{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:24Z","timestamp":1725560904714},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_6","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"69-83","source":"Crossref","is-referenced-by-count":3,"title":["Practical Solution for Location Privacy in Mobile IPv6"],"prefix":"10.1007","author":[{"given":"SuGil","family":"Choi","sequence":"first","affiliation":[]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"ByeongGon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Perkins, C.: IP Mobility Support, IETF RFC 2002 (October 1996)","DOI":"10.17487\/rfc2002"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: \u201dMobility Support in IPv6\u201d, IETF Internet- Draft, draft-ietf-mobileip-ipv6-21.txt, February 26 (2003)","DOI":"10.17487\/rfc3775"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Aboba, B., Beadles, M.: The Network Access Identifier, IETF RFC 2486 (January 1999)","DOI":"10.17487\/rfc2486"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Hinden, R., Deering, S.: Internet Protocol Version 6 (IPv6) Addressing Architecture, IETF RFC 3513 (April 2003)","DOI":"10.17487\/rfc3513"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Narten, T., Nordmark, E., Simpson, W.: Neighbor Discovery for IP Version 6 (IPv6), IETF RFC 2461 (December 1998)","DOI":"10.17487\/rfc2461"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"OShea, G., Roe, M.: Child-proof Authentication for MIPv6 (CAM). Computer Communication Review, ACM SIGCOMM\u00a031(2) (April 2001)","DOI":"10.1145\/505666.505668"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Samfat, D., Molva, R., Asokan, N.: Untraceability in Mobile Networks. In: Proceedings of the First Annual International Conference on Mobile Computing and Networking, ACM MOBICOM, November 13-15, pp. 26\u201336 (1995)","DOI":"10.1145\/215530.215548"},{"key":"6_CR8","unstructured":"Anonymizer.com, http:\/\/www.anonymizer.com"},{"issue":"2","key":"6_CR9","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return address, and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable Electronic Cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 319\u2013327. Springer, Heidelberg (1990)"},{"issue":"1","key":"6_CR11","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. Reiter","year":"1998","unstructured":"Reiter, M., Rubin, A.: Crowds: anonymity for web trasactions. ACM Transactions on Information System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information System Security"},{"issue":"4","key":"6_CR12","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"M. Reed","year":"1998","unstructured":"Reed, M., Syverson, P., Goldschag, D.: Anonymous connections and Onion Routing. IEEE J. Selected Areas in Commun\u00a016(4), 482\u2013494 (1998)","journal-title":"IEEE J. Selected Areas in Commun"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Lopatik, T., Eckert, C., Baumgarten, U.: MMIP-Mixed Mobile Internet Protocol. Communications and Multimedia Security, CMS (1997)","DOI":"10.1007\/978-0-387-35256-5_6"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:40:55Z","timestamp":1559331655000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}