org/W4214831726","https://openalex.org/W4232099779","https://openalex.org/W4249844516","https://openalex.org/W4298921906","https://openalex.org/W4300591638"],"related_works":["https://openalex.org/W3181142297","https://openalex.org/W315341419","https://openalex.org/W3018721592","https://openalex.org/W2965373468","https://openalex.org/W2937858566","https://openalex.org/W2935676858","https://openalex.org/W2876925721","https://openalex.org/W2869494227","https://openalex.org/W2868269635","https://openalex.org/W2854060435","https://openalex.org/W2841104228","https://openalex.org/W2833630317","https://openalex.org/W2818878282","https://openalex.org/W2800480030","https://openalex.org/W2795949805","https://openalex.org/W2566746437","https://openalex.org/W2431793705","https://openalex.org/W2189049405","https://openalex.org/W1533465657","https://openalex.org/W1021656161"],"abstract_inverted_index":{"Counter":[0],"modes":[1,15,36],"have":[2],"been":[3],"defined":[4],"for":[5],"block":[6],"ciphers":[7],"such":[8],"as":[9],"the":[10,32,40],"Advanced":[11],"Encryption":[12],"Standard":[13],"(AES).Counter":[14],"use":[16,33],"a":[17,27],"counter,":[18],"which":[19],"is":[20],"typically":[21],"assumed":[22],"to":[23,39],"be":[24],"incremented":[25],"by":[26],"single":[28],"sender.This":[29],"memo":[30],"describes":[31],"of":[34],"counter":[35],"when":[37],"applied":[38],"Encapsulating":[41],"Security":[42],"Payload":[43],"(ESP)":[44],"and":[45],"Authentication":[46],"Header":[47],"(AH)":[48],"in":[49],"multiple-sender":[50],"group":[51],"applications.":[52]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2273997988","counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2024-12-13T19:32:46.653851","created_date":"2016-06-24"}