{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:12Z","timestamp":1750307592745,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T00:00:00Z","timestamp":1259625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1145\/1659029.1659032","type":"proceedings-article","created":{"date-parts":[[2009,12,1]],"date-time":"2009-12-01T19:26:20Z","timestamp":1259695580000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhanced wireless roaming security using three-party authentication and tunnels"],"prefix":"10.1145","author":[{"given":"Damien","family":"Leroy","sequence":"first","affiliation":[{"name":"Universite catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Mark","family":"Manulis","sequence":"additional","affiliation":[{"name":"TU Darmstadt &amp; CASED, Darmstadt, Germany"}]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[{"name":"Universite catholique de Louvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2009,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"FON http:\/\/www.fon.com.  FON http:\/\/www.fon.com."},{"key":"e_1_3_2_1_2_1","volume-title":"RFC","author":"Funk P.","year":"2008","unstructured":"P. Funk and S. Blake-Wilson , \" Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0),\" IETF , RFC 5281, Aug. 2008 . P. Funk and S. Blake-Wilson, \"Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0),\" IETF, RFC 5281, Aug. 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533072"},{"key":"e_1_3_2_1_4_1","volume-title":"RFC","author":"Kent S.","year":"2005","unstructured":"S. Kent and K. Seo , \" Security Architecture for the Internet Protocol,\" IETF , RFC 4301, Dec. 2005 . S. Kent and K. Seo, \"Security Architecture for the Internet Protocol,\" IETF, RFC 4301, Dec. 2005."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1093\/ijlit\/ean016"},{"key":"e_1_3_2_1_6_1","volume-title":"RFC","author":"Aboba B.","year":"2004","unstructured":"B. Aboba , L. Blunk , J. Vollbrecht , J. Carlson , and H. Levkowetz , \" Extensible Authentication Protocol (EAP),\" IETF , RFC 3748, Jun. 2004 . B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, \"Extensible Authentication Protocol (EAP),\" IETF, RFC 3748, Jun. 2004."},{"key":"e_1_3_2_1_7_1","volume-title":"RFC","author":"Townsley W.","year":"1999","unstructured":"W. Townsley , A. Valencia , A. Rubens , G. Pall , G. Zorn , and B. Palter , \" Layer Two Tunneling Protocol L2TP,\" IETF , RFC 2661, Aug. 1999 . W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter, \"Layer Two Tunneling Protocol L2TP,\" IETF, RFC 2661, Aug. 1999."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"S. Kent \"IP Encapsulating Security Payload (ESP) \" IETF RFC 4303 Dec. 2005.  S. Kent \"IP Encapsulating Security Payload (ESP) \" IETF RFC 4303 Dec. 2005.","DOI":"10.17487\/rfc4303"},{"key":"e_1_3_2_1_9_1","unstructured":"Eduroam http:\/\/www.eduroam.org.  Eduroam http:\/\/www.eduroam.org."},{"key":"e_1_3_2_1_10_1","volume-title":"RFC","author":"Hamzeh K.","year":"1999","unstructured":"K. Hamzeh , G. Pall , W. Verthein , J. Taarud , W. Little , and G. Zorn , \" Point-to-Point Tunneling Protocol (PPTP),\" IETF , RFC 2637, Jul. 1999 . K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, and G. Zorn, \"Point-to-Point Tunneling Protocol (PPTP),\" IETF, RFC 2637, Jul. 1999."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"C. Perkins \"IP Mobility Support for IPv4 \" IETF RFC 3344 Aug. 2002.   C. Perkins \"IP Mobility Support for IPv4 \" IETF RFC 3344 Aug. 2002.","DOI":"10.17487\/rfc3220"},{"key":"e_1_3_2_1_12_1","volume-title":"Architecting Citywide Ubiquitous Wi-Fi Access,\" in HotNets-VI","author":"Sastry N.","year":"2007","unstructured":"N. Sastry , K. Sollins , and J. Crowcroft , \" Architecting Citywide Ubiquitous Wi-Fi Access,\" in HotNets-VI , 2007 . N. Sastry, K. Sollins, and J. Crowcroft, \"Architecting Citywide Ubiquitous Wi-Fi Access,\" in HotNets-VI, 2007."}],"event":{"name":"Co-NEXT '09: Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Rome Italy","acronym":"Co-NEXT '09"},"container-title":["Proceedings of the 1st ACM workshop on User-provided networking: challenges and opportunities"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1659029.1659032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1659029.1659032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:32Z","timestamp":1750250492000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1659029.1659032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":12,"alternative-id":["10.1145\/1659029.1659032","10.1145\/1659029"],"URL":"https:\/\/doi.org\/10.1145\/1659029.1659032","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]},"assertion":[{"value":"2009-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}