{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:43:41Z","timestamp":1743043421582,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271514"},{"type":"electronic","value":"9783319271521"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27152-1_10","type":"book-chapter","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T23:55:10Z","timestamp":1449618910000},"page":"185-199","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generating Unlinkable IPv6 Addresses"],"prefix":"10.1007","author":[{"given":"Mwawi Nyirenda","family":"Kayuni","sequence":"first","affiliation":[]},{"given":"Mohammed Shafiul Alam","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Wanpeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chris J.","family":"Mitchell","sequence":"additional","affiliation":[]},{"given":"Po-Wah","family":"Yau","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Narten, T., Draves, R., Krishnan, S.: Privacy extensions for stateless address autoconfiguration in IPv6. RFC 4941, Internet Engineering Task Force (2007)","DOI":"10.17487\/rfc4941"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Hinden, R., Deering, S.: IP version 6 addressing architecture. RFC 4291, Internet Engineering Task Force (2006)","DOI":"10.17487\/rfc4291"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Thomson, S., Narten, T., Jinmei, T.: IPv6 stateless address autoconfiguration. RFC 4862, Internet Engineering Task Force (2007)","DOI":"10.17487\/rfc4862"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., Carney, M.: Dynamic host configuration protocol for IPv6 (DHCPv6). RFC 3315, Internet Engineering Task Force (2003)","DOI":"10.17487\/rfc3315"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Gont, F.: A method for generating semantically opaque interface identifiers with IPv6 Stateless address autoconfiguration (SLAAC). Internet Engineering Task Force, Internet draft-ietf-6man-stable-privacy-addresses-17 (2014)","DOI":"10.17487\/rfc7217"},{"key":"10_CR6","unstructured":"Cooper, A., Gont, F., Thaler, D.: Privacy considerations for IPv6 address generation mechanisms. Internet Engineering Task Force, Internet draft-ietf-6man-ipv6-address-generation-privacy-01 (2014)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 message-digest algorithm. RFC 1321, Internet Engineering Task Force (1992)","DOI":"10.17487\/rfc1321"},{"key":"10_CR8","unstructured":"Broersma, R.: IPv6 everywhere: living with a fully IPv6-enabled environment. Presentation at the Australian IPv6 Summit 2010, Melbourne, Australia (2010)"},{"key":"10_CR9","unstructured":"International Organization for Standardization Gen\u00e8ve, Switzerland: ISO\/IEC 10118\u20133, Information technology \u2013 Security techniques \u2013 Hash-functions \u2013 Part 3: Dedicated hash-functions. 3rd edn. (2004)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Rafiee, H., Meinel, C.: Privacy and security in IPv6 networks: challenges and possible solutions. In: Elci, A., Gaur, M.S., Orgun, M.A., Makarevich, O.B. (eds.) The 6th International Conference on Security of Information and Networks, SIN 2013, 26\u201328 November 2013, Aksaray, Turkey, pp. 218\u2013224. ACM (2013)","DOI":"10.1145\/2523514.2527004"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-37119-6_10","volume-title":"Foundations and Practice of Security","author":"A AlSa\u2019deh","year":"2013","unstructured":"AlSa\u2019deh, A., Rafiee, H., Meinel, C.: IPv6 stateless address autoconfiguration: balancing between security, privacy and usability. In: Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A., Tawbi, N. (eds.) FPS 2012. LNCS, vol. 7743, pp. 149\u2013161. Springer, Heidelberg (2013)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Rafiee, H., Meinel, C.: SSAS: a simple secure addressing scheme for IPv6 autoconfiguration. In: Castella-Roca, J., Domingo-Ferrer, J., Garcia-Alfaro, J., Ghorbani, A.A., Jensen, C.D., Manjon, J.A., Onut, I.V., Stakhanova, N., Torra, V., Zhang, J. (eds.) Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10\u201312 July 2013, Tarragona, Catalonia, Spain, pp. 275\u2013282. IEEE (2013)","DOI":"10.1109\/PST.2013.6596063"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Aura, T.: Cryptographically generated addresses (CGA). RFC 3972, Internet Engineering Task Force (2005)","DOI":"10.17487\/rfc3972"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Schiller, J., Crocker, S.: Randomness requirements for security. RFC 4086, Internet Engineering Task Force (2005)","DOI":"10.17487\/rfc4086"},{"key":"10_CR15","unstructured":"Lenstra, A.K., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Ron was wrong, Whit is right. Cryptology ePrint Archive: Report 2012\/62 (2012)"},{"key":"10_CR16","unstructured":"Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S., Anderson, R.: Chip and Skim: cloning EMV cards with the pre-play attack (2012). \n                      arXiv:1209.2531\n                      \n                     [cs.CY]"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Degabriele, J.P., Paterson, K.G.: Attacking the IPsec standards in encryption-only configurations. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20\u201323 May 2007, Oakland, California, USA, pp. 335\u2013349. IEEE Computer Society Press, Los Alamitos (2007)","DOI":"10.1109\/SP.2007.8"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Fahl, S., Harbach, M., Muders, T., Smith, M., Baumg\u00e4rtner, L., Freisleben, B.: Why Eve and Mallory love Android: an analysis of Android SSL (in)security. In: Yu, T., Danezis, G., Gligor, V.D., (eds.) ACM Conference on Computer and Communications Security, CCS 2012, 16\u201318 October 2012, Raleigh, NC, USA, pp. 50\u201361. ACM (2012)","DOI":"10.1145\/2382196.2382205"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Georgiev, M., Iyengar, S., Jana, S., Anubhai, R., Boneh, D., Shmatikov, V.: The most dangerous code in the world: validating SSL certificates in non-browser software. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM Conference on Computer and Communications Security, CCS 2012, 16\u201318 October 2012, Raleigh, NC, USA, pp. 38\u201349. ACM (2012)","DOI":"10.1145\/2382196.2382204"},{"key":"10_CR20","unstructured":"International Organization for Standardization Gen\u00e8ve, Switzerland: ISO\/IEC 18031:2011, Information technology \u2013 Security techniques \u2013 Encryption algorithms \u2013 Random bit generation. 2nd edn. (2011)"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1049\/PBPC006E_ch3","volume-title":"Trusted Computing","author":"E Gallery","year":"2005","unstructured":"Gallery, E.: An overview of trusted computing technology. In: Mitchell, C.J. (ed.) Trusted Computing, pp. 29\u2013114. IEE Press, London (2005)"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27152-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T17:02:13Z","timestamp":1559322133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27152-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271514","9783319271521"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27152-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}