{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T23:50:46Z","timestamp":1684885846639},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2013,8,15]],"date-time":"2013-08-15T00:00:00Z","timestamp":1376524800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s11623-013-0239-2","type":"journal-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T10:31:16Z","timestamp":1376476276000},"page":"567-572","source":"Crossref","is-referenced-by-count":1,"title":["Sicherheitsherausforderungen von IPv6"],"prefix":"10.1007","volume":"37","author":[{"given":"Safuat","family":"Hamdy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,15]]},"reference":[{"key":"239_CR1","volume-title":"IPv6 \u2014 Migrationsleitfaden f\u00fcr die \u00f6ffentliche Verwaltung","author":"C Schmoll","year":"2013","unstructured":"C. Schmoll et al.: IPv6 \u2014 Migrationsleitfaden f\u00fcr die \u00f6ffentliche Verwaltung, Bundesverwaltungsamt, 2013"},{"key":"239_CR2","first-page":"691","volume":"12","author":"B Esslinger","year":"1997","unstructured":"B. Esslinger, M. M\u00fcller: Secure Sockets Layer (SSL) Protocol. DuD 12\/1997, S. 691\u2013697.","journal-title":"DuD"},{"key":"239_CR3","first-page":"614","volume":"10","author":"D Fox","year":"2005","unstructured":"D. Fox: ARP Poisoning. DuD 10\/2005, S. 614.","journal-title":"DuD"},{"key":"239_CR4","volume-title":"Hacking IPv6 Networks","author":"F Gont","year":"2011","unstructured":"F. Gont: Hacking IPv6 Networks. Vortragsfolien zu DEEPSEC 2011"},{"key":"239_CR5","volume-title":"Network Reconnaissance in IPv6 Networks","author":"F Gont","year":"2012","unstructured":"F. Gont: Network Reconnaissance in IPv6 Networks. IETF Internet Draft, Dezember 2012"},{"key":"239_CR6","volume-title":"IPv6 \u2014 Grundlagen, Funktionalit\u00e4t, Integration","author":"S Hagen","year":"2009","unstructured":"S. Hagen: IPv6 \u2014 Grundlagen, Funktionalit\u00e4t, Integration, 2. Auflage, Sunny Edition, 2009","edition":"2. Auflage"},{"key":"239_CR7","volume-title":"IPv6 \u2014 Die grundlegenden Funktionen, Bedrohungen und Ma\u00dfnahmen","author":"S Hamdy","year":"2013","unstructured":"S. Hamdy: IPv6 \u2014 Die grundlegenden Funktionen, Bedrohungen und Ma\u00dfnahmen, Secorvo White Paper, 2013."},{"key":"239_CR8","volume-title":"BSI-Standards zur Internet-Sicherheit (ISi-S)","author":"ISi-Projektgruppe","year":"2012","unstructured":"ISi-Projektgruppe: Sichere Anbindung von lokalen Netzen an das Internet (ISi-LANA) \u2014 Version 2.0, in BSI-Standards zur Internet-Sicherheit (ISi-S), Bundesamt f\u00fcr Sicherheit in der Informationstechnik, 2012"},{"key":"239_CR9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2460","volume-title":"Internet Protocol, Version 6 (IPv6) Specification","author":"S Deering","year":"1998","unstructured":"S. Deering, R. Hinden: Internet Protocol, Version 6 (IPv6) Specification, 1998"},{"key":"239_CR10","volume-title":"Requirements for IPv6 in ICT Equipment","author":"M K\u00e4o","year":"2012","unstructured":"M. K\u00e4o, J. \u017dor\u017e, S. Steffan: Requirements for IPv6 in ICT Equipment, RIPE-554, 2012"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0239-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-013-0239-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0239-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-013-0239-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:38Z","timestamp":1559413358000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-013-0239-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,15]]},"references-count":10,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["239"],"URL":"https:\/\/doi.org\/10.1007\/s11623-013-0239-2","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,15]]}}}