{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T12:56:21Z","timestamp":1773406581848,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642311277","type":"print"},{"value":"9783642311284","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31128-4_40","type":"book-chapter","created":{"date-parts":[[2012,6,18]],"date-time":"2012-06-18T09:23:33Z","timestamp":1340011413000},"page":"543-559","source":"Crossref","is-referenced-by-count":4,"title":["Security-Effective Fast Authentication Mechanism for Network Mobility in Proxy Mobile IPv6 Networks"],"prefix":"10.1007","author":[{"given":"Illkyun","family":"Im","sequence":"first","affiliation":[]},{"given":"Young-Hwa","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Jae-Young","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Jongpil","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","doi-asserted-by":"crossref","unstructured":"Devarapalli, V., Wakikawa, R., Petrescu, A., Thubert, P.: Network Mobility (NEMO) Basic Support Protocol. IETF, RFC 3963 (January 2005)","DOI":"10.17487\/rfc3963"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: Mobility support in IPv6. IETF, RFC 3775 (June 2004)","DOI":"10.17487\/rfc3775"},{"issue":"11","key":"40_CR3","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Narten, T., Nordmark, E., Simpson, W.: Neighbor discovery for IP version 6 (IPv6). RFC 2461 (December 1998)","DOI":"10.17487\/rfc2461"},{"issue":"1-2","key":"40_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s11235-009-9219-0","volume":"44","author":"J.H. Park","year":"2009","unstructured":"Park, J.H., Jin, Q.: Effective session key distribution for secure fast handover in mobile networks. Telecommunication Systems\u00a044(1-2), 97\u2013107 (2009)","journal-title":"Telecommunication Systems"},{"issue":"1","key":"40_CR6","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MWC.2004.1269714","volume":"11","author":"A. Mishra","year":"2004","unstructured":"Mishra, A., Shin, M.H., Petroni, N.L., Clancy, J.T., Arbauch, W.A.: Proactive key distribution using neighbor graphs. IEEE Wireless Communications\u00a011(1), 26\u201336 (2004)","journal-title":"IEEE Wireless Communications"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: GenericAAA architecture. IETF RFC 2903 (August 2000)","DOI":"10.17487\/rfc2903"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Glass, S., Hiller, T., Jacobs, S., Perkins, C.: Mobile IP authentication, authorization, and accounting requirements. IETF RFC 2977 (October 2000)","DOI":"10.17487\/rfc2977"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Perkins, C.E.: Mobile IP joins forces with AAA. IEEE RFC 2976 (August 2000)","DOI":"10.1109\/98.863997"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Calhoun, P., Johansson, T., Perkins, C., Hiller, T.: Diameter Mobile IPv4 application. IEEE RFC4004 (August 2005)","DOI":"10.17487\/rfc4004"},{"issue":"9","key":"40_CR11","doi-asserted-by":"publisher","first-page":"1725","DOI":"10.1109\/JSAC.2006.875111","volume":"24","author":"H. Fathi","year":"2006","unstructured":"Fathi, H., Shin, S., Kobara, K., Chakraborty, S., Imai, H., Prasad, R.: LRAKE-based AAA for network mobility (NEMO) over wireless links. IEEE Journal on Selected Areas in Communications (JSAC)\u00a024(9), 1725\u20131737 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications (JSAC)"},{"key":"40_CR12","unstructured":"Hideki, I., Seonghan, S., Kanukuni, K.: Introduction to Leakage-Resilient Authenticated Key Exchanged Protocols and Their Applications. In: KIISC (December 2008)"},{"key":"40_CR13","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-642-00205-2_10","volume-title":"Communications and Networking in China","author":"Y. Wang","year":"2009","unstructured":"Wang, Y., Luo, W., Shen, C.: Analysis on Imai-Shin\u2019s LR-AKE Protocol for Wireless Network Security. In: Bond, P. (ed.) Communications and Networking in China. CCIS, vol.\u00a026, pp. 84\u201389. Springer, Heidelberg (2009)"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Chubng, M.-C., Lee, J.-F.: A lightweight mutual authentication mechanism for network mobility in IEEE 802.16e wireless networks. Computer Networks (June 2011)","DOI":"10.1016\/j.comnet.2011.05.027"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Li, D., Sampalli, S.: An efficient contributory group rekeying scheme based on hash functions for MANETs. In: IFIP International Conference on Network and Parallel Computing Workshops, pp. 191\u2013198 (September 2007)","DOI":"10.1109\/NPC.2007.183"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Ng, W.H.D., Sun, Z., Cruickshank, H.: Group key management with network mobility. In: 13th IEEE International Conference on Networks (ICON), vol.\u00a02, pp. 716\u2013721 (November 2005)","DOI":"10.1109\/ICON.2005.1635596"},{"issue":"7","key":"40_CR17","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/TC.2004.31","volume":"53","author":"Y. Kim","year":"2004","unstructured":"Kim, Y., Perrig, A., Tfsudik, G.: Group key agreement efficient in communication. IEEE Transactions on Computers\u00a053(7), 905\u2013921 (2004)","journal-title":"IEEE Transactions on Computers"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"El Malki, K. (ed.): Low-Latency Handoffs in Mobile IPv4. IETF RFC 4881 (June 2007)","DOI":"10.17487\/rfc4881"},{"key":"40_CR19","doi-asserted-by":"crossref","unstructured":"Koodli, R. (ed.): Fast Handoffs for Mobile IPv6. IETF, RFC 4068(June 2005)","DOI":"10.17487\/rfc4068"},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"McCann, P.: Mobile IPv6 fast handoffs for 802.11 Networks. IETF RFC 4260 (November 2005)","DOI":"10.17487\/rfc4260"},{"key":"40_CR21","unstructured":"Gundaveli, S., Leung, K., Devarapali, V., Chowdhury, K., Patil, B.: Proxy Mobile IPv6. IETF RFC 5213 (August 2008)"},{"key":"40_CR22","doi-asserted-by":"crossref","unstructured":"Lee, K.-H., Lee, H.-W., Ryu, W., Han, Y.-H.: A scalable network-based mobility management framework in heterogeneous IP-based networks. Telecommunication Systems (June 2011)","DOI":"10.1007\/s11235-011-9479-3"},{"key":"40_CR23","unstructured":"Na, J.-H., Park, S., Moon, J.-M., Lee, S., Lee, E., Kim, S.-H.: Roaming Mechanism between PMIPv6 Domain (July 2008), draft-park-netmm-pmipv6-roaming-o1.txt"},{"key":"40_CR24","doi-asserted-by":"crossref","unstructured":"Chen, Y.-S., Chuang, M.-C., Chen, C.-K.: DeuceScan:deuce-based fast handoff scheme in IEEE 802.11 wireless networks. In: IEEE Transaction on Vehicular Technology Conference, vol.\u00a057(2), pp. 1126\u20131141 (September 2008)","DOI":"10.1109\/TVT.2007.907027"},{"key":"40_CR25","unstructured":"NIST, U.S. Department of Commerce. Secure Hash Standard. U.S.Federal Information Processing Standard (FIPS) (August 2002)"},{"key":"40_CR26","doi-asserted-by":"crossref","unstructured":"Thomson, S., Narten, T.: IPv6 stateless address autoconfiguration. IETF RFC 2462 (December 1998)","DOI":"10.17487\/rfc2462"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2012"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31128-4_40.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T16:53:30Z","timestamp":1743526410000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31128-4_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642311277","9783642311284"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31128-4_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}