{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:01:13Z","timestamp":1725552073426},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308560"},{"type":"electronic","value":"9783540322764"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11599463_105","type":"book-chapter","created":{"date-parts":[[2005,12,5]],"date-time":"2005-12-05T09:50:56Z","timestamp":1133776256000},"page":"1073-1080","source":"Crossref","is-referenced-by-count":1,"title":["Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method"],"prefix":"10.1007","author":[{"given":"Jian-xin","family":"Li","sequence":"first","affiliation":[]},{"given":"Jin-peng","family":"Huai","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xian-xian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"105_CR1","unstructured":"Perkins, C.: IP mobility support. IETF RFC, RFC 2002 (1996), http:\/\/www.ietf.org\/rfc\/"},{"key":"105_CR2","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: IETF RFC 3775, Mobility Support in IPv6 (2004)","DOI":"10.17487\/rfc3775"},{"key":"105_CR3","doi-asserted-by":"crossref","unstructured":"Arkko, J., Devarapalli, V., Dupont, F.: IETF RFC 3776, Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents (2004)","DOI":"10.17487\/rfc3776"},{"key":"105_CR4","unstructured":"Bradner, S., Mankin, A., Schiller, J.I.: A Framework for Purpose-Built Keys (PBK) (2003), draft-bradner-pbk-frame-06.txt,IETF, http:\/\/www.ietf.org\/internet-drafts\/draft-bradner-pbk-frame-06.txt"},{"key":"105_CR5","doi-asserted-by":"crossref","unstructured":"O\u2019Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). Computer Communications Review (April 2001)","DOI":"10.1145\/505666.505668"},{"key":"105_CR6","unstructured":"Xiao, H.: Trust Management for Mobile IPv6 Binding Update. In: Proceedings of the International Conference on Security and Management, SAM 2003, Las Vegas, June 23-26 (2003)"},{"key":"105_CR7","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proceedings of the Royal Society of London A\u00a0426, 233\u2013271 (1989)","journal-title":"Proceedings of the Royal Society of London A"},{"key":"105_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-540-39871-4_18","volume-title":"Security Protocols","author":"T. Aura","year":"2004","unstructured":"Aura, T.: Mobile IPv6 Security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol.\u00a02845, pp. 215\u2013234. Springer, Heidelberg (2004)"},{"key":"105_CR9","volume-title":"Proc. IEEE Vehicular Technology Conference Fall 2003","author":"P. Nikander","year":"2003","unstructured":"Nikander, P., Arkko, J., Aura, T., Montenegro, G.: Mobile IP version 6 (MIPv6) Route Optimization Security Design. In: Proc. IEEE Vehicular Technology Conference Fall 2003, Orlando, FL USA. IEEE Press, Los Alamitos (2003)"},{"key":"105_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/11542322_29","volume-title":"Security Protocols","author":"J. Arkko","year":"2005","unstructured":"Arkko, J., Nikander, P.: Limitations of IPsec Policy Mechanisms. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol.\u00a03364, pp. 241\u2013251. Springer, Heidelberg (2005)"},{"issue":"2","key":"105_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Mobile Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11599463_105.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:58:24Z","timestamp":1619506704000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11599463_105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308560","9783540322764"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11599463_105","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}