{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T19:10:01Z","timestamp":1742584201568,"version":"3.40.2"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2003,11,1]],"date-time":"2003-11-01T00:00:00Z","timestamp":1067644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Network"],"published-print":{"date-parts":[[2003,11]]},"DOI":"10.1109\/mnet.2003.1248657","type":"journal-article","created":{"date-parts":[[2003,11,25]],"date-time":"2003-11-25T19:49:13Z","timestamp":1069789753000},"page":"18-26","source":"Crossref","is-referenced-by-count":54,"title":["Host mobility for IP networks: a comparison"],"prefix":"10.1109","volume":"17","author":[{"given":"T.R.","family":"Henderson","sequence":"first","affiliation":[]}],"member":"263","reference":[{"volume-title":"Mobile IP Design Principals and Practices","year":"1997","author":"Perkins","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345938"},{"article-title":"Host Identity Payload and Protocol","year":"2001","author":"Moscowitz","key":"ref3"},{"volume-title":"Mobile Ad-Hoc Networking","year":"2000","author":"Perkins","key":"ref4"},{"article-title":"Multi-Homed TCP","year":"1995","author":"Huitema","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1998.662913"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/RFC4960"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2001.985806"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/372346.372369"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570657"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.2000.895385"},{"key":"ref12","article-title":"The Nimrod Routing Architecture","author":"Castineyra","year":"1992 1996","journal-title":"IETF RFC"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2103"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383065"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/319344.319164"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/262116.262144"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3344"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/98.511765"},{"key":"ref19","first-page":"6","article-title":"Mobility Support in IPv6","author":"Johnson","year":"2003","journal-title":"Internet draft, work in progress, draft-ietf-mobileip-ipv"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/565702.565704"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.986462"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1031839"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2058"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2977"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2002.997211"},{"key":"ref26","first-page":"3","article-title":"Enhancing Survivability of Mobile Internet Access using Mobile IP with Location Registers","volume":"1","author":"Jain","year":"1999","journal-title":"Proc. IEEE INFOCOM"},{"article-title":"Homeless Mobile IPv6","year":"2001","author":"Nikander","key":"ref27"},{"key":"ref28","first-page":"221","article-title":"ConcurrentOn-Line Tracking on Mobile Users","volume-title":"Proc. ACM SIGCOMM","author":"Awerbuch","year":"1991"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.2001.990059"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1498"},{"article-title":"Endpoints and Endpoint Names: A Proposed Enhancement to the Internet Architecture","year":"1999","author":"Chiappa","key":"ref32"},{"article-title":"What\u2019s In a Name: Thoughts from the NSRG","year":"2002","author":"Lear","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028465"},{"key":"ref35","article-title":"EIDs, IPsec, and HostNAT","volume-title":"Presentation at 41st IETF mtg.","author":"Bellovin","year":"1998"},{"key":"ref36","article-title":"Integrating Security, Mobility, and Multi-homing in a HIP Way","volume-title":"Proc. Net. and Distrib. Sys. Security Symp.","author":"Nikander","year":"2003"},{"key":"ref37","first-page":"555","article-title":"Towards Secure Mobility Support for IP Networks","volume-title":"Proc. IFIP ICCT","author":"Minl","year":"2000"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.803905"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916678"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/584051.584053"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2001.985937"}],"container-title":["IEEE Network"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/65\/27955\/01248657.pdf?arnumber=1248657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T18:29:55Z","timestamp":1742581795000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1248657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,11]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2003,11]]}},"URL":"https:\/\/doi.org\/10.1109\/mnet.2003.1248657","relation":{},"ISSN":["0890-8044"],"issn-type":[{"type":"print","value":"0890-8044"}],"subject":[],"published":{"date-parts":[[2003,11]]}}}