{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T18:10:00Z","timestamp":1744135800155},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208303"},{"type":"electronic","value":"9783540398714"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39871-4_3","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T19:33:06Z","timestamp":1277839986000},"page":"5-19","source":"Crossref","is-referenced-by-count":10,"title":["Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties"],"prefix":"10.1007","author":[{"given":"Jari","family":"Arkko","sequence":"first","affiliation":[]},{"given":"Pekka","family":"Nikander","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: What next? In: 8th International Workshop on Security Protocols, Cambridge, UK (2000)","DOI":"10.1007\/10720107_25"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R.: Why information security is hard - an economic perspective. In: Proceedings of the 17th Annual Computer Security Applications Conference (December 2001)","DOI":"10.1109\/ACSAC.2001.991552"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Arkko, J., Aura, T., Kempf, J., Mantyla, V.-M., Nikander, P., Roe, M.: Securing IPv6 Neighbour Discovery (2002) (unpublished manuscript) (submitted for publication)","DOI":"10.1145\/570681.570690"},{"key":"3_CR4","unstructured":"Bernstein, D.J.: Syn flooding (1996), http:\/\/cr.yp.to\/syncookies\/idea"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security - ESORICS 94","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875. Springer, Heidelberg (1994)"},{"key":"3_CR6","unstructured":"Gehrmann, C., Nyberg, K., Mitchell, C.J.: The personal CA - PKI for a Personal Area Network. In: IST Mobile Summit 2002 (2002)"},{"key":"3_CR7","unstructured":"Josang, A.: Trust-based decision making for electronic transactions. In: Yngstrom, L., Svensson, T. (eds.) Proceedings of the Fourth Nordic Workshop on Secure IT Systems (NORDSEC 1999), Stockholm University Report 99\u2013005 (1999)"},{"key":"3_CR8","unstructured":"Lloyd, W.F.: Two lectures on the checks to population. Oxford University Press, Oxford (1833)"},{"key":"3_CR9","unstructured":"Moskowitz, R.: Host Identity Payload and Protocol. IETF (November 2001) (work In Progress), Internet Draft draftmoskowitz-hip-05.txt"},{"key":"3_CR10","unstructured":"Moskowitz, R.: Host identity payload architecture. IETF (February 2001) (work in Progress), Internet Draft (expired) http:\/\/klovia.htt-consult.com\/draft-moskowitz-hip-arch-02.txt"},{"key":"3_CR11","unstructured":"Moskowitz, R.: Host Identity Protocol implementation. IETF (February 2001) (work In Progress), Internet Draft (expired) http:\/\/klovia.htt-consult.com\/draft-moskowitz-hip-impl-01.txt"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Nikander, P.: Denial-of-service, address ownership, and early authentication in the IPv6 world (April 2001)","DOI":"10.1007\/3-540-45807-7_3"},{"key":"3_CR13","unstructured":"Nikander, P., Perkins, C.: Binding authentication key establishment protocol for Mobile IPv6. IETF (July 2001) (work In Progress), Internet Draft http:\/\/draft-perkins-bake-01.txt"},{"key":"3_CR14","unstructured":"Nordmark, E.: Securing MIPv6 BUs using return routability (BU3WAY). IETF (November 2001) (Work In Progress), Internet Draft http:\/\/draft-nordmark-mobileip-bu3way-00.txt"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"O\u2019Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). Computer Communications Review (April 2001)","DOI":"10.1145\/505666.505668"},{"key":"3_CR16","unstructured":"Richardson, M., Redelmeier, D., Spencer, H.: A method for doing opportunistic encryption with IKE (October 2001)"},{"key":"3_CR17","unstructured":"Roe, M., O\u2019Shea, G., Aura, T., Arkko, J.: Authentication of Mobile IPv6 binding updates and acknowledgments. IETF (February 2002) (Work In Progress), Internet Draft http:\/\/draft-roe-mobileipupdateauth-02.txt"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. IETF (February 2002) (Work In Progress), Internet Draft http:\/\/draft-ietf-sip-rfc2543bis-09.txt","DOI":"10.17487\/rfc3261"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: 7th International Workshop on Security Protocols, Cambridge, UK (1999)","DOI":"10.1007\/10720107_24"},{"key":"3_CR20","unstructured":"Varian, H.R.: Managing online security risks. The New York Times (June 2000)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Yahalom, R., Klein, B., Beth, T.: Trust relationships in secure systems - a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, pp. 150\u2013164 (1993)","DOI":"10.1109\/RISP.1993.287635"},{"key":"3_CR22","unstructured":"Ylonen, T., Kivinen, T., Saarinen, M., Rinne, T., Lehtinen, S.: SSH protocol architecture. IETF (January 2002) (Work In Progress), Internet Draft http:\/\/draft-ietf-secsh-architecture-12.txt"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39871-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:00:46Z","timestamp":1559228446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39871-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208303","9783540398714"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39871-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}