{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:55:28Z","timestamp":1725468928025},"publisher-location":"Boston, MA","reference-count":13,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387231488"},{"type":"electronic","value":"9780387231501"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/0-387-23150-1_21","type":"book-chapter","created":{"date-parts":[[2006,1,3]],"date-time":"2006-01-03T09:08:53Z","timestamp":1136279333000},"page":"239-249","source":"Crossref","is-referenced-by-count":1,"title":["A Simple Privacy Extension for Mobile IPv6"],"prefix":"10.1007","author":[{"given":"Claude","family":"Castelluccia","sequence":"first","affiliation":[]},{"given":"Francis","family":"Dupont","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"Montenegro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Arkko, J., Devarapalli, V., and Dupont, F. (2004). Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents. IETF, RFC3676.","key":"21_CR1","DOI":"10.17487\/rfc3776"},{"key":"21_CR2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/10958513_3","volume":"2851","author":"T. Aura","year":"2003","unstructured":"Aura, T. (2003). Cryptographically generated addresses (CGA). In 6th Information Security Conference (ISC\u201903, volume 2851, pages 29\u201343, Bristol, UK. LNCS.","journal-title":"6th Information Security Conference (ISC\u201903"},{"unstructured":"Fasbender, A., Kesdogan, D., and Kubitz, O. (1996). Analysis of security and privacy in mobile ip.","key":"21_CR3"},{"doi-asserted-by":"crossref","unstructured":"Hinden, R., O\u2019Dell, M., and Deering, S. (1998). An IPv6 Aggregatable Global Unicast Address Format. IETF, RFC2364.","key":"21_CR4","DOI":"10.17487\/rfc2374"},{"unstructured":"Johnson, D., Perkins, C, and Arkko, J. (2004). Mobile IP for IPv6. IETF, RFC 3775.","key":"21_CR5"},{"unstructured":"Kaufman, C., E. (2004). Internet Key Exchange IKEv2 Protocol. IETF, draft-ietf-ipsec-ikev2-14.txt.","key":"21_CR6"},{"doi-asserted-by":"crossref","unstructured":"Montenegro, G. (2001). Reverse Tunneling for Mobile IP, revised. IETF, RFC3024.","key":"21_CR7","DOI":"10.17487\/rfc3024"},{"doi-asserted-by":"crossref","unstructured":"Montenegro, G. and Castelluccia, C. (2004). Crypto-Based Identifiers (cbids): Concepts and applications. ACM TISSEC, 7(1).","key":"21_CR8","DOI":"10.1145\/984334.984338"},{"doi-asserted-by":"crossref","unstructured":"Narten, T. and Draves, R. (2001). Privacy Extensions for Stateless Address Autoconfiguration in IPv6. IETF, RFC3041.","key":"21_CR9","DOI":"10.17487\/rfc3041"},{"doi-asserted-by":"crossref","unstructured":"O\u2019Shea, G. and Roe, M. (2001). \u201cChild-proof Authentication for MIPv6 (CAM). ACM Computer Communications Review.","key":"21_CR10","DOI":"10.1145\/505666.505668"},{"doi-asserted-by":"crossref","unstructured":"Reed, M. G., Syverson, P. F., and Goldschlag, D. M. (1998). Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4).","key":"21_CR11","DOI":"10.1109\/49.668972"},{"unstructured":"Soliman, H., Castelluccia, C, El-Malki, K., and Bellier, L. (2004). Hierarchical MIPv6 mobility management. IETF, draft-ietf-mipshop-hmipv6-01.txt, work in progress.","key":"21_CR12"},{"unstructured":"Thomson, S. and Narten, T. (1998). IPv6 Address Autoconfiguration. IETF, RFC2462.","key":"21_CR13"}],"container-title":["IFIP International Federation for Information Processing","Mobile and Wireless Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-23150-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T18:15:58Z","timestamp":1586628958000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-23150-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9780387231488","9780387231501"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/0-387-23150-1_21","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2005]]}}}