{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:01:24Z","timestamp":1742947284225,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540229872"},{"type":"electronic","value":"9783540301080"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30108-0_19","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T14:15:03Z","timestamp":1284646503000},"page":"309-321","source":"Crossref","is-referenced-by-count":4,"title":["Hindering Eavesdropping via IPv6 Opportunistic Encryption"],"prefix":"10.1007","author":[{"given":"Claude","family":"Castelluccia","sequence":"first","affiliation":[]},{"given":"Gabriel","family":"Montenegro","sequence":"additional","affiliation":[]},{"given":"Julien","family":"Laganier","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Neumann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Steve, B.: Wiretapping the net. The Bridge, National Academy of Engineering (2000)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Richardson, M., Redelmeier, R.: Opportunistic Encryption unsing the Internet Key Exchange (IKE), IETF, draft-richardson-ipsec-opportunistic-13.txt (February 2004)","DOI":"10.17487\/rfc4322"},{"key":"19_CR3","unstructured":"Arends, R., Larson, M., Massey, D., Rose, S.: DNS Security Introduction and Requirements, IETF, draft-ietf-dnsext-dnssec-intro-02 (July 2002)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Montenegro, G., Castelluccia, C.: Crypto-based identifiers (CBIDs): Concepts and applications. ACM Transactions on Information and Systems Security (TISSEC)\u00a07(1) (February 2004)","DOI":"10.1145\/984334.984338"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet Key Exchange (IKE), IETF, RFC2409 (November 1998)","DOI":"10.17487\/rfc2409"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Richardson, M.: A Method for Storing IPsec Keying Material in DNS, IETF, draft-ietf-ipseckey-rr-09.txt (February 2004)","DOI":"10.17487\/rfc4025"},{"key":"19_CR7","unstructured":"Bellovin, S.: Using the domain name system for system break-ins. In: Fifth Usenix UNIX Security Symposium (July 1995)"},{"issue":"1","key":"19_CR8","first-page":"1","volume":"16","author":"C. Ellison","year":"2000","unstructured":"Ellison, C., Schneier, B.: \u201cTen risks of PKI: What you\u2019re not being told about public key infrastructure. Computer Security Journal\u00a016(1), 1\u20137 (2000)","journal-title":"Computer Security Journal"},{"key":"19_CR9","unstructured":"Hinden, B., Deering, S.: IP Version6 Addressing Architecture, IETF, RFC3513 (April 2003)"},{"key":"19_CR10","unstructured":"Haberman, B., Thaler, D.: Host-based Anycast using MLD, IETF, drafthaberman- ipngwg-host-anycast-00.txt (February 2001)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"O\u2019Shea, G., Roe, M.: \u201dChild-proof Authentication for MIPv6 (CAM). ACM Computer Communications Review (April 2001)","DOI":"10.1145\/505666.505668"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/10958513_3","volume-title":"Information Security","author":"T. Aura","year":"2003","unstructured":"Aura, T.: Cryptographically generated addresses (CGA). In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 29\u201343. Springer, Heidelberg (2003)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Ellison, C., et al.: SPKI Certificate Theory, IETF, RFC 2693 (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust- Management System Version 2, IETF, RFC2704 (September 1999)","DOI":"10.17487\/rfc2704"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Farrel, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, IETF, RFC3281 (April 2002)","DOI":"10.17487\/rfc3281"},{"key":"19_CR16","unstructured":"Ellison, C., et al.: SPKI Examples, IETF Internet Draft, Internet Draft, (March 1998), Available at \n                  \n                    http:\/\/world.std.com\/cme\/examples.txt"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Johnson, D., Deering, S.: Reserved IPv6 Subnet Anycast Addresses, IETF, RFC2526 (March 1999)","DOI":"10.17487\/rfc2526"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H. Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: The SIG-and-MAc approach to authenticated diffiehellman and its use in the ike protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 400\u2013425. Springer, Heidelberg (2003)"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols anf their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, p. 453. Springer, Heidelberg (2001)"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Kaufman, C.: Internet Key Exchange IKEv2 Protocol, IETF, draft-ietf-ipsec-ikev2- 13.txt (March 2004)","DOI":"10.17487\/rfc4306"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"McDonald, D., Metz, C., Phan, B.: PF KEY Key Management API, Version 2, IETF, RFC2367 (July 1998)","DOI":"10.17487\/rfc2367"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2004"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30108-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:33:56Z","timestamp":1559507636000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30108-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229872","9783540301080"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30108-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}