{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T06:42:48Z","timestamp":1743576168385},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_10","type":"book-chapter","created":{"date-parts":[[2013,3,26]],"date-time":"2013-03-26T20:34:59Z","timestamp":1364330099000},"page":"149-161","source":"Crossref","is-referenced-by-count":9,"title":["IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"AlSa\u2019deh","sequence":"first","affiliation":[]},{"given":"Hosnieh","family":"Rafiee","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Narten, T., Nordmark, E., Simpson, W., Soliman, H.: Neighbor Discovery for IP version 6 (IPv6). RFC 4861, Internet Engineering Task Force (September 2007)","DOI":"10.17487\/rfc4861"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Thomson, S., Narten, T., Jinmei, T.: IPv6 Stateless Address Autoconfiguration. RFC 4862, Internet Engineering Task Force (September 2007)","DOI":"10.17487\/rfc4862"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Narten, T., Draves, R., Krishnan, S.: Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 4941, Internet Engineering Task Force (September 2007)","DOI":"10.17487\/rfc4941"},{"key":"10_CR4","unstructured":"Nikander, P., Kempf, J., Nordmark, E.: IPv6 Neighbor Discovery (ND) Trust Models and Threats. RFC 3756 (Informational), Internet Engineering Task Force (May 2004)"},{"key":"10_CR5","unstructured":"Arkko, J. (ed.), Kempf, J., Zill, B., Nikander, P.: SEcure Neighbor Discovery (SEND). RFC 3971, Internet Engineering Task Force (March 2005)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Aura, T.: Cryptographically Generated Addresses (CGA). RFC 3972, Internet Engineering Task Force, updated by RFCs 4581, 4982 (March 2005)","DOI":"10.17487\/rfc3972"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Groat, S., Dunlop, M., Marchany, R., Tront, J.: The privacy implications of stateless IPv6 addressing. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW 2010, pp. 52:1\u201352:4. ACM, New York (2010)","DOI":"10.1145\/1852666.1852723"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-04474-8_2","volume-title":"Information Security","author":"J.W. Bos","year":"2009","unstructured":"Bos, J.W., \u00d6zen, O., Hubaux, J.-P.: Analysis and Optimization of Cryptographically Generated Addresses. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.\u00a05735, pp. 17\u201332. Springer, Heidelberg (2009)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Alsa\u2019deh, A., Rafiee, H., Meinel, C.: Stopping Time Condition for Practical IPv6 Cryptographically Generated Addresses. In: 2012 International Conference on Information Networking (ICOIN), pp. 257\u2013262 (2012)","DOI":"10.1109\/ICOIN.2012.6164388"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Rafiee, H., Alsa\u2019deh, A., Meinel, C.: Multicore-based Auto-scaling SEcure Neighbor Discovery for Windows Operating Systems. In: 2012 International Conference on Information Networking (ICOIN), pp. 269\u2013274 (2012)","DOI":"10.1109\/ICOIN.2012.6164390"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Rafiee, H., AlSa\u2019deh, A., Meinel, C.: WinSEND: Windows SEcure Neighbor Discovery. In: 4th International Conference on Security of Information and Networks (SIN 2011), Sydney, Australia, November 14-19, pp. 243\u2013246. ACM (2011)","DOI":"10.1145\/2070425.2070469"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T20:26:58Z","timestamp":1557606418000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}