{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:53:51Z","timestamp":1725490431161},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744757"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74477-1_95","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T19:15:06Z","timestamp":1188328506000},"page":"1062-1071","source":"Crossref","is-referenced-by-count":0,"title":["Enhancement for Security of Peer-to-Peer by Expanding CGA Mechanism"],"prefix":"10.1007","author":[{"given":"Seonggeun","family":"Ryu","sequence":"first","affiliation":[]},{"given":"Youngsong","family":"Mun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"95_CR1","unstructured":"Napster: peer-to-peer file sharing software application, http:\/\/www.napster.com"},{"key":"95_CR2","unstructured":"Gnutella: peer-to-peer file sharing software application, http:\/\/www.gnutella.com"},{"key":"95_CR3","doi-asserted-by":"crossref","unstructured":"Aura, T.: Cryptographically Generated Addresses (CGA), RFC 3972 (2005)","DOI":"10.17487\/rfc3972"},{"key":"95_CR4","doi-asserted-by":"crossref","unstructured":"Arkko, J., Kempf, J., Zill, B., Nikander, P.: Secure Neighbor Discovery (SEND), RFC 3971 (2005)","DOI":"10.17487\/rfc3971"},{"key":"95_CR5","doi-asserted-by":"crossref","unstructured":"Narten, T., Nordmark, E., Simpson, W.: Neighbor Discovery for IP Version 6 (IPv6), RFC 2461 (1998)","DOI":"10.17487\/rfc2461"},{"key":"95_CR6","doi-asserted-by":"crossref","unstructured":"Deering, S., Hinden, R.: Internet Protocol, Version 6 (IPv6) Specification, RFC 2460 (1998)","DOI":"10.17487\/rfc2460"},{"key":"95_CR7","doi-asserted-by":"crossref","unstructured":"Shirey, R.: Internet Security Glossary, RFC 2828 (2000)","DOI":"10.17487\/rfc2828"},{"key":"95_CR8","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Jones, P.: US Secure Hash Algorithm 1 (SHA1), RFC 3174 (2001)","DOI":"10.17487\/rfc3174"},{"key":"95_CR9","doi-asserted-by":"crossref","unstructured":"Kent, S., Seo, K.: Security Architecture for the Internet Protocol, RFC 4301 (2005)","DOI":"10.17487\/rfc4301"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74477-1_95.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:32:41Z","timestamp":1619519561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74477-1_95"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744757"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74477-1_95","relation":{},"subject":[]}}