{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T08:14:33Z","timestamp":1673597673705},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s11623-014-0007-y","type":"journal-article","created":{"date-parts":[[2014,1,20]],"date-time":"2014-01-20T18:23:11Z","timestamp":1390242191000},"page":"25-30","source":"Crossref","is-referenced-by-count":3,"title":["Heterogeneous networking"],"prefix":"10.1007","volume":"38","author":[{"given":"Amandeep","family":"Singh","sequence":"first","affiliation":[]},{"given":"Gaston","family":"Ormaz\u00e1bal","sequence":"additional","affiliation":[]},{"given":"Henning","family":"Schulzrinne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,22]]},"reference":[{"key":"7_CR1","unstructured":"Cisco Visual Networking Index. White Paper. Cisco Systems Inc., Jun. 2013."},{"key":"7_CR2","volume-title":"Heterogeneous Access: Survey and Design Considerations. Technical Report","author":"A Singh","year":"2013","unstructured":"A. Singh, G. Ormaz\u00e1bal and H. Schulzrinne. Heterogeneous Access: Survey and Design Considerations. Technical Report. Columbia University, Oct. 2013."},{"key":"7_CR3","doi-asserted-by":"publisher","DOI":"10.1145\/2589649.2554670","volume-title":"Unified Heterogeneous Networking Design","author":"A Singh","year":"2013","unstructured":"A. Singh, G. Ormaz\u00e1bal, H. Schulzrinne, Y. Zou, P. Thermos and S. Addepalli. Unified Heterogeneous Networking Design. IPTComm 2013, Chicago, USA. IPTComm ACM Proceedings, Oct. 2013."},{"key":"7_CR4","unstructured":"IEEE Standard for Local and Metropolitan Area Networks \u2014 Part 21: Media Independent Handover Services, \n                    http:\/\/www.ieee802.org\/21\/"},{"key":"7_CR5","unstructured":"IEEE 802.11u Standard, \n                    http:\/\/www.ieee802.org\/11\/Reports\/tgu_update.htm"},{"key":"7_CR6","volume-title":"Extensible Authentication Protocol (EAP), IETF RFC 3748","author":"B Aboba","year":"2004","unstructured":"B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, Extensible Authentication Protocol (EAP), IETF RFC 3748, Jun 2004."},{"key":"7_CR7","unstructured":"J. Arkko, V. Lehtovirta, and P. Eronen, Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA\u2019), IETF RFC 5448, \n                    https:\/\/tools.ietf.org\/html\/rfc5448"},{"key":"7_CR8","volume-title":"Security Analysis and Improvements for IEEE 802.11i, The 12th Annual Network and Distributed System Security Symposium (NDSS\u201905) Stanford University, Stanford","author":"C He","year":"2005","unstructured":"C. He and J. C. Mitchell, Security Analysis and Improvements for IEEE 802.11i, The 12th Annual Network and Distributed System Security Symposium (NDSS\u201905) Stanford University, Stanford. 2005."},{"key":"7_CR9","volume-title":"RFC 3972","author":"T Aura","year":"2005","unstructured":"T. Aura, \u201cCryptographically Generated Addresses (CGA)\u201d, RFC 3972, Mar. 2005, \n                    http:\/\/tools.ietf.org\/html\/rfc3972"},{"key":"7_CR10","volume-title":"IETF Internet Draft","author":"S Jiang","year":"2012","unstructured":"S. Jiang and S. Shen, \u201cSecure DHCPv6 Using CGAs\u201d, IETF Internet Draft, Sep. 2012, \n                    http:\/\/tools.ietf.org\/html\/draft-ietf-dhc-secure-dhcpv6-07"},{"key":"7_CR11","volume-title":"RFC 3971","author":"J Arkko","year":"2005","unstructured":"J. Arkko, J. Kempf, B. Zill, P. Nikander, \u201cSEcure Neighbor Discovery (SEND)\u201d, RFC 3971, Mar. 2005, \n                    http:\/\/tools.ietf.org\/html\/rfc3971"},{"key":"7_CR12","volume-title":"Proxy Mobile IPv6, RFC 5213","author":"S Gundavelli","year":"2008","unstructured":"S. Gundavelli, K. Leung, V. Devarapalli, Wichorus, K. Chowdhary, and B. Patil, Proxy Mobile IPv6, RFC 5213, Aug 2008, \n                    http:\/\/tools.ietf.org\/html\/rfc5213"},{"key":"7_CR13","volume-title":"IETF RFC 6275","author":"C Perkins","year":"2011","unstructured":"C. Perkins, D. Johnson, and J. Arkko. Mobility Support in IPv6. IETF RFC 6275, July 2011."},{"key":"7_CR14","volume-title":"IETF RFC 5206","author":"P Nikander","year":"2008","unstructured":"P. Nikander, T. Henderson, C. Vogt, and J. Akko. End-Host Mobility and Multi-homing with Host Identity Protocol. IETF RFC 5206, Apr. 2008."},{"key":"7_CR15","unstructured":"Open Networking Foundation, \n                    https:\/\/www.opennetworking.org"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0007-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-014-0007-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0007-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-014-0007-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:22:39Z","timestamp":1559398959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-014-0007-y"}},"subtitle":["Security Challenges and Considerations"],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["7"],"URL":"https:\/\/doi.org\/10.1007\/s11623-014-0007-y","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1]]}}}