{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:59:37Z","timestamp":1725494377320},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540759928"},{"type":"electronic","value":"9783540759935"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-75993-5_16","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T14:36:14Z","timestamp":1194964574000},"page":"187-200","source":"Crossref","is-referenced-by-count":0,"title":["Flooding Attack on the Binding Cache in Mobile IPv6"],"prefix":"10.1007","author":[{"given":"Christian","family":"Veigner","sequence":"first","affiliation":[]},{"given":"Chunming","family":"Rong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-540-39871-4_18","volume-title":"Security Protocols","author":"T. Aura","year":"2004","unstructured":"Aura, T.: Mobile IPv6 Security. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol.\u00a02845, pp. 215\u2013234. Springer, Heidelberg (2004)"},{"key":"16_CR2","volume-title":"Proceedings of the 9th ACM conference on Computer and communications security","author":"R.H. Deng","year":"2002","unstructured":"Deng, R.H., Zhou, J., Bao, F.: Defending Against Redirect Attacks in Mobile IP. In: Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, New York (2002)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Hinden, R., Deering, S.: Internet Protocol Version 6 (IPv6) Addressing Architecture, IETF RFC 3513 (2003)","DOI":"10.17487\/rfc3513"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Johnson, D., Percins, C., Arkko, J.: Mobility Support in IPv6, IETF RFC 3775 (2004)","DOI":"10.17487\/rfc3775"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Nikander, P., Arrko, J., Aura, T., Montenegro, G., Nordmark, E.: Mobile IP version 6 Route Optimization Security Design Background, IETF Internet-draft (2005)","DOI":"10.17487\/rfc4225"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Thomson, S., Narten, T.: IPv6 Stateless Address Autoconfiguration, IETF RFC 2462 (1998)","DOI":"10.17487\/rfc2462"},{"key":"16_CR7","unstructured":"Veigner, C., Rong, C.: A new Route Optimization protocol for Mobile IPv6 (ROM). In: International Computer symposium 2004, Taipei (2004)"}],"container-title":["Communications in Computer and Information Science","E-business and Telecommunication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75993-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T10:04:38Z","timestamp":1556964278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75993-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540759928","9783540759935"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75993-5_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2007]]}}}