{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:39:38Z","timestamp":1725489578236},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748328"},{"type":"electronic","value":"9783540748335"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74833-5_38","type":"book-chapter","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T06:39:58Z","timestamp":1187764798000},"page":"455-467","source":"Crossref","is-referenced-by-count":0,"title":["Controlling Incoming Connections Using Certificates and Distributed Hash Tables"],"prefix":"10.1007","author":[{"given":"Dmitrij","family":"Lagutin","sequence":"first","affiliation":[]},{"given":"Hannu H.","family":"Kari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Adkins, D., Lakshminarayanan, K., Perrig, A., Stoica, I.: Towards a more functional and secure network infrastructure. Technical Report UCB\/CSD-03-1232, Computer Science Division (EECS), University of California, Berkely, USA (2003)","key":"38_CR1"},{"doi-asserted-by":"crossref","unstructured":"Anderson, T., Roscoe, T., Wetherall, D.: Preventing Internet Denial-of-Service with Capabilities. In: ACM SIGCOMM Computer Communications Review, pp. 39\u201344 (2004)","key":"38_CR2","DOI":"10.1145\/972374.972382"},{"unstructured":"Candolin, C.: Securing Military Decision Making In a Network-centric Environment. Doctoral dissertation, Espoo (2005)","key":"38_CR3"},{"doi-asserted-by":"crossref","unstructured":"Gaubatz, G., Kaps, J., \u00d6zt\u00fcrk, E., Sunar, B.: State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. In: proceedings of the third International Conference on Pervasive Computing and Communications Workshops, Hawaii, USA (March 2005)","key":"38_CR4","DOI":"10.1109\/PERCOMW.2005.76"},{"issue":"11","key":"38_CR5","doi-asserted-by":"publisher","first-page":"1808","DOI":"10.1109\/4.962304","volume":"36","author":"J. Goodman","year":"2001","unstructured":"Goodman, J., Chandrakasan, A.: An Energy-Efficient Reconfigurable Public-Key Cryptography Processor. IEEE Journal of Solid-State Circuits\u00a036(11), 1808\u20131820 (2001)","journal-title":"IEEE Journal of Solid-State Circuits"},{"unstructured":"Gribble, S.D., Brewer, E.A., Hellerstein, J.M., Culler, D.: Scalable, Distributed Data Structures for Internet Service Construction. In: Proceedings of the 4th Symposium on Operating System Design and Implementation (OSDI 2000), pp. 319\u2013332 (2000)","key":"38_CR6"},{"doi-asserted-by":"crossref","unstructured":"Hildrum, K., Kubiatowicz, J.D., Rao, S., Zhao, B.Y.: Distributed Object Location in a Dynamic Network. In: Proceedings of the 14th ACM Symposium on Parallel Algorithms and Architectures (SPAA 2002), pp. 41\u201352 (2002)","key":"38_CR7","DOI":"10.1145\/564870.564877"},{"doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. The Internet Society, Network Working Group, Request for Comments: 3775 (2004)","key":"38_CR8","DOI":"10.17487\/rfc3775"},{"key":"38_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Kobliz","year":"1987","unstructured":"Kobliz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation\u00a048, 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"unstructured":"Lunberg, J.: Packet level authentication protocol implementation. In: Military Ad Hoc Networks, vol.\u00a01(19), Helsinki (2004)","key":"38_CR10"},{"doi-asserted-by":"crossref","unstructured":"Lutz, J., Hasan, A.: High Performance FPGA based Elliptic Curve Cryptographic Co-Processor. In: Proceedings of the International Conference on Information Technology: Coding and Computing, ITCC 2004, Las Vegas, USA (April 2004)","key":"38_CR11","DOI":"10.1109\/ITCC.2004.1286701"},{"key":"38_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, Springer, Heidelberg (1986)"},{"unstructured":"Moskowitz, R., Nikander, P.: Host Identity Protocol. Internet draft, work in progress (June 2006)","key":"38_CR13"},{"unstructured":"Nikander, P., Arkko, J., Ohlman, B.: Host Identity Indirection Infrastructure (Hi3). In: proceedings of the Second Swedish National Computer Networking Workshop, Karlstad, Sweden (November 2004)","key":"38_CR14"},{"unstructured":"Packet level authentication [online] [Accessed 10 October 2006], Available from: http:\/\/www.tcs.hut.fi\/Software\/PLA\/","key":"38_CR15"},{"unstructured":"Rosenberg, J., et al.: SIP: Session Initiation Protocol. The Internet Society, Network Working Group, Request for Comments: 3261 (2002)","key":"38_CR16"},{"issue":"4","key":"38_CR17","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TC.2003.1190586","volume":"52","author":"A. Satoh","year":"2003","unstructured":"Satoh, A., Takano, K.: A Scalable Dual-Field Elliptic Curve Cryptographic Processor. IEEE Transactions on Computers\u00a052(4), 449\u2013460 (2003)","journal-title":"IEEE Transactions on Computers"},{"doi-asserted-by":"crossref","unstructured":"Stoica, I., Adkins, D., Zhuang, S., Shenker, S., Sunara, S.: Internet Indirection Infrastructure. In: Proceedings of ACM SIGCOMM 2002, Pittsburgh, USA (August 2002)","key":"38_CR18","DOI":"10.1145\/633025.633033"},{"doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In: Proceedings of the ACM SIGCOMM 2001, pp. 149\u2013160 (2001)","key":"38_CR19","DOI":"10.1145\/383059.383071"},{"doi-asserted-by":"crossref","unstructured":"Yaar, A., Perrig, A., Song, D.: SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. In: proceedings of the 2004 IEEE Symposium on Security and Privacy, Oakland, USA (May 2004)","key":"38_CR20","DOI":"10.1109\/SECPRI.2004.1301320"},{"unstructured":"Ylitalo, J., Nikander, P.: BLIND: A Complete Identity Protection Framework for End-points. In: proceedings of the Twelfth International Workshop on Security Protocols, Cambridge, UK (April 2004)","key":"38_CR21"}],"container-title":["Lecture Notes in Computer Science","Next Generation Teletraffic and Wired\/Wireless Advanced Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74833-5_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:24:21Z","timestamp":1605763461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74833-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540748328","9783540748335"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74833-5_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}