{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:51:41Z","timestamp":1729655501226,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ccnc.2006.1593150","type":"proceedings-article","created":{"date-parts":[[2006,2,15]],"date-time":"2006-02-15T14:29:31Z","timestamp":1140013771000},"page":"803-807","source":"Crossref","is-referenced-by-count":0,"title":["VIP (VHE in mobile IP networks) architecture"],"prefix":"10.1109","volume":"2","author":[{"given":"O.R.","family":"Rojas","sequence":"first","affiliation":[]},{"given":"J.B.","family":"Othman","sequence":"additional","affiliation":[]},{"given":"S.","family":"Sfar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1777"},{"journal-title":"Operation 2003","article-title":"Trial-use recommended practice for multi-vendor access point interoperability via an inter-access point protocol across distribution systems supporting IEEE 802.11","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"},{"journal-title":"WPA (Wi-fi Protected Access)","year":"2004","key":"12"},{"journal-title":"Virtual Home Environment for Service Personalization and Roaming Users","year":"0","key":"3"},{"journal-title":"UMTS Network Aspects","year":"0","key":"2"},{"journal-title":"Virtual Home Environment (VHE) Release 1999","article-title":"Technical specification group services and system aspects","year":"0","key":"1"},{"journal-title":"Product Bulletin No 1515 Cisco Wireless LAN","article-title":"Security bulletin","year":"2000","key":"10"},{"journal-title":"Port Based Network Access Control","year":"2001","key":"7"},{"key":"6","article-title":"PPP EAP TLS authentication protocol","volume":"2716","author":"aboba","year":"1999","journal-title":"IETF RFC"},{"year":"0","key":"5"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45494-2_10","article-title":"Mobility management and roaming with mobile agents","author":"van thanh","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"An Initial Security Analysis of the IEEE 802 1X Standard","year":"2002","author":"mishra","key":"9"},{"key":"8","article-title":"Remote Authentication Dial in User Service (RADIUS)","volume":"2865","author":"rigney","year":"2000","journal-title":"IETF RFC"}],"event":{"name":"CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.","location":"Las Vegas, NV, USA"},"container-title":["CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10599\/33506\/01593150.pdf?arnumber=1593150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T23:12:28Z","timestamp":1497654748000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1593150\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2006.1593150","relation":{},"subject":[]}}