{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:36Z","timestamp":1725549336891},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_29","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"241-251","source":"Crossref","is-referenced-by-count":7,"title":["Limitations of IPsec Policy Mechanisms"],"prefix":"10.1007","author":[{"given":"Jari","family":"Arkko","sequence":"first","affiliation":[]},{"given":"Pekka","family":"Nikander","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Aboba, B., Tseng, J., Walker, J., Rangan, V., Travostino, F.: Securing Block Storage Protocols over IP. Internet Draft draft-ietf-ips-security-19.txt (Work In Progress), IETF (January 2003)","DOI":"10.17487\/rfc3723"},{"key":"29_CR2","unstructured":"Arkko, J.: Effects of ICMPv6 on IKE and IPsec Policies. Internet Draft draft-arkko-icmpv6-ike-effects-01.txt (Work in Progress), IETF (June 2002)"},{"key":"29_CR3","unstructured":"Arkko, J.: SEcure Neighbor Discovery (SEND). Internet Draft draft-arkko-send-ndopt-00.txt (Work in Progress), IETF (June 2003)"},{"key":"29_CR4","unstructured":"Arkko, J., Nikander, P., Kivinen, T., Rossi, M.: Manual SA Configuration for IPv6 Link Local Messages. Internet Draft draft-arkko-manual-icmpv6-sas-01 (Work in Progress), IETF (June 2002)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Arkko, J., Aura, T., Kempf, J., Mantyla, V.-M., Nikander, P., Roe, M.: Securing IPv6 Neighbor Discovery. In: Wireless Security Workshop (September 2002)","DOI":"10.1145\/570681.570690"},{"key":"29_CR6","unstructured":"Arkko, J., Kempf, J., Sommerfeld, B., Zill, B.: SEcure Neighbor Discovery (SEND). Internet Draft draft-ietf-send-ipsec-01.txt (Work in Progress), IETF (June 2003)"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Arkko, J., Devarapalli, V., Dupont, F.: Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents. Internet Draft draft-ietf-mobileip-mipv6-ha-ipsec-06.txt (Work in Progress), IETF (June 2003)","DOI":"10.17487\/rfc3776"},{"key":"29_CR8","unstructured":"Bellovin, S.: Guidelines for mandating the use of IPsec. Internet Draft draft-bellovin-useipsec-00.txt (Work in Progress), IETF (October 2002)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Blaze, M., et al.: The KeyNote Trust-Management System Version 2. RFC 2704, IETF (September 1999)","DOI":"10.17487\/rfc2704"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246, IETF (January 1999)","DOI":"10.17487\/rfc2246"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., Carney, M.: Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Internet Draft draft-ietf-dhc-dhcpv6-28.txt (Work in Progress), IETF (November 2002)","DOI":"10.17487\/rfc3315"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). RFC 2409, IETF (November 1998)","DOI":"10.17487\/rfc2409"},{"key":"29_CR13","unstructured":"Ionnadis, J.: Why don\u2019t we still have IPsec., dammit. NDSS 2003 (February 2003)"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. Internet Draft draft-ietf-mobileip-ipv6-24.txt (Work in Progress), IETF (June 2003)","DOI":"10.17487\/rfc3775"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP Authentication Header. RFC 2402, IETF (November 1998)","DOI":"10.17487\/rfc2402"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401, IETF (November 1998)","DOI":"10.17487\/rfc2401"},{"key":"29_CR17","unstructured":"Moskowitz, R., Nikander, P., Jokela, P.: Host Identity Payload and Protocol. Internet Draft draft-moskowitz-hip-07.txt (Work in Progress), IETF (June 2003)"},{"key":"29_CR18","unstructured":"Nikander, P.: Secure Neighbor Discovery using separate CGA extension header. Internet Draft (Work in Progress), IETF (June 2003)"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Patel, B., Aboba, B., Dixon, W., Zorn, G., Booth, S.: Securing L2TP using IPsec. RFC 3193, IETF (November 2001)","DOI":"10.17487\/rfc3193"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Narten, T., Draves, R.: Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 3041, IETF (January 2001)","DOI":"10.17487\/rfc3041"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Narten, T., Nordmark, E., Simpson, W.: Neighbor Discovery for IP Version 6 (IPv6). RFC 2461, IETF (December 1998)","DOI":"10.17487\/rfc2461"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"O\u2019Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). Computer Communications Review (April 2001)","DOI":"10.1145\/505666.505668"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: Guidelines for Writing RFC Text on Security Considerations. Internet Draft draft-iab-sec-cons-03.txt (Work in Progress), IETF (January 2003)","DOI":"10.17487\/rfc3552"},{"key":"29_CR24","unstructured":"Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-time Applications. RFC 1889, IETF (January 1996)"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Thomson, S., Narten, T.: IPv6 Stateless Address Autoconfiguration. RFC 2462, IETF (December 1998)","DOI":"10.17487\/rfc2462"},{"key":"29_CR26","unstructured":"Ylonen, T., Kivinen, T., Saarinen, M., Rinne, T., Lehtinen, S.: SSH protocol architecture. Internet Draft draft-ietf-secsh-architecture-12.txt (Work in Progress), IETF (January 2002)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:20Z","timestamp":1605644300000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11542322_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}