{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T22:06:12Z","timestamp":1755036372315,"version":"3.33.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T00:00:00Z","timestamp":1189555200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1007\/s10922-007-9075-8","type":"journal-article","created":{"date-parts":[[2007,9,11]],"date-time":"2007-09-11T17:01:14Z","timestamp":1189530074000},"page":"163-181","source":"Crossref","is-referenced-by-count":3,"title":["Open Source Mobile VPNs over Converged All-IP Networks"],"prefix":"10.1007","volume":"16","author":[{"given":"Antonio","family":"Liotta","sequence":"first","affiliation":[]},{"given":"Daniel H.","family":"Tyrode-Goilo","sequence":"additional","affiliation":[]},{"given":"Adetola","family":"Oredope","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,9,12]]},"reference":[{"issue":"10","key":"9075_CR1","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/MCOM.2004.1341273","volume":"42","author":"S. Khanvilkar","year":"2004","unstructured":"Khanvilkar, S., et\u00a0al.: Virtual private networks: an overview with performance evaluation. IEEE Commun. Mag. 42(10), 146\u2013154 (2004)","journal-title":"IEEE Commun. Mag."},{"unstructured":"Craig, S., et\u00a0al.: Analysis of IPSec overheads for VPN servers. In: 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec), pp. 25\u201330 (2005)","key":"9075_CR2"},{"doi-asserted-by":"crossref","unstructured":"Berger, T.: Analysis of Current VPN Technologies. In: The First International Conference on Availability, Reliability and Security, 2006. ARES 2006, 8 pp (2006)","key":"9075_CR3","DOI":"10.1109\/ARES.2006.30"},{"issue":"3","key":"9075_CR4","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MIC.2004.1297275","volume":"8","author":"C. Metz","year":"2004","unstructured":"Metz, C.: The latest in VPNs: part II. IEEE Internet Comput. 8(3), 60\u201365 (2004)","journal-title":"IEEE Internet Comput."},{"key":"9075_CR5","first-page":"83","volume":"1","author":"H. Dong","year":"2005","unstructured":"Dong, H., et\u00a0al.: Security research on mobile IP network handover. ISCIT 2005 1, 83\u201386 (2005)","journal-title":"ISCIT 2005"},{"issue":"9","key":"9075_CR6","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MCOM.2006.1705984","volume":"44","author":"J. Andrew Do-Sung","year":"2006","unstructured":"Andrew Do-Sung, J., et\u00a0al.: An IMS-based service platform for the next-generation wireless networks. IEEE Commun. Mag. 44(9), 88\u201395 (2006)","journal-title":"IEEE Commun. Mag."},{"unstructured":"Agarwal, A.K., et\u00a0al.: An experimental study on wireless security protocols over mobile IP networks. In: 2004 IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall, vol 7, pp. 5271\u20135275 (2004) VTC2004-Fall. 2004","key":"9075_CR7"},{"doi-asserted-by":"crossref","unstructured":"Zhen, Z.: Saving public addresses in mobile IP. ICN\/ICONS\/MCL 2006 127 (2006)","key":"9075_CR8","DOI":"10.1145\/1217835.1217824"},{"doi-asserted-by":"crossref","unstructured":"Sujeong, C., et\u00a0al.: Performance comparison of TCP traffic over mobile IPv4 and IPv6 networks and a mobile network deployment approach. CIT 469\u2013473 (2005)","key":"9075_CR9","DOI":"10.1109\/CIT.2005.153"},{"issue":"6","key":"9075_CR10","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/MCOM.2004.1304248","volume":"42","author":"P. Knight","year":"2004","unstructured":"Knight, P., et\u00a0al.: Layer 2 and 3 virtual private networks: taxonomy, technology, and standardization efforts. IEEE Commun. Mag. 42(6), 124\u2013131 (2004)","journal-title":"IEEE Commun. Mag."},{"unstructured":"3G Patnership Project TS 23.221\u2013\u2013Architectural requirements (Release 7). (Last Updated March 2006)","key":"9075_CR11"},{"doi-asserted-by":"crossref","unstructured":"Johnson, D., et\u00a0al. RFC\u2013\u2013Mobility Support in IPv6. IETF RFC 3775 (2004)","key":"9075_CR12","DOI":"10.17487\/rfc3775"},{"doi-asserted-by":"crossref","unstructured":"Celia, L., et\u00a0al.: An enhanced IPSec for anonymous internet communication. Electro Inf. Technol. 2005 1\u20136 (2005)","key":"9075_CR13","DOI":"10.1109\/EIT.2005.1626961"},{"doi-asserted-by":"crossref","unstructured":"Kanda, M., et\u00a0al.: USAGI IPv6 IPsec development for Linux. In: 2004 International Symposium on Applications and the Internet Workshops, 2004. SAINT 2004 Workshops, pp. 159\u2013163 (2004)","key":"9075_CR14","DOI":"10.1109\/SAINTW.2004.1268582"},{"unstructured":"Tuominen, A., et\u00a0al.: MIPL Mobile IPv6 for Linux in HUT campus network MediaPoli. Proceedings of Ottawa Linux Symposium (2001)","key":"9075_CR15"},{"unstructured":"The Click Modular Router Project. http:\/\/pdos.csail.mit.edu\/click\/ (last checked on the 31st of February 2007)","key":"9075_CR16"},{"doi-asserted-by":"crossref","unstructured":"Hu, X., Bi, Y., Huang, J., Song, J.: Study on unified under layer trigger mechanism for handover optimization in mobile IP networks. In: 2nd International Conference on Mobile Technology, Applications and Systems, pp. 1\u20136, Beijing University of Posts and Telecommunications, P. R. China (November 2005)","key":"9075_CR17","DOI":"10.1109\/MTAS.2005.207184"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-007-9075-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-007-9075-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-007-9075-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T23:20:26Z","timestamp":1737415226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-007-9075-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,12]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,6]]}},"alternative-id":["9075"],"URL":"https:\/\/doi.org\/10.1007\/s10922-007-9075-8","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2007,9,12]]}}}