{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:06:21Z","timestamp":1743005181712,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279362"},{"type":"electronic","value":"9783642279379"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27937-9_3","type":"book-chapter","created":{"date-parts":[[2012,4,24]],"date-time":"2012-04-24T17:56:08Z","timestamp":1335290168000},"page":"33-48","source":"Crossref","is-referenced-by-count":0,"title":["Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles"],"prefix":"10.1007","author":[{"given":"Miika","family":"Komu","sequence":"first","affiliation":[]},{"given":"Sasu","family":"Tarkoma","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Lukyanenko","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-44810-1_22","volume-title":"Security Protocols","author":"T. Aura","year":"2001","unstructured":"Aura, T., Nikander, P., Leiwo, J.: Dos-Resistant Authentication with Client Puzzles. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol.\u00a02133, pp. 170\u2013177. Springer, Heidelberg (2001)"},{"key":"3_CR2","unstructured":"Back, A.: Hashcash (May 1997), \n                    \n                      http:\/\/www.cypherspace.org\/hashcash\/"},{"key":"3_CR3","unstructured":"Beal, J., Shepard, T.: Deamplification of DoS Attacks via Puzzles (October 2004), \n                    \n                      http:\/\/web.mit.edu\/jakebeal\/www\/Unpublished\/puzzle.pdf"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-48071-4_10","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Dwork","year":"1993","unstructured":"Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 139\u2013147. Springer, Heidelberg (1993)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Eggert, L., Laganier, J.: Host Identity Protocol (HIP) Rendezvous Extension. IETF (April 2008), Experimental RFC","DOI":"10.17487\/rfc5204"},{"key":"3_CR6","unstructured":"Goodman, J., Rounthwaite, R.: SmartProof. Microsoft (2005), \n                    \n                      http:\/\/research.microsoft.com\/en-us\/um\/people\/joshuago\/smartproof.pdf"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Jokela, P., Moskowitz, R., Nikander, P.: RFC5202: Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP) Internet Engineering Task Force (April 2008), \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc5202.txt","DOI":"10.17487\/rfc5202"},{"key":"3_CR8","unstructured":"Ker\u00e4nen, A., Camarillo, G., M\u00e4enp\u00e4\u00e4, J.: Host Identity Protocol-Based Overlay Networking Environment (HIP BONE) Instance Specification for REsource LOcation And Discovery (RELOAD). Internet Engineering Task Force (July 2010) (internet draft, work in progress)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: RFC5201: Host Identity Protocol. Internet Engineering Task Force (April 2008); Experimental RFC","DOI":"10.17487\/rfc5201"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Nikander, P., Henderson, T., Vogt, C., Arkko, J.: End-Host Mobility and Multihoming with the Host Identity Protocol. Internet Engineering Task Force (April 2008); Experimental RFC","DOI":"10.17487\/rfc5206"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Nikander, P., Laganier, J.: Host Identity Protocol (HIP) Domain Name System (DNS) Extension. IETF (April 2008); Experimental RFC","DOI":"10.17487\/rfc5205"},{"key":"3_CR12","unstructured":"Pathak, A., Komu, M., Gurtov, A.: Host Identity Protocol for Linux. Linux Journal (November 2009), \n                    \n                      http:\/\/www.linuxjournal.com\/article\/9129"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1007\/11915034_85","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"S. Tritilanunt","year":"2006","unstructured":"Tritilanunt, S., Boyd, C., Foo, E., Nieto, J.M.G.: Examining the DoS Resistance of HIP. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol.\u00a04277, pp. 616\u2013625. Springer, Heidelberg (2006)"},{"key":"3_CR14","unstructured":"Tschofenig, H., Shanmugam, M., Muenz, F.: Using SRTP transport format with HIP. Internet Engineering Task Force (August 2006); expired Internet draft"}],"container-title":["Lecture Notes in Computer Science","Information Security Technology for Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27937-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T09:27:36Z","timestamp":1556702856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27937-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279362","9783642279379"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27937-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}