{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:34:55Z","timestamp":1725467695494},"publisher-location":"Boston","reference-count":18,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"038733405X"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-33406-8_33","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T04:55:55Z","timestamp":1153716955000},"page":"389-400","source":"Crossref","is-referenced-by-count":4,"title":["Secure Fast Handover in an Open Broadband Access Network using Kerberos-style Tickets"],"prefix":"10.1007","author":[{"given":"Martin Gilje","family":"Jaatun","sequence":"first","affiliation":[]},{"given":"Inger Anne","family":"T\u00f8ndel","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Paint","sequence":"additional","affiliation":[]},{"given":"Tor Hjalmar","family":"Johannessen","sequence":"additional","affiliation":[]},{"given":"John Charles","family":"Francis","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Duranton","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"OBAN Consortium. [Online]. Available: http:\/\/www.ist-oban.org"},{"issue":"9","key":"33_CR2","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/35.868152","volume":"38","author":"J. F. Huber","year":"2000","unstructured":"J. F. Huber, D. Weiler, and H. Brand, \u201cUMTS, the mobile multimedia vision for IMT 2000: a focus on standardization,\u201d IEEE Communications Magazine, vol. 38, no. 9, pp. 129\u2013136, 2000.","journal-title":"IEEE Communications Magazine"},{"key":"33_CR3","unstructured":"IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std. 802.16-2004, 2004."},{"key":"33_CR4","unstructured":"F. Steuer, M. Elkotob, S. Albayrak, H. Bryhni, and T. Lunde, \u201cSeamless Mobility over Broadband Wireless Networks,\u201d in Proceedings of 14th 1ST Mobile & Wireless Communications Summit, 2005."},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"E. Edvardsen, T. G. Eskedal, and A. \u00c5rnes, \u201cOpen Access Networks,\u201d in INTERWORKING, ser. IFIP Conference Proceedings, C. McDonald, Ed., vol. 247. Kluwer, 2002, pp. 91\u2013107.","DOI":"10.1007\/978-0-387-35673-0_8"},{"key":"33_CR6","unstructured":"M. G. Jaatun, I. A. T\u00f8ndel, M. B. Dahl, and T. J. Wilke, \u201cA Security Architecture for an Open Broadband Access Network,\u201d in Proceedings of the 10th Nordic Workshop on Secure IT Systems (Nordsec), 2005."},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"C. Rigney, S. Willens, A. Rubens, and W. Simpson, \u201cRemote Authentication Dial In User Service (RADIUS),\u201d RFC 2865, June 2000.","DOI":"10.17487\/rfc2865"},{"key":"33_CR8","unstructured":"J. F. Kurose and K. W. Ross, Computer Networking-A Top-Down Approach Featuring the Internet. Addison-Wesley, 2001."},{"key":"33_CR9","unstructured":"Port-Based Network Access Control, IEEE Std. 802.1X-2001, 2001."},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"C. Neuman, T. Yu, S. Hartman, and K. Raeburn, \u201cThe Kerberos Network Authentication Service (V5),\u201d RFC 4120, July 2005.","DOI":"10.17487\/rfc4120"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"T. Aura and M. Roe, \u201cReducing Reauthentication Delay in Wireless Networks,\u201d in Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), 2005.","DOI":"10.1109\/SECURECOMM.2005.58"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"H. Haverinen and J. Salowey, \u201cExtensible Authentication Protocol Method for Global System for Mobile Subscriber Identity Modules (EAP-SIM),\u201d RFC 4186, January 2006.","DOI":"10.17487\/rfc4186"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"D. Stanley, J. R. Walker, and B. Aboba, \u201cExtensible Authentication Protocol (EAP) Method Requirements for Wireless LANs,\u201d RFC 4017, March 2005.","DOI":"10.17487\/rfc4017"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"H. Chaskar, D. Funato, M. Liebsch, E. Shim, and A. Singh, \u201cCandidate Access Router Discovery (CARD),\u201d RFC 4066, July 2005.","DOI":"10.17487\/rfc4066"},{"key":"33_CR15","unstructured":"W. Stallings, Cryptography and Network Security-Principles and Practices. Prentice Hall, 2003."},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"B. Aboba, L. J. Blunk, J. R. Vollbrecht, J. Carlson, and H. Levkowetz, \u201cExtensible authentication protocol (EAP),\u201d RFC 3748, June 2004.","DOI":"10.17487\/rfc3748"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"B. Aboba and P. R. Calhoun, \u201cRADIUS (Remote Authentication Dial In User Service) support for Extensible Authentication Protocol (EAP),\u201d RFC 2865, June 2000.","DOI":"10.17487\/rfc2716"},{"issue":"5","key":"33_CR18","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCOM.2002.1006976","volume":"40","author":"C. E. Perkins","year":"2002","unstructured":"C. E. Perkins, \u201cMobile IP,\u201d IEEE Communications Magazine, vol. 40, no. 5, pp. 66\u201382, 2002.","journal-title":"IEEE Communications Magazine"}],"container-title":["IFIP International Federation for Information Processing","Security and Privacy in Dynamic Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-33406-8_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:17:24Z","timestamp":1605626244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-33406-8_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["038733405X"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/0-387-33406-8_33","relation":{},"subject":[]}}