{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:17:31Z","timestamp":1725574651287},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540200512"},{"type":"electronic","value":"9783540394051"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39405-1_26","type":"book-chapter","created":{"date-parts":[[2011,1,8]],"date-time":"2011-01-08T20:03:04Z","timestamp":1294516984000},"page":"287-297","source":"Crossref","is-referenced-by-count":0,"title":["A Low-Cost Packet Originator Verification for Metering at Access-Routers"],"prefix":"10.1007","author":[{"given":"Bernd","family":"Lamparter","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Rigney, C., Livingston, S.W., Merit, A.R., Daydreamer, W.S.: Remote Authentication Dial In User Service (RADIUS). IETF RFC 2865 (2000)","DOI":"10.17487\/rfc2865"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Calhoun, P.R., Arkko, J., Guttman, E., Zorn, G., Loughney, J.: Diameter Base Protocol. Internet Draft, IETF (Junuary 2002) (work in progress)","DOI":"10.17487\/rfc3588"},{"key":"26_CR3","unstructured":"Glass, S., Hiller, T., Perkins, C.: Mobile IP AAA Requirements. IETF RFC 2977 (2000)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Braun, T., Ru, L., Stattenberger, G.: An AAA Architecture Extension for Providing Differentiated Services to Mobile IP Users. In: 6th IEEE Symposium on Computers and Communications (ISCC 2001), Hammamet, Tunesia (2001)","DOI":"10.1109\/ISCC.2001.935417"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Samfat, D., Molva, R., Asokan, N.: Untracebility in Mobile Networks. In: Procedings of MOBICOM 1995, Berkeley, CA (1995)","DOI":"10.1145\/215530.215548"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Zheng, Y.: An Authentication and Security Protocol for Mobile Computing. In: IFIP World Conference on Mobile Communications (1996)","DOI":"10.1007\/978-0-387-34980-0_25"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Looi, M.: Enhanced Authentication Services for Internet Systems using Mobile Networks. In: IEEE GLOBECOM 2001, San Antonio, Texas (2001)","DOI":"10.1109\/GLOCOM.2001.966326"},{"key":"26_CR8","unstructured":"ETSI TS 101 761-1: Broadband Radio Access Networks (BRAN), HIPERLAN Type 2, Data Link Control (DLC) Layer, Part 1: Basic Transport Functions"},{"key":"26_CR9","unstructured":"O\u2019Hara, B., Petrick, A.: IEEE 802.11 Handbook A Designer\u2019s Companion. Standards Information Press\/IEEE Press (1999)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. In: ACM MOBICOM 2001 (2001)","DOI":"10.1145\/381677.381695"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security architecture for the Internet Protocol. IETF RFC 2401 (1998)","DOI":"10.17487\/rfc2401"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Madson, C., Glenn, R.: The Use of HMAC-MD5-96 within ESP and AH. IETF RFC 2403 (November 1998)","DOI":"10.17487\/rfc2403"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Madson, C., Glenn, R.: The Use of HMAC-SHA-1-96 within ESP and AH. IETF RFC 2404 (November 1998)","DOI":"10.17487\/rfc2404"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Keromytis, A., Provos, N.: The Use of HMAC-RIPEMD-160-96 within ESP and AH. IETF RFC 2857 (Junuary 2000)","DOI":"10.17487\/rfc2857"},{"key":"26_CR15","unstructured":"Elkeelany, O., Matalgah, M.M., Sheikh, K.P., Thaker, M., Chaudhry, G., Medhi, D., Qaddour, J.: Performance Analysis of IPSec Protocol: Encryption and Authentication. In: IEEE International Conference on Communications, IEEE ICC 2002, NY, USA (April 2002)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Degermark, M., Engan, M., Nordgren, B., Pink, S.: Low-loss TCP\/IP Header Compression for Wireless Networks (1996)","DOI":"10.1145\/236387.236388"},{"key":"26_CR17","unstructured":"Frier, A., Karlton, P., Kocher, P.: The SSL 3.0 Protocol. Netscape Communication Corporation (November 1996)"},{"key":"26_CR18","unstructured":"Allen, C., Dierks, T.: The TLS Protocol Version 1.0. Internet Draft, IETF (November 1997) (work in progress)"},{"key":"26_CR19","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Oorshot, P.C.v., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"26_CR20","series-title":"Lecture Notes in Computer Science","volume-title":"Rechner-Gest\u00fctzter Unterricht","author":"O. Goldreich","year":"1974","unstructured":"Goldreich, O.: Modern Cryptography, Probabilistic Proofs and Pseudorandomness, Algorithms and Combinatorics. In: Brunnstein, K., H\u00e4ndler, W., Haefner, K. (eds.) RGU 1974. LNCS, vol.\u00a017, Springer, Heidelberg (1974)"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Zorzi, M.: Packet dropping statistics of a data-link protocol for wireless local communication. In: ICUPC 1997, San Diego (1997)","DOI":"10.1109\/ICUPC.1997.627222"},{"key":"26_CR22","unstructured":"SUN Micro Systems. The Java Media Framework Version 2.0 API (1999), http:\/\/java.sun.com\/products\/java-media\/jmf"},{"key":"26_CR23","unstructured":"Aijaz, A.: Framework for device and traffic authentication of mobile subscriber nodes. Master Thesis, University of Stuttgart, Germany (2002)"}],"container-title":["Lecture Notes in Computer Science","Group Communications and Charges. Technology and Business Models"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39405-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T18:23:06Z","timestamp":1559931786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39405-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540200512","9783540394051"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39405-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}