iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.17487/RFC5926
{"id":"https://openalex.org/W2288241587","doi":"https://doi.org/10.17487/rfc5926","title":"Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)","display_name":"Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2288241587","doi":"https://doi.org/10.17487/rfc5926","mag":"2288241587"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc5926","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"report","type_crossref":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032523717","display_name":"Gregory Lebovitz","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G. Lebovitz","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5046950468","display_name":"Eric Rescorla","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"E. Rescorla","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.724684,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.8736,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.8736,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7934,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11367","display_name":"Particle accelerators and beam dynamics","score":0.75,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/tcp-westwood","display_name":"TCP Westwood","score":0.60082734},{"id":"https://openalex.org/keywords/h-tcp","display_name":"H-TCP","score":0.47325093}],"concepts":[{"id":"https://openalex.org/C78816285","wikidata":"https://www.wikidata.org/wiki/Q7669752","display_name":"TCP Westwood","level":5,"score":0.60082734},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.58786315},{"id":"https://openalex.org/C30305156","wikidata":"https://www.wikidata.org/wiki/Q8069697","display_name":"Zeta-TCP","level":4,"score":0.5843659},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5286487},{"id":"https://openalex.org/C101452262","wikidata":"https://www.wikidata.org/wiki/Q7669757","display_name":"TCP acceleration","level":4,"score":0.4828875},{"id":"https://openalex.org/C128381798","wikidata":"https://www.wikidata.org/wiki/Q5627845","display_name":"H-TCP","level":5,"score":0.47325093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39748657},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30368745},{"id":"https://openalex.org/C33588617","wikidata":"https://www.wikidata.org/wiki/Q8803","display_name":"Transmission Control Protocol","level":3,"score":0.21859297},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc5926","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.42}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2354883111","https://openalex.org/W2319576544","https://openalex.org/W2171877207","https://openalex.org/W2167805780","https://openalex.org/W2166737481","https://openalex.org/W2153422491","https://openalex.org/W2103694908","https://openalex.org/W2083078985","https://openalex.org/W2052182446","https://openalex.org/W2010960493"],"abstract_inverted_index":{"The":[0],"TCP":[1],"Authentication":[2],"Option,":[3],"TCP-AO,":[4],"relies":[5],"on":[6],"security":[7],"algorithms\nto":[8],"provide":[9],"authentication":[10],"between":[11],"two":[12,20],"end-points.":[13],"There":[14],"are":[15,26],"many":[16],"such\nalgorithms":[17],"available,":[18],"and":[19,35],"TCP-AO":[21],"systems":[22],"cannot":[23],"interoperate\nunless":[24],"they":[25],"using":[27],"the":[28],"same":[29],"algorithms.":[30],"This":[31],"document":[32],"specifies":[33],"the\nalgorithms":[34],"attributes":[36],"that":[37],"can":[38],"be":[39],"used":[40],"in":[41],"TCP-AO's":[42],"current\nmanual":[43],"keying":[44],"mechanism.":[45]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2288241587","counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2024-12-10T17:22:04.249069","created_date":"2016-06-24"}