{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T02:27:13Z","timestamp":1696472833562},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2006,4,1]],"date-time":"2006-04-01T00:00:00Z","timestamp":1143849600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2006,4]]},"DOI":"10.1007\/bf03219911","type":"journal-article","created":{"date-parts":[[2012,7,20]],"date-time":"2012-07-20T08:13:57Z","timestamp":1342772037000},"page":"332-356","source":"Crossref","is-referenced-by-count":14,"title":["Designing the mobile IPv6 security protocol"],"prefix":"10.1007","volume":"61","author":[{"given":"Tuomas","family":"Aura","sequence":"first","affiliation":[]},{"given":"Michael","family":"Roe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03219911_CR1","series-title":"Lncs","first-page":"5","volume-title":"Security Protocols, 10th International Workshop","author":"(J.) Arkko","year":"2002","unstructured":"Arkko (J.), Nikander (P.), How to authenticate unknown principals without trusted parties.In Security Protocols, 10th International Workshop,2845 ofLncs, pages 5\u201316, Cambridge, UK, April 2002. Springer."},{"key":"BF03219911_CR2","unstructured":"Aura (T.), Cryptographically generated addresses (Cga).Rfc 3972,Ietf. To appear."},{"key":"BF03219911_CR3","series-title":"Lncs","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/10958513_3","volume-title":"Proc. 6th Information Security Conference (Isc\u201903)","author":"(T.) Aura","year":"2003","unstructured":"Aura (T.), Cryptographically generated addresses (Cga). In Proc. 6th Information Security Conference (Isc\u201903),2851 ofLncs, pages 29\u201343, Bristol,Uk, October 2003. Springer."},{"key":"BF03219911_CR4","series-title":"Lncs","volume-title":"Proc. Security Protocols, 10th International Workshop","author":"(T.) Aura","year":"2002","unstructured":"Aura (T.), Mobile IPv6 security.In Proc. Security Protocols, 10th International Workshop,Lncs, Cambridge,Uk, April 2002. Springer."},{"key":"BF03219911_CR5","unstructured":"Aura (T.),Arkko (J.),Mipv6Bu attacks and defenses. Internet Draft draft-aura-mipv6-bu-attacks-01,Ietf MobileIp Working Group, February 2002. Archived at http:\/\/www.watersprings.org\/pub\/id\/draft-aura-mipv6-bu-attacks-01.txt."},{"key":"BF03219911_CR6","series-title":"Lncs","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/BFb0028465","volume-title":"Proc. International Conference on Information and Communications Security (Icics\u201997)","author":"(T.) Aura","year":"1997","unstructured":"Aura (T.), Nikander (P.), Stateless connections. In Proc. International Conference on Information and Communications Security (Icics\u201997),1334 ofLncs, pages 87\u201397, Beijing, China, November 1997. Springer."},{"key":"BF03219911_CR7","volume-title":"Proc. 2004Ieee Symposium on Security and Privacy (Ssp\u201904)","author":"(T.) Aura","year":"2004","unstructured":"Aura (T.), Nikander (P.), Camarillo (G.), Effects of mobility and multihoming on transport-protocol security. In Proc. 2004Ieee Symposium on Security and Privacy (Ssp\u201904), Berkeley,Ca usa, May 2004.Ieee Computer Society."},{"key":"BF03219911_CR8","volume-title":"Proc. 18th Annual Computer Security Applications Conference","author":"(T.) Aura","year":"2002","unstructured":"Aura (T.), Roe (M.), Arkko (J.), Security of Internet location management.In Proc. 18th Annual Computer Security Applications Conference, Las Vegas,Nv usa, December 2002.iEee Press."},{"key":"BF03219911_CR9","doi-asserted-by":"crossref","unstructured":"Ferguson (P.),Senie (D.), Network ingress filtering: Defeating denial of service attacks which employIp source address spoofing,Rfc 2827,Ietf, May 2000.","DOI":"10.17487\/rfc2827"},{"key":"BF03219911_CR10","doi-asserted-by":"crossref","unstructured":"Harkins (D.),Carrel (D.), The Internet key exchange (Ike),Rfc 2409,Ietf, November 1998.","DOI":"10.17487\/rfc2409"},{"key":"BF03219911_CR11","doi-asserted-by":"crossref","unstructured":"Hinden (R. M),Deering (S.E.),Ip version 6 addressing architecture,Rfc 2373,Ietf, July 1998.","DOI":"10.17487\/rfc2373"},{"key":"BF03219911_CR12","unstructured":"Huitema (C), Routing in the Internet.Prentice Hall, 1995."},{"key":"BF03219911_CR13","unstructured":"Ioannidis (J.), Protocols for Mobile Internetworking. PhD thesis, Columbia University in the City of New York, 1993."