{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:20:52Z","timestamp":1729657252458,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/rfid-ta.2013.6694519","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T12:06:51Z","timestamp":1389010011000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Security mechanism for IPv6 router discovery based on distributed trust management"],"prefix":"10.1109","author":[{"family":"Supriyanto","sequence":"first","affiliation":[]},{"given":"Raja Kumar","family":"Murugesan","sequence":"additional","affiliation":[]},{"given":"Azlan","family":"Osman","sequence":"additional","affiliation":[]},{"given":"Sureswaran","family":"Ramadass","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.76"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283739"},{"key":"15","article-title":"IPv6 router advertisement guard (ra-guard) evasion","author":"gont","year":"2011","journal-title":"Internet draft"},{"journal-title":"Implementing First Hop Security in IPv6","year":"2011","author":"cisco","key":"16"},{"key":"13","article-title":"SAVI threat scope","author":"mcpherson","year":"2011","journal-title":"Internet draft"},{"key":"14","article-title":"Source address validation improvement framework","author":"wu","year":"2010","journal-title":"Internet"},{"key":"11","article-title":"Source address validation improvement framework","author":"wu","year":"0","journal-title":"Internet draft"},{"key":"12","first-page":"64","volume":"30","author":"supriyanto","year":"2013","journal-title":"Survey of Internet Protocol Version 6 Link Local Communication Security Vulnerability and Mitigation Methods"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_17"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1007\/11535218_26","article-title":"Merkle-Damga?rd revisited: How to construct a hash function","author":"coron","year":"2005","journal-title":"Advances in Cryptology-CRYPTO 2005"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/141809.141812"},{"journal-title":"Cryptography and Network Security 4\/E2006","year":"0","author":"william","key":"23"},{"key":"24","article-title":"Analysis of SEND protocol through implementation and simulation","author":"gaeil","year":"2007","journal-title":"International Conference on Convergence Information Technology"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45807-7_4"},{"key":"26","article-title":"Easy-send: A didactic implementation of the secure neighbor discovery protocol for ipv6","author":"chiu","year":"2009","journal-title":"Proceedings of the World Congress on Engineering and Computer Science 2009 WCECS 2009"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4301"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3971"},{"key":"10","first-page":"148","article-title":"Decentralized trust management for securing community nteworks","volume":"13","author":"zhao","year":"2009","journal-title":"Intel Technology Journal"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4861"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CSSS.2011.5974125"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6105"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.27"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3756"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1256"},{"key":"8","article-title":"TRDP: A trusted router discovery protocol","author":"jun","year":"0","journal-title":"2007 International Symposium on Communications and Information Technologies ISCIT"}],"event":{"name":"2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA 2013)","start":{"date-parts":[[2013,9,4]]},"location":"Johor Bahru","end":{"date-parts":[[2013,9,5]]}},"container-title":["2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6683939\/6694496\/06694519.pdf?arnumber=6694519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:22:59Z","timestamp":1498094579000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6694519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/rfid-ta.2013.6694519","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}