{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:52Z","timestamp":1725902932793},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_31","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:02:27Z","timestamp":1499155347000},"page":"330-341","source":"Crossref","is-referenced-by-count":1,"title":["An Anonymous Authentication Scheme Based on Group IBS for PMIPv6 Network"],"prefix":"10.1007","author":[{"given":"Tianhan","family":"Gao","sequence":"first","affiliation":[]},{"given":"Xinyang","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"issue":"2","key":"31_CR1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MWC.2008.4492976","volume":"15","author":"KS Kong","year":"2008","unstructured":"Kong, K.S., Lee, W.J.: Mobility management for all-IP mobile networks: mobile IPv6 vs. proxy mobile IPv6. IEEE Wirel. Commun. 15(2), 36\u201345 (2008)","journal-title":"IEEE Wirel. Commun."},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Vogt, C., Kempf, J.: Security Threats to Network-Based Localized Mobility Management (NETLMM). Heise Zeitschriften Verlag (2007)","DOI":"10.17487\/rfc4832"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Zhou, H.C., Zhang, H.K., Qin, Y.J.: An authentication protocol for proxy mobile IPv6. In: The International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2008, Wuhan, China, pp. 129\u2013136, 1873\u20131880, December 2008","DOI":"10.1109\/MSN.2008.27"},{"key":"31_CR4","first-page":"26","volume":"36","author":"Z Zhang","year":"2009","unstructured":"Zhang, Z., Cui, G.: Secure access authentication scheme in mobile IPv6 networks. Comput. Sci. 36, 26\u201331 (2009)","journal-title":"Comput. Sci."},{"key":"31_CR5","first-page":"109","volume":"48","author":"J Lv","year":"2012","unstructured":"Lv, J., Zhou, H., Qiu, L., et al.: Implement of authentication and authorization of proxy mobile IPv6. Comput. Eng. Appl. 48, 109\u2013116 (2012)","journal-title":"Comput. Eng. Appl."},{"key":"31_CR6","unstructured":"Qiu, L.: Implementation of Authentication and Authorization in PMIPv6 Environment, Beijing (2011)"},{"key":"31_CR7","unstructured":"Zhang, L., Mo, T., Zhao, L.: Authentication scheme based on certificateless signcryption in proxy mobile IPv6 network. Appl. Res. Comput. 29 (2012)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Song, J., Han, S.: One-time key authentication protocol for PMIPv6. In: Third International Conference on Convergence and Hybrid Information Technology, ICCIT 2008, vol. 2, pp. 1150\u20131153. IEEE (2008)","DOI":"10.1109\/ICCIT.2008.86"},{"key":"31_CR9","unstructured":"Tripathi, A.K., Radhakrishanan, R., Lather, J.S.: One Time Authentication Scheme (OTAS) for Reducing Handover Latency in Proxy Mobile IPv6"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Lee, J.H., Lee, J.H., Chung, T.M.: Ticket-based authentication mechanism for proxy mobile IPv6 environment. In: 3rd International Conference on Systems and Networks Communications, ICSNC 2008, pp. 304\u2013309. IEEE (2008)","DOI":"10.1109\/ICSNC.2008.25"},{"issue":"1","key":"31_CR11","first-page":"107","volume":"6","author":"H Kim","year":"2010","unstructured":"Kim, H., Lee, J.H.: Diffie-Hellman key based authentication in proxy mobile IPv6. Mob. Inf. Syst. 6(1), 107\u2013121 (2010)","journal-title":"Mob. Inf. Syst."},{"key":"31_CR12","first-page":"12","volume":"11","author":"K Imran","year":"2014","unstructured":"Imran, K., Mahfooz, S., Rauf, A., et al.: Enhanced authentication scheme for proxy mobile IPv6. Life Sci. J. 11, 12\u201318 (2014)","journal-title":"Life Sci. J."},{"key":"31_CR13","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology-CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) Advances in Cryptology-CRYPTO 2001, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"31_CR14","series-title":"LNCS","first-page":"257","volume-title":"Advances in Cryptology-EUROCRYPT 1991","author":"D Chaum","year":"1991","unstructured":"Chaum, D., Heyst, E.: Group signatures. In: Davies, D.W. (ed.) Advances in Cryptology-EUROCRYPT 1991. LNCS, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"31_CR15","unstructured":"Chen, X., Zhang, F., Konidala, D.M., et al.: A new ID-based group signature scheme from bilinear pairings. In: Proceedings of International Workshop on Information Security Applications, vol. 3348, pp. 585\u2013592 (2003)"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Proceedings of ASIACRYPT, pp. 514\u2013532 (2001)","DOI":"10.1007\/3-540-45682-1_30"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Wu, H.T., Yein, A.D., Hsieh, W.S.: Message authentication mechanism and privacy protection in the context of vehicular ad hoc networks. Math. Probl. Eng. (2015)","DOI":"10.1155\/2015\/569526"},{"key":"31_CR18","unstructured":"Han, M., Hua, L., Ma, S.: A self-authentication, deniable efficient group key agreement protocol for VANET (2016). arXiv preprint \narXiv:1611.09009"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:14:49Z","timestamp":1499156089000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_31","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}