{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:59:28Z","timestamp":1725569968159},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642166952"},{"type":"electronic","value":"9783642166969"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16696-9_32","type":"book-chapter","created":{"date-parts":[[2010,11,6]],"date-time":"2010-11-06T07:53:44Z","timestamp":1289030024000},"page":"292-301","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Migration Framework for Mobile IPTV"],"prefix":"10.1007","author":[{"given":"Aymen Abdullah","family":"Alsaffar","sequence":"first","affiliation":[]},{"given":"Tien-Dung","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Md. Motaharul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Young-Rok","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Eui-Nam","family":"Huh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"IPTV, http:\/\/en.wikipedia.org\/wiki\/Mobile_IPTV"},{"key":"32_CR2","unstructured":"Mobile IPTV Gets Real, http:\/\/www.dailyiptv.com\/news\/mobile-iptv-reality-030107\/"},{"key":"32_CR3","unstructured":"Conditional Access System, http:\/\/en.wikipedia.org\/wiki\/Conditional_access_system"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Park, J.H.: Subscriber Authentication Technology of AAA Mechanism for Mobile IPTV Service Offer., Spring Science and Business Media, LLC (2009)","DOI":"10.1007\/s11235-009-9232-3"},{"key":"32_CR5","unstructured":"Kerberos (Protocol), http:\/\/en.wikipedia.org\/wiki\/Kerberos_protocol"},{"key":"32_CR6","unstructured":"Denial-of-Service Attack, http:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack"},{"key":"32_CR7","unstructured":"Man-in-the Middle Attack, http:\/\/en.wikipedia.org\/wiki\/Man_in_the_middle_attack"},{"key":"32_CR8","unstructured":"Pries, R., Yu, W., Fu, X., Zhao, W.: A New Replay Attack against Anonymous Communication Networks"},{"key":"32_CR9","unstructured":"Cryptographic Nonce, http:\/\/en.wikipedia.org\/wiki\/Cryptographic_nonce"},{"key":"32_CR10","unstructured":"Cryptographic and Data Security, www.tcs.hut.fi\/Studies\/T-79.4501\/2007AUT\/lectures\/lecture11.ppt"},{"key":"32_CR11","volume-title":"First International Conference on Computational Intelligence, Communication Systems and Networks","author":"M. Gouda Dr.","year":"2009","unstructured":"Gouda Dr., M., Haggag, M.: Enhanced Authentication Mechanism for Next Generation Networks. In: First International Conference on Computational Intelligence, Communication Systems and Networks, IEEE Computer Society, Los Alamitos (2009)"},{"key":"32_CR12","unstructured":"Choi, J., Jung, S., Kim, Y., Yoo, M.: A fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks"},{"key":"32_CR13","volume-title":"6th International Conference on Digital Content, Multimedia Technology and its Applications","author":"A. Alsaffar","year":"2010","unstructured":"Alsaffar, A., Shin, Y., Nguyen, T., Huh, E.: Secure Migration of IPTV Services from a STB to Mobile Devices for Pay per View Video. In: 6th International Conference on Digital Content, Multimedia Technology and its Applications, IEEE Computer Society, Seoul (2010)"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence. Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16696-9_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T23:31:27Z","timestamp":1559777487000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16696-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642166952","9783642166969"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16696-9_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}