{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:48:26Z","timestamp":1743083306473,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475710243"},{"type":"electronic","value":"9780387355849"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/978-0-387-35584-9_17","type":"book-chapter","created":{"date-parts":[[2012,8,10]],"date-time":"2012-08-10T10:37:05Z","timestamp":1344595025000},"page":"279-292","source":"Crossref","is-referenced-by-count":0,"title":["NAAP: A User-To-Network Authentication Protocol"],"prefix":"10.1007","author":[{"given":"Henry","family":"Haverinen","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Nokia Operator wireless LAN WWW page, \n                    http:\/\/www.nokia.com\/networks\/wireless_lan\/index.html\n                    \n                  , August 2001"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"W. Simpson, Editor, \u201c The Point-to-Point Protocol (PPP)\u201d, IETF Request For Comments 1661, July 1994","DOI":"10.17487\/rfc1661"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"C. Rigney, S. Willens, A. Rubens, W. Simpson, \u201cRemote Authentication Dial In User Service ( RADIUS)\u201d, IETF Request For Comments 2865, June 2000.","DOI":"10.17487\/rfc2865"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"C. Rigney, \u201cRADIUS Accounting\u201d, IETF Request For Comments 2866, June 2000.","DOI":"10.17487\/rfc2866"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"C. Rigney, W. Willats, P. Calhoun, \u201cRADIUS Extensions\u201d, IETF Request For Comments 2869, June 2000.","DOI":"10.17487\/rfc2869"},{"key":"17_CR6","unstructured":"The Diameter protocol is being specified in the IETF and it is currently work in progress. Current versions of the Diameter documents are available at \n                    http:\/\/www.ietf.org\/html.charters\/aaa-charter.html\n                    \n                   (October 2001)"},{"key":"17_CR7","first-page":"1996","volume-title":"IP Mobility Support","author":"C Perkins","year":"2002","unstructured":"C. Perkins, \u201cIP Mobility Support\u201d, Internet Engineering Task Force, Request For Comments 2002, 1996."},{"key":"17_CR8","first-page":"1996","volume-title":"IP Encapsulation within IP","author":"C Perkins","year":"2003","unstructured":"C. Perkins, \u201cIP Encapsulation within IP\u201d, Internet Engineering Task Force, Request For Comments 2003, 1996"},{"key":"17_CR9","first-page":"1996","volume-title":"Minimal Encapsulation within IP","author":"C Perkins","year":"2004","unstructured":"C. Perkins, \u201cMinimal Encapsulation within IP\u201d, Internet Engineering Task Force, Request For Comments 2004, 1996"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"J. Solomon, \u201cApplicability Statement for IP Mobility Support\u201d, Internet Engineering Task Force, Request For Comments 2005, 1996","DOI":"10.17487\/rfc2005"},{"key":"17_CR11","first-page":"1996","volume-title":"The Definitions of Managed Objects for IP Mobility Support using SMIv2","author":"D Cong","year":"2006","unstructured":"D. Cong, M. Hamlen, C. Perkins, \u201cThe Definitions of Managed Objects for IP Mobility Support using SMIv2\u201d, Internet Engineering Task Force, Request For Comments 2006, 1996"},{"key":"17_CR12","first-page":"1998","volume-title":"Reverse Tunneling for Mobile IP","author":"G Montenegro","year":"2344","unstructured":"]G. Montenegro, \u201cReverse Tunneling for Mobile IP\u201d, Internet Engineering Task Force, Request For Comments 2344, 1998"},{"key":"17_CR13","first-page":"1998","volume-title":"PPP Extensible Authentication Protocol","author":"L Blunk","year":"2284","unstructured":"L. Blunk, J. Vollbrecht, \u201cPPP Extensible Authentication Protocol ( EAP)\u201d, IETF Request for Comments: 2284, March 1998"},{"key":"17_CR14","first-page":"1999","volume-title":"The Network Access Identifier","author":"B Aboba","year":"2486","unstructured":"]B. Aboba and M. Beadles, \u201cThe Network Access Identifier\u201d, Internet Engineering Task Force, Request For Comments 2486, January 1999."},{"key":"17_CR15","first-page":"1997","volume-title":"HMAC: Keyed-Hashing for Message Authentication","author":"H Krawczyk","year":"2104","unstructured":"]H. Krawczyk, M. Bellare, R. Canetti, \u201cHMAC: Keyed-Hashing for Message Authentication\u201d, Internet Engineering Task Force, Request For Comments 2104, February 1997"},{"key":"17_CR16","volume-title":"The MD5 Message-Digest Algorithm","author":"R Rivest","year":"1321","unstructured":"R. Rivest, \u201cThe MD5 Message-Digest Algorithm\u201d, Internet Engineering Task Force, Request For Comments 1321, April"}],"container-title":["IFIP Advances in Information and Communication Technology","Smart Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-35584-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T20:27:46Z","timestamp":1557174466000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-35584-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9781475710243","9780387355849"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-35584-9_17","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2002]]}}}