{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T16:59:29Z","timestamp":1772038769478,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[1999,9,1]],"date-time":"1999-09-01T00:00:00Z","timestamp":936144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1999,9,1]],"date-time":"1999-09-01T00:00:00Z","timestamp":936144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Networks"],"published-print":{"date-parts":[[1999,9]]},"DOI":"10.1023\/a:1019179817993","type":"journal-article","created":{"date-parts":[[2003,2,19]],"date-time":"2003-02-19T18:30:27Z","timestamp":1045679427000},"page":"373-390","source":"Crossref","is-referenced-by-count":24,"title":["A public\u2010key based secure Mobile IP"],"prefix":"10.1007","volume":"5","author":[{"given":"John","family":"Zao","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Kent","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Gahm","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Troxel","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Condell","sequence":"additional","affiliation":[]},{"given":"Pam","family":"Helinek","sequence":"additional","affiliation":[]},{"given":"Nina","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Isidro","family":"Castineyra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"330528_CR1","doi-asserted-by":"crossref","unstructured":"R. Atkinson, Security architecture for the Internet protocol, RFC1825, IETF Network Working Group (August 1995).","DOI":"10.17487\/rfc1825"},{"key":"330528_CR2","unstructured":"A. Aziz, Simple Key-management for Internet Protocol (SKIP), <draft-ietf-ipsec-skip-06>, IETF IP Security Working Group (November 1995)."},{"key":"330528_CR3","unstructured":"A. Aziz, T. Markson and H. Prafullchandra, Certificate discovery protocol, <draft-ietf-ipsec-skip-06>, IETF IPSec Working Group (November 1995)."},{"key":"330528_CR4","doi-asserted-by":"crossref","unstructured":"S.M. Bellovin, Security problems in TCP\/IP protocol suite, ACM Computer Communications Review 19(2) (March 1989).","DOI":"10.1145\/378444.378449"},{"key":"330528_CR5","doi-asserted-by":"crossref","unstructured":"T. Dierks and C. Allen, The TLS protocol version 1.0, RFC2246, IETF Network Working Group (January 1999).","DOI":"10.17487\/rfc2246"},{"key":"330528_CR6","unstructured":"D.E. Eastlake III and O. Gudmundsson, Storing certificates in the domain name system, <draft-ietf-dnssec-certs-01>, IETF DNS Security Working Group (November 1997)."},{"key":"330528_CR7","unstructured":"D.E. Eastlake III and C.W. Kaufman, Domain name system security extensions, <draft-ietf-dnssec-secext-06>, IETF DNS Security Working Group (October 1995)."},{"key":"330528_CR8","unstructured":"S. Garfinkel, PGP: Pretty Good Privacy(O'Reilly and Associates, 1995)."},{"key":"330528_CR9","doi-asserted-by":"crossref","unstructured":"D. Harkins and D. Carrel, The Internet Key Exchange (IKE), RFC2409, IETF Network Working Group (November 1998).","DOI":"10.17487\/rfc2409"},{"key":"330528_CR10","unstructured":"P. Helinek, N. Yuan, M. Condell and J. Zao, Security architecture for global host mobility, Quarterly Technical Report #6, BBN (February 1997)."},{"key":"330528_CR11","unstructured":"R. Housley, W. Ford, W. Polk and D. Solo, Internet public key infrastructure, Part I: X.509 certificate and CRL profile, <draftietf-pkix-ipki-part1\u201306>, IETF PKIX Working Group (October 1997)."},{"key":"330528_CR12","unstructured":"R. Housley, W. Ford and D. Solo, Internet public key infrastructure, Part I: X.509 certificate and CRL profile, <draft-ietfpkix-ipki-part1\u201302>, IETF PKIX Working Group (June 1996)."},{"key":"330528_CR13","unstructured":"D.B. Johnson, The CMU monarch project, http:\/\/www. monarch.cs.cmu.edu\/"},{"key":"330528_CR14","unstructured":"D.B. Johnson and C. Perkins, Route optimization in MI, <draftietf-mobileip-optim-03>, IETF Mobile IP Working Group (November 1995)."