},{"key":"BF03219911_CR14","doi-asserted-by":"crossref","unstructured":"Johnson (D. B.),Perkins (C),Arkko (J.), Mobility support in IPv6,Rfc 3775,Ietf, June 2004.","DOI":"10.17487\/rfc3775"},{"key":"BF03219911_CR15","doi-asserted-by":"crossref","unstructured":"Karn (P.),Simpson (W.A.), Photuris: session-key management protocol,Rfc 2522,Ietf Network Working Group, March 1999.","DOI":"10.17487\/rfc2522"},{"issue":"3\u20134","key":"BF03219911_CR16","first-page":"389","volume":"29","author":"(J.) Kempf","year":"2004","unstructured":"Kempf (J.), Arkko (J.), Nikander (P.), Mobile IPv6 security. Kluwer Wireless Personal Communications special issue on Security for Next Generation Communications, 29(3\u20134):389\u2013414, June 2004.","journal-title":"Kluwer Wireless Personal Communications special issue on Security for Next Generation Communications"},{"key":"BF03219911_CR17","doi-asserted-by":"crossref","unstructured":"Carpenter (B. E.),Crowcroft (J.),Rekhter (Y.). IPv4 address behaviour today,Rfc 2101,Ietf, February 1997.","DOI":"10.17487\/rfc2101"},{"key":"BF03219911_CR18","unstructured":"Montenegro (G.),Castelluccia (C),Sucv identifiers and addresses. Internet Draft draft-montenegro-sucv02, November 2001. Archived at http:\/\/www.watersprings.org\/pub\/id\/draft-montenegro-sucv-02.txt."},{"key":"BF03219911_CR19","doi-asserted-by":"crossref","unstructured":"Narten (T.),Draves (R.). Privacy extensions for stateless address autoconfiguration in IPv6.Rfc 3041,Ietf, January 2001.","DOI":"10.17487\/rfc3041"},{"key":"BF03219911_CR20","unstructured":"Nikander (P.), A scaleable architecture for IPv6 address ownership. Internet-Draft draft-nikander-ipng-pbkaddresses-00, March 2001."},{"key":"BF03219911_CR21","doi-asserted-by":"crossref","unstructured":"Nikander (P.), Denial-of-service, address ownership, and early authentication in the IPv6 world.In Proc. 9th International Workshop on Security Protocols,2467 ofLncs, pages 12\u201321, Cambridge, UK, April 2001. Springer 2002.","DOI":"10.1007\/3-540-45807-7_3"},{"key":"BF03219911_CR22","unstructured":"Nikander (P.),Perkins (C), Binding authentication key establishment protocol for Mobile IPv6. Internet Draft draft-perkins-bake-01,Ietf MobileIp Working Group, July 2001. Archived at http:\/\/www.watersprings. org\/pub\/id\/draft-perkins-bake-01.txt."},{"key":"BF03219911_CR23","volume-title":"Proc.Ieee Vehicular Technology Conference Fall 2003","author":"(P.) Nikander","year":"2003","unstructured":"Nikander (P.), Aura (T.), Arkko (J.), Montenegro (G.), MobileIp version 6 (Mipv6) route optimization security design. In Proc.Ieee Vehicular Technology Conference Fall 2003, Orlando,Flusa, October 2003. IEEE Press."},{"key":"BF03219911_CR24","unstructured":"Nikander (P.),Ylitalo (J.),Wall (J.), Integrating security, mobility, and multi-homing in aHip way. In Proc. Network and Distributed Systems Security Symposium (Ndss\u201903), pages 87\u201399, San Diego,Ca usa, February 2003."},{"key":"BF03219911_CR25","doi-asserted-by":"crossref","unstructured":"O\u2019shea (G.),Roe (M.), Child-proof authentication for mipv6 (Cam),Acm Computer Communications Review, 31(2), April 2001.","DOI":"10.1145\/505666.505668"},{"key":"BF03219911_CR26","doi-asserted-by":"crossref","unstructured":"Paxson (V.), An analysis of using reflectors for distributed denial-of-service attacks,Acm Computer Communications Review (Ccr), 31(3), July 2001.","DOI":"10.1145\/505659.505664"},{"key":"BF03219911_CR27","doi-asserted-by":"crossref","unstructured":"Perkins (C), Editor, ip mobility support for IPv4,Rfc 3344,Ietf, August 2002.","DOI":"10.17487\/rfc3220"},{"key":"BF03219911_CR28","unstructured":"Roe (M.),Aura (T.),O\u2019shea (G.),Arkko (J.), Authentication of Mobile IPv6 binding updates and acknowledgments. Internet Draft draft-roe-mobileip-updateauth-01, November 2001. Archived at http:\/\/www.waters-prings.org\/pub\/id\/draft-roe-mobileip-updateauth-01.txt."},{"key":"BF03219911_CR29","first-page":"208","volume-title":"Proc. 1997Ieee Symposium on Security and Privacy","author":"(C.L.) Schuba","year":"1997","unstructured":"Schuba (C.L.), Krsul (I.V.), Kuhn (M.G.), Spaffold (E.H.), Sundaram (A.), Zamboni (D.), Analysis of a denial of service attack onTCP. In Proc. 1997Ieee Symposium on Security and Privacy, pages 208\u2013223, Oakland,Ca usa, May 1997,Ieee Computer Society Press."},{"key":"BF03219911_CR30","unstructured":"Soliman (H.), Mobile IPv6: Mobility in a Wireless Internet.Addison-Wesley, 2004."},{"key":"BF03219911_CR31","doi-asserted-by":"crossref","unstructured":"Thomson (S.),Narten (T.), IPv6 stateless address autoconfiguration,Rfc 2462,Ietf, December 1998.","DOI":"10.17487\/rfc2462"},{"key":"BF03219911_CR32","first-page":"37","volume-title":"Proc. 6thUsenix Security Symposium","author":"(T.) Yl\u00f6nen","year":"1996","unstructured":"Yl\u00f6nen (T.), SSH \u2014 secure login connections over the Internet. In Proc. 6thUsenix Security Symposium, pages 37\u201342, San Jose,Ca usa, June 1996.Usenix Association."}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03219911.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF03219911\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03219911","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T05:59:08Z","timestamp":1561960748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03219911"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4]]},"references-count":32,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2006,4]]}},"alternative-id":["BF03219911"],"URL":"https:\/\/doi.org\/10.1007\/bf03219911","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,4]]}}}