{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T03:00:33Z","timestamp":1696561233910},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T00:00:00Z","timestamp":1373328000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s00779-013-0669-8","type":"journal-article","created":{"date-parts":[[2013,7,8]],"date-time":"2013-07-08T03:11:07Z","timestamp":1373253067000},"page":"493-501","source":"Crossref","is-referenced-by-count":4,"title":["IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks"],"prefix":"10.1007","volume":"18","author":[{"given":"Do Hyeon","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jeom Goo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,9]]},"reference":[{"issue":"3","key":"669_CR1","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s00779-010-0328-2","volume":"15","author":"CY Wang","year":"2011","unstructured":"Wang CY, Huang HY, Hwang RH (2011) Mobility management in ubiquitous environments. Pers Ubiquitous Comput 15(3):235\u2013251","journal-title":"Pers Ubiquitous Comput"},{"key":"669_CR2","author":"J Kim","year":"2012","unstructured":"Kim J, Lu J, Hsu CH (2012) Advanced security technologies and applications for ubiquitous computing. Pers Ubiquitous Comput. doi: 10.1007\/s00779-012-0533-2","journal-title":"Pers Ubiquitous Comput"},{"issue":"1","key":"669_CR3","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/s00779-005-0030-y","volume":"10","author":"C English","year":"2006","unstructured":"English C, Terzis S, Nixon P (2006) Towards self-protecting ubiquitous systems: monitoring trust-based interactions. Pers Ubiquitous Comput 10(1):50\u201354","journal-title":"Pers Ubiquitous Comput"},{"key":"669_CR4","doi-asserted-by":"crossref","unstructured":"Kent S, Atkinson R (1998) Security architecture for the internet protocol. RFC2401. http:\/\/www.ietf.org\/rfc\/rfc2401.txt","DOI":"10.17487\/rfc2401"},{"key":"669_CR5","doi-asserted-by":"crossref","unstructured":"Arkko J, Devarapalli V, Dupont F (2004) Using IPsec to protect mobile IPv6 signaling\u00a0between mobile nodes and home agents. RFC3776. http:\/\/www.ietf.org\/rfc\/rfc3776.txt","DOI":"10.17487\/rfc3776"},{"issue":"6","key":"669_CR6","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1007\/s00779-011-0434-9","volume":"16","author":"K Han","year":"2012","unstructured":"Han K, Mun H, Shon T, Yeun CY, Park JJ (2012) Secure and efficient public key management in next generation mobile networks. Pers Ubiquitous Comput 16(6):677\u2013685","journal-title":"Pers Ubiquitous Comput"},{"key":"669_CR7","unstructured":"Dupont F (2005) Address management for IKE version 2. http:\/\/tools.ietf.org\/html\/draft-dupont-ikev2-addrmgmt-08"},{"key":"669_CR8","unstructured":"IEKv2 Mobility and Multihoming (Mobike) WG. http:\/\/tools.ietf.org\/wg\/mobike\/"},{"key":"669_CR9","doi-asserted-by":"crossref","unstructured":"Lee Y, Lee GY, Kim HJ, Jeong CK (2012) Performance analysis of authentication and key distribution scheme for mobile multi-hop relay in IEEE 802.16j. Pers Ubiquit Comput 16(6):697\u2013706","DOI":"10.1007\/s00779-011-0427-8"},{"key":"669_CR10","doi-asserted-by":"crossref","unstructured":"Kent S, Atkinson R (1998) IP authentication header. RFC 2402. http:\/\/www.ietf.org\/rfc\/rfc2402.txt","DOI":"10.17487\/rfc2402"},{"key":"669_CR11","doi-asserted-by":"crossref","unstructured":"Kent S, Atkinson R (1998) IP encapsulating security payload (ESP). RFC 2406. http:\/\/www.ietf.org\/rfc\/rfc2406.txt","DOI":"10.17487\/rfc2406"},{"key":"669_CR12","doi-asserted-by":"crossref","unstructured":"Kivinen T, Tschofenig H (2006) Design of the IEKv2 mobility and multihoming (MOBIKE) protocol. RFC4621. https:\/\/tools.ietf.org\/rfc\/rfc4621.txt","DOI":"10.17487\/rfc4621"},{"key":"669_CR13","doi-asserted-by":"crossref","unstructured":"Johnson D, Perkins C, Arkko J (2004) Mobility support in IPv6. RFC3775. http:\/\/www.ietf.org\/rfc\/rfc3775.txt","DOI":"10.17487\/rfc3775"},{"key":"669_CR14","volume-title":"IPv6 essentials","author":"S Hagen","year":"2006","unstructured":"Hagen S (2006) IPv6 essentials. O\u2019Reilly Media, Sebastopol, CA"},{"key":"669_CR15","volume-title":"Implementing IPv6: supporting the next generation internet\u00a0protocols","author":"MA Miller","year":"2000","unstructured":"Miller MA, Miller PE (2000) Implementing IPv6: supporting the next generation internet\u00a0protocols. Wiley, London"},{"key":"669_CR16","doi-asserted-by":"crossref","unstructured":"Wang W, Villa\u00e7a RS, de Paula LB, Pasquini R, Verdi FL, Magalh\u00e3es MF (2008) An architecture for mobility support in a next generation\u00a0internet. In: Proceedings of the international conference on advanced information networking and application (AINA), pp 818\u2013825","DOI":"10.1109\/AINA.2008.39"},{"key":"669_CR17","unstructured":"Linux FreeS\/WAN. http:\/\/www.freeswan.org"},{"key":"669_CR18","unstructured":"NIST IPSec and IKE simulation tool (NIIST). http:\/\/www.antd.nist.gov\/niist\/"},{"key":"669_CR19","unstructured":"USAGI (UniverSAl playground for Ipv6) project. http:\/\/www.linux-ipv6.org\/"},{"key":"669_CR20","unstructured":"MIPv6 for Linux. http:\/\/tldp.org\/HOWTO\/Mobile-IPv6-HOWTO\/"},{"key":"669_CR21","unstructured":"SSFNet (scalable simulation framework network models). http:\/\/www.ssfnet.org"},{"key":"669_CR22","doi-asserted-by":"crossref","unstructured":"Kaufman C (2005) Internet key exchange (IKEv2) protocol. RFC4306. http:\/\/www.ietf.org\/rfc\/rfc4306.txt","DOI":"10.17487\/rfc4306"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-013-0669-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-013-0669-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-013-0669-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T09:15:03Z","timestamp":1563354903000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-013-0669-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,9]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["669"],"URL":"https:\/\/doi.org\/10.1007\/s00779-013-0669-8","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,9]]}}}