{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:20:05Z","timestamp":1725621605014},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642244025"},{"type":"electronic","value":"9783642244032"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24403-2_26","type":"book-chapter","created":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T11:56:27Z","timestamp":1318852587000},"page":"334-349","source":"Crossref","is-referenced-by-count":0,"title":["Access Path Based Source Address Validation in Mobile IPv6"],"prefix":"10.1007","author":[{"given":"Min","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Ke","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Andersen, D., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., Shenker, S.: Accountable internet protocol(aip). In: Proceedings of ACM SIGCOMM (2008)","DOI":"10.1145\/1402958.1402997"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Arkko, J., Devarapalli, V., Dupont, F.: Using ipsec to protect mobile ipv6 signaling between mobile nodes and home agents. RFC 3776 (June 2004)","DOI":"10.17487\/rfc3776"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Aura, T.: Cryptographically generated addresses(cga). RFC 3972 (March 2005)","DOI":"10.17487\/rfc3972"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Bos, J.W., \u00d6zen, O., Hubaux, J.: Analysis and optimization of cryptographically generated addresses(cga). In: Proceedings of ISC (2009)","DOI":"10.1007\/978-3-642-04474-8_2"},{"issue":"1","key":"26_CR5","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.istr.2007.02.002","volume":"12","author":"K. Elgoarany","year":"2007","unstructured":"Elgoarany, K., Eltoweissy, M.: Security in mobile ipv6: a survey. Information Security Technical Report 12(1), 32\u201343 (2007)","journal-title":"Information Security Technical Report"},{"issue":"3","key":"26_CR6","first-page":"115","volume":"17","author":"Y. Hu","year":"2009","unstructured":"Hu, Y., Chiu, D.-M., Lui, J.C.S.: Entropy based adaptive flow aggregation. IEEE\/ACM Transactions on Networking(TON)\u00a017(3), 115\u2013139 (2009)","journal-title":"IEEE\/ACM Transactions on Networking(TON)"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Johnson, D.B., Perkins, C., Arkko, J.: Mobility support in ipv6. RFC 3775 (June 2004)","DOI":"10.17487\/rfc3775"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Kivi, A.: Mobile data adoption in finland 2005-2006. In: Proceedings of the 6th Conference on Telecommunication Techno-Economics(CTTE), Helsinki, Finland (June 2007)","DOI":"10.1109\/CTTE.2007.4389881"},{"issue":"3","key":"26_CR9","first-page":"291","volume":"6","author":"J. Li","year":"2008","unstructured":"Li, J., Zhang, P., Sampalli, S.: Improved security mechanism for mobile ipv6. International Journal of Network Security\u00a06(3), 291\u2013300 (2008)","journal-title":"International Journal of Network Security"},{"key":"26_CR10","unstructured":"Mankin, A., Patil, B., Harkins, D., Nordmark, E., Nikander, P., Roberts, P., Narten, T.: Threat models introduced by mobile ipv6 and requirements for security in mobile ipv6. IETF draft-ietf-mipv6-scrty-reqts-02.txt (2001)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P.: Host identity protocol (hip) architecture. RFC 4423 (May 2006)","DOI":"10.17487\/rfc4423"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Nikander, P., Aura, T., Arkko, J., Montenegro, G.: Mobile ip version 6 (mipv6) route optimization security design. In: Proceedings of the IEEE Vehicular Technology Conference Fall 2003 (2003)","DOI":"10.1109\/VETECF.2003.1285376"},{"issue":"13","key":"26_CR13","doi-asserted-by":"crossref","first-page":"2401","DOI":"10.1016\/j.comnet.2005.09.019","volume":"50","author":"K. Ren","year":"2006","unstructured":"Ren, K., Lou, W., Zeng, K., Bao, F., Zhou, J., Deng, R.H.: Routing optimization security in mobile ipv6. Computer Networks: The International Journal of Computer and Telecommunications Networking\u00a050(13), 2401\u20132419 (2006)","journal-title":"Computer Networks: The International Journal of Computer and Telecommunications Networking"},{"key":"26_CR14","unstructured":"Riikonen, A.: Mobile internet usage - network traffic measurements. Master\u2019s Thesis. Department of Communications and Networking, Helsinki University of Technology, Espoo (September 2009)"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Song, S., Choi, H.-K., Kim, J.-Y.: A secure and light weight approach for routing optimization in mobile ipv6. EURASIP Journal on Wireless Communications and Networking (2009)","DOI":"10.1155\/2009\/957690"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Wu, J., Bi, J., Li, X., Ren, G., Xu, K., Williams, M.: A source address validation architecture (sava) testbed and deployment experience. RFC 5210 (June 2008)","DOI":"10.17487\/rfc5210"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Wu, J., Ren, G., Li, X.: Source address validation: Architecture and protocol design. In: Proceedings of ICNP (2007)","DOI":"10.1109\/ICNP.2007.4375858"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24403-2_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:15:57Z","timestamp":1606187757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24403-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642244025","9783642244032"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24403-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}