{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:33:12Z","timestamp":1740547992879,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_27","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"318-329","source":"Crossref","is-referenced-by-count":9,"title":["Re-thinking Security in IP Based Micro-Mobility"],"prefix":"10.1007","author":[{"given":"Jukka","family":"Ylitalo","sequence":"first","affiliation":[]},{"given":"Jan","family":"Mel\u00e9n","sequence":"additional","affiliation":[]},{"given":"Pekka","family":"Nikander","sequence":"additional","affiliation":[]},{"given":"Vesa","family":"Torvinen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Aura, T., Roe, M., Arkko, J.: Security of Internet Location Management. In: Proc. Asia-Pacific Computer Systems Architecture Conference, ACSAC 2002, Monash University, Melbourne, Australia (February 2002)","DOI":"10.1109\/CSAC.2002.1176281"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Campbell, A., Gomez, J., Kim, S., Valko, A., Wan, C., Turanyi, Z.: Design, implementation, and evaluation of Cellular IP. IEEE Personal Commun. Mag.\u00a07(4) (August 2000)","DOI":"10.1109\/98.863995"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Ramjee, R., Porta, T., Salgarelli, L., Thuel, S., Varadhan, K.: IP-based Access Network Infrastructure for next Generation Wireless Data Networks. IEEE Personal Commun. Mag.\u00a07(4) (August 2000)","DOI":"10.1109\/98.863994"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Grilo, A., Estrela, P., Nunes, M.: Terminal Independent Mobility for IP (TIMIP). IEEE Commun. Mag. (December 2001)","DOI":"10.1109\/35.968810"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Castelluccia, C.: HMIPv6: A Hierarchical Mobile IPv6 Proposal. ACM Mobile Computing and Communication Review (MC2R) (April 2000)","DOI":"10.1145\/360449.360474"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Perkins, C.: IP Mobility Support. RFC 2002 (1996)","DOI":"10.17487\/rfc2002"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC 3775 (2004)","DOI":"10.17487\/rfc3775"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Eardley, P., Mihailovic, M., Suihko, T.: A Framework for the Evaluation of IP Mobility Protocols. In: Proc. the 11th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) (September 2000)","DOI":"10.1109\/PIMRC.2000.881465"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Soliman, H., Castelluccia, C., El-Malki, K., Bellier, L.: Hierarchical Mobile IPv6 mobility management (HMIPv6). Internet Draft, work in progress (June 2004)","DOI":"10.17487\/rfc4140"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Mink, S., Pahlke, F., Schafer, G., Schiller, J.: Towards Secure Mobility Support for IP Networks. In: Proc. IFIP International Conference on Communication Technologies (ICCT) (August 2000)","DOI":"10.1109\/ICCT.2000.889265"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Mink, S., et al.: FATIMA: A Firewall-Aware Transparent Internet Mobility Architecture. In: Proc. the 5th IEEE Symposium on Computers and Communications (ISCC) (July 2000)","DOI":"10.1109\/ISCC.2000.860635"},{"issue":"11","key":"27_CR12","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. Mag. of ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Commun. Mag. of ACM"},{"key":"27_CR13","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.: Efficient Security Mechanism for Routing Protocols. In: Proc. Network and Distributed Systems Security Symposium (NDSS) (February 2003)"},{"issue":"11","key":"27_CR14","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Comm. of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Comm. of the ACM"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Blakely, G.: Safeguarding Cryptographic Keys. In: Proc. AFIPS National Computer Conference. pp. 313-317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"27_CR16","unstructured":"Canetti, R., Song, D., Tygar, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. IEEE Security and Privacy Symposium SP (May 2000)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Saltzer, J., Reed, D., Clark, D.: End-To-End Arguments in System Design. ACM Transactions on Computer Systems\u00a0 2 (November 1984)","DOI":"10.1145\/357401.357402"},{"key":"27_CR18","unstructured":"Nikander, P., Ylitalo, J., Wall, J.: Integrating Security, Mobility, and Multi-Homing in a HIP Way. In: Proc. Network and Distributed Systems Security Symposium (NDSS) (February 2003)"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Ghassemian, M., Aghvami, A.: Comparing different handoff schemes in IP based Micro-Mobility Protocols. In: Proc. IST (November 2002)","DOI":"10.1049\/cp:20020360"},{"key":"27_CR20","unstructured":"Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol. Internet Draft, work in progress (June 2004)"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Srisuresh, P., Holdrege, M.: IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663 (1999)","DOI":"10.17487\/rfc2663"},{"key":"27_CR22","unstructured":"Ylitalo, J., Nikander, P.: BLIND: A Complete Identity Protection Framework for End-points. In: Proc. the Twelfth International Workshop on Security Protocols (April 2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T22:37:23Z","timestamp":1740523043000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}