{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:51:36Z","timestamp":1725796296340},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/iwscn.2010.5497995","type":"proceedings-article","created":{"date-parts":[[2010,7,12]],"date-time":"2010-07-12T14:21:17Z","timestamp":1278944477000},"page":"1-7","source":"Crossref","is-referenced-by-count":10,"title":["Fast VPN mobility across Wi-Fi hotspots"],"prefix":"10.1109","author":[{"given":"Andre","family":"Zuquete","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Frade","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Mobility Support Mechanism for IP VPN on the MPLS Network","author":"lee","year":"2002","journal-title":"IASTED Int Conf on Communications Internet and Information Technology"},{"key":"ref11","article-title":"Mobile VPN, Secure Connectivity on the Move","author":"motorola","year":"2008","journal-title":"White Paper"},{"key":"ref12","article-title":"IP Mobility Support for IPv4","author":"perkins","year":"2002","journal-title":"IETF RFC 3344"},{"key":"ref13","article-title":"The MD5 Message-Digest Algorithm","author":"rivest","year":"1992","journal-title":"IETF RFC 1321"},{"key":"ref14","article-title":"Building ALL-IP Based Virtual Private Networks in Mobile Environment","author":"ruppelt","year":"2001","journal-title":"Int Works on Informatik and Mobile communication over wireless LAN Research and applications Austria"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46701-7_17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4689212"},{"key":"ref4","article-title":"IKEv2 Mobility and Multihoming Protocol (MOBIKE)","author":"eronen","year":"2006","journal-title":"IETF RFC 4555"},{"key":"ref3","article-title":"The TLS Protocol Version 1.0","author":"dierks","year":"1999","journal-title":"IETF RFC 2246"},{"key":"ref6","article-title":"Point-to-Point Tunneling Protocol","author":"hamzeh","year":"1999","journal-title":"IETF RFC 2637"},{"journal-title":"Secure Virtual Private Networks Technical Guide ja net","year":"2009","author":"graham","key":"ref5"},{"key":"ref8","article-title":"Security Architecture for the Internet Protocol","author":"kent","year":"2005","journal-title":"IETF RFC 4301"},{"key":"ref7","article-title":"UDP Encapsulation of IPsec ESP Packets","author":"huttunen","year":"2005","journal-title":"RFC 3948 IETF"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/047148296X"},{"journal-title":"RFC 3174 us secure hash algorithm 1 (shal)","year":"2001","key":"ref1"},{"key":"ref9","article-title":"HMAC: Keyed-Hashing for Message Authentication","author":"krawczyk","year":"1997","journal-title":"IETF RFC 2104"}],"event":{"name":"2010 2nd International Workshop on Security and Communication Networks (IWSCN)","start":{"date-parts":[[2010,5,26]]},"location":"Karlstad, Sweden","end":{"date-parts":[[2010,5,28]]}},"container-title":["2010 2nd International Workshop on Security and Communication Networks (IWSCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5487608\/5497988\/05497995.pdf?arnumber=5497995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T23:03:33Z","timestamp":1489878213000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5497995\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iwscn.2010.5497995","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}