},{"key":"330528_CR15","unstructured":"P. Karn and W.A. Simpson, Photuris session key management protocol, <draft-ietf-ipsec-photuris-08>, IETF IP Security Working Group (November 1995)."},{"key":"330528_CR16","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. Bellare and R. Canetti, HMAC-MD5: Keyed-MD5 for message authentication, <draft-ietf-ipsec-hmacmd5\u201303>, IETF IP Security Working Group (March 1996).","DOI":"10.17487\/rfc2104"},{"key":"330528_CR17","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. Bellare and R. Canetti, HMAC-SHA-1: Keyed-SHA-1 for message authentication, <draft-ietf-ipsechmac-sha1\u201303>, IETF IP Security Working Group (March 1996).","DOI":"10.17487\/rfc2104"},{"key":"330528_CR18","doi-asserted-by":"crossref","unstructured":"D. Maughan, M. Schertler, M. Schneider and J. Turner, Internet Security Association & Key Management Protocol (ISAKMP), <draft-ietf-ipsec-isakmp-07>, IPSec Working Group (February 1997).","DOI":"10.17487\/rfc2408"},{"key":"330528_CR19","unstructured":"J. McHugh and J. Binkley, The Portland State University Secure Mobile Networking Project, http:\/\/www.cs.pdx.edu\/ research\/smn."},{"key":"330528_CR20","doi-asserted-by":"crossref","unstructured":"P.V. Mockapetris, Domain Names: Concepts and facilities, RFC1034 (November 1987).","DOI":"10.17487\/rfc1034"},{"key":"330528_CR21","doi-asserted-by":"crossref","unstructured":"G. Montenegro, Reverse tunneling for Mobile IP, <draft-ietfmobileip-tunnel-reverse-02>, IETF Mobile IP Working Group (March 1997).","DOI":"10.17487\/rfc2344"},{"key":"330528_CR22","unstructured":"G. Montenegro and V. Gupta, Firewall support for Mobile IP, <draft-montenegro-firewall-sup-03>, IETF Mobile IP Working Group (January 1998)."},{"key":"330528_CR23","doi-asserted-by":"crossref","unstructured":"C. Perkins, ed., IP mobility support, RFC2002, proposed standard, IETF Mobile IP Working Group (October 1996).","DOI":"10.17487\/rfc2002"},{"key":"330528_CR24","doi-asserted-by":"crossref","unstructured":"C. Perkins, IP Encapsulation within IP, RFC2003, proposed standard, IETF Mobile IP Working Group (October 1996).","DOI":"10.17487\/rfc2003"},{"key":"330528_CR25","doi-asserted-by":"crossref","unstructured":"C. Perkins, Minimum encapsulation within IP, RFC2004, proposed standard, IETF Mobile IP Working Group (October 1996).","DOI":"10.17487\/rfc2003"},{"key":"330528_CR26","doi-asserted-by":"crossref","unstructured":"D. Piper, The Internet IP security domain interpretation for ISAKMP, <draft-ietf-ipsec-ipsec-doi-06>, IPSec Working Group (November 1997).","DOI":"10.17487\/rfc2407"},{"key":"330528_CR27","unstructured":"Public Key Cryptographic Standard No. 11-Cryptoki. V.1.0, RSA Laboratories (April 1995)."},{"key":"330528_CR28","unstructured":"J.K. Zao and M. Condell, Use of IPSec in Mobile IP, <draftietf-mobileip-use-01>, IETF Mobile IP Working Group (November 1997)."},{"key":"330528_CR29","unstructured":"J. Zao, J. Gahm and M. Condell, Security architecture for global host mobility, Quarterly Technical Report #5, BBN (October 1996)."},{"key":"330528_CR30","unstructured":"J. Zao and S. Kent, New key generation algorithm for Mobile IP control message authentication, MoIPS Quarterly Technical Report #3, Sect. 4, BBN Corp. (April 1996)."},{"key":"330528_CR31","unstructured":"N. Ziring and D.E. Peele, Programming with Cryptoki, an objectoriented approach, NSA Technical Report (January 1996)."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019179817993.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1019179817993\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019179817993.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T12:07:59Z","timestamp":1755086879000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1019179817993"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,9]]},"references-count":31,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1999,9]]}},"alternative-id":["330528"],"URL":"https:\/\/doi.org\/10.1023\/a:1019179817993","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,9]]}}}