{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:52:08Z","timestamp":1725558728669},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208303"},{"type":"electronic","value":"9783540398714"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39871-4_17","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T15:33:06Z","timestamp":1277825586000},"page":"203-214","source":"Crossref","is-referenced-by-count":8,"title":["Delegation of Signalling Rights"],"prefix":"10.1007","author":[{"given":"Pekka","family":"Nikander","sequence":"first","affiliation":[]},{"given":"Jari","family":"Arkko","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/BFb0028465","volume-title":"Information and Communications Security","author":"T. Aura","year":"1997","unstructured":"Aura, T., Nikander, P.: Stateless connections. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 87\u201397. Springer, Heidelberg (1997)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigmenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Conference on Security and Privacy, Oakland, CA (May 1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Ellison, C., et al.: SPKI Certificate Theory, RFC 2693, IETF (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"17_CR4","unstructured":"Rivest, R.L., Lampson, B.: SDSI \u2013 A Simple Distributed Security Infrastructure, published several times (1996), http:\/\/theory.lcs.mit.edu\/~rivest\/sdsi10.html"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/BFb0054017","volume-title":"Public Key Cryptography","author":"I. Lehti","year":"1998","unstructured":"Lehti, I., Nikander, P.: Certifying trust. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, p. 83. Springer, Heidelberg (1998)"},{"key":"17_CR6","unstructured":"Nikander, P.: An Architecture for Authorization and Delegation in Distributed Object-Oriented Agent Systems. Ph.D. Dissertation, Helsinki University of Technology (March 1999)"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/CSFW.1997.596794","volume-title":"Proc. 10th IEEE Computer Security Foundations Workshop","author":"M. Abadi","year":"1997","unstructured":"Abadi, M.: On SDSI\u2019s linked local name spaces. In: Proc. 10th IEEE Computer Security Foundations Workshop, Rockport, MA, June 1997, pp. 98\u2013108. IEEE Computer Society Press, Los Alamitos (1997), http:\/\/citeseer.nj.nec.com\/abadi98sdsis.html"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/10722599_9","volume-title":"Computer Security - ESORICS 2000","author":"J. Howell","year":"2000","unstructured":"Howell, J., Kotz, D.: A Formal Semantics for SPKI. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 140\u2013158. Springer, Heidelberg (2000)"},{"key":"17_CR9","unstructured":"Kortesniemi, Y., Hasu, T., S\u00e4rs, J.: A revocation, validation and authentication protocol for SPKI based delegation systems. In: Proceedings of the 2000 Network and Distributed System Security Symposium (NDSS 2000), San Diego, California, February 2000, pp. 85\u2013101 (2000)"},{"key":"17_CR10","unstructured":"Perlman, R.J.: Network layer protocols with Byzantine robustness. Ph.D. Thesis, Massachusetts Institute of Technology (1988)"},{"key":"17_CR11","unstructured":"Moskowitz, R.: Host Identity Payload Architecture, work in progress, Internet Draft (expired) (February 2001), http:\/\/klovia.htt-consult.com\/draftmoskowitz-hip-arch-02.txt"},{"key":"17_CR12","unstructured":"Moskowitz, R.: Host Identity Payload and Protocol, work in progress, Internet Draft (November 2001), draft-moskowitz-hip-05.txt http:\/\/klovia.httconsult.com\/draft-moskowitz-hip-05.txt"},{"key":"17_CR13","unstructured":"Moskowitz, R.: Host Identity Protocol Implementation, work in progress, Internet Draft (expired) (February 2001), draft-moskowitz-hip-impl-01.txt http:\/\/klovia.htt-consult.com\/draft-moskowitz-hip-impl-01.txt"},{"key":"17_CR14","unstructured":"Zapata, M.G.: Secure Ad hoc On-Demand Distance Vector (SAODV) Routing, unpublished manuscript, sent to the manet mailing list, October 08 (2001), ftp:\/\/manet.itd.nrl.navy.mil\/pub\/manet\/2001-10.mail"},{"key":"17_CR15","unstructured":"Dahill, B., Levine, B.N., Royer, E., Schields, C.: A Secure Routing Protocol for Ad Hoc Networks., Technical Report UM-CS-2001-037, University of Michigan (August 2001)"},{"key":"17_CR16","unstructured":"Nikander, P.: A Case for the Host Identity Payload: An Architecture for Multi- Homed Mobile Hosts. Unpublished manuscript submitted for consideration to be published at Mobicom 2002, Ericsson Research (March 2002)"},{"key":"17_CR17","unstructured":"Aura, T., Arkko, J.: MIPv6 BU Attacks and Defenses, work in progress, Internet Draft (February 2002) draft-aura-mipv6-bu-attacks-01.txt"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39871-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T11:00:35Z","timestamp":1559214035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39871-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208303","9783540398714"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39871-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}