{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:23:55Z","timestamp":1743103435545,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044731"},{"type":"electronic","value":"9783642044748"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04474-8_2","type":"book-chapter","created":{"date-parts":[[2009,9,3]],"date-time":"2009-09-03T07:25:17Z","timestamp":1251962717000},"page":"17-32","source":"Crossref","is-referenced-by-count":15,"title":["Analysis and Optimization of Cryptographically Generated Addresses"],"prefix":"10.1007","author":[{"given":"Joppe W.","family":"Bos","sequence":"first","affiliation":[]},{"given":"Onur","family":"\u00d6zen","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/10958513_3","volume-title":"Information Security","author":"T. Aura","year":"2003","unstructured":"Aura, T.: Cryptographically Generated Addresses (CGA). In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 29\u201343. Springer, Heidelberg (2003)"},{"key":"2_CR2","unstructured":"Aura, T., Roe, M.: Strengthening Short Hash Values, \n                    \n                      http:\/\/research.microsoft.com\/en-us\/um\/people\/tuomaura\/misc\/aura-roe-submission.pdf"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Arkko, J., Kempf, J., Zill, B., Nikander, P.: SEcure Neighbor Discovery (SEND). RFC 3971, IETF (March 2005), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3971.txt","DOI":"10.17487\/rfc3971"},{"key":"2_CR4","unstructured":"Nordmark, E., Bagnulo, M.: Multihoming L3 Shim Approach (July 2005), \n                    \n                      http:\/\/tools.ietf.org\/html\/draft-nordmark-multi6dt-shim-00.txt"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC 3775, IETF (June 2004), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3775.txt","DOI":"10.17487\/rfc3775"},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/505666.505668","volume":"31","author":"G. O\u2019Shea","year":"2001","unstructured":"O\u2019Shea, G., Roe, M.: Child-proof Authentication for MIPv6 (CAM). Computer Communication Review\u00a031(2), 4\u20138 (2001)","journal-title":"Computer Communication Review"},{"key":"2_CR7","unstructured":"Nikander, P.: A Scalable Architecture for IPv6 Address Ownership, Internet Draft (2001)"},{"key":"2_CR8","unstructured":"Montenegro, G., Castelluccia, C.: Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. In: NDSS, The Internet Society (2002)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Aura, T.: Cryptographically Generated Addresses (CGA). RFC 3972, IETF (March 2005), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3972.txt","DOI":"10.17487\/rfc3972"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Hinden, R., Deering, S.: Internet Protocol Version 6 Addressing Architecture. RFC 4291, IETF (February 2006), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc4291.txt","DOI":"10.17487\/rfc4291"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Hinden, R., Deering, S., Nordmark, E.: IPv6 Global Unicast Address Format. RFC 3587, IETF (August 2003), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3587.txt","DOI":"10.17487\/rfc3587"},{"key":"2_CR12","unstructured":"National Institute of\u00a0Standards and\u00a0Technology: Secure hash standard. FIPS 180-1, NIST (April 1995)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Bagnulo, M., Arkko, J.: Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs). RFC 4982, IETF (July 2007), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc4982.txt","DOI":"10.17487\/rfc4982"},{"key":"2_CR14","unstructured":"OpenSSL: The Open Source Toolkit for SSL\/TLS (2008), \n                    \n                      http:\/\/www.openssl.org\/"},{"key":"2_CR15","unstructured":"Bernstein, D.J., Lange, T. (eds.): eBACS: ECRYPT Benchmarking of Cryptographic Systems, \n                    \n                      http:\/\/bench.cr.yp.to\n                    \n                    \n                   (accessed January 7, 2009)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 42\u2013111 (February 1978)","DOI":"10.21236\/ADA606588"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04474-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:29:43Z","timestamp":1558268983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04474-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044731","9783642044748"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04474-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}