{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:44:32Z","timestamp":1750308272713,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,10]],"date-time":"2012-04-10T00:00:00Z","timestamp":1334016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,10]]},"DOI":"10.1145\/2181196.2181204","type":"proceedings-article","created":{"date-parts":[[2012,4,10]],"date-time":"2012-04-10T12:19:38Z","timestamp":1334060378000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Providing secure and accountable privacy to roaming 802.11 mobile devices"],"prefix":"10.1145","author":[{"given":"Panagiotis","family":"Georgopoulos","sequence":"first","affiliation":[{"name":"Lancaster University, Lancaster, UK"}]},{"given":"Ben","family":"McCarthy","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster, UK"}]},{"given":"Christopher","family":"Edwards","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster, UK"}]}],"member":"320","published-online":{"date-parts":[[2012,4,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"B. Aboba M. Beadles J. Arkko and P. Eronen. The Network Access Identifier. IETF RFC 4282 Dec 2005.  B. Aboba M. Beadles J. Arkko and P. Eronen. The Network Access Identifier. IETF RFC 4282 Dec 2005.","DOI":"10.17487\/rfc4282"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"F. Adrangi A. Lior J. Korhonen and J. Loughney. Chargeable User Identity. IETF RFC 4372 Jan 2006.  F. Adrangi A. Lior J. Korhonen and J. Loughney. Chargeable User Identity. IETF RFC 4372 Jan 2006.","DOI":"10.17487\/rfc4372"},{"key":"e_1_3_2_1_3_1","unstructured":"V. Devarapalli R. Wakikawa A. Petrescu and P. Thubert. NEMO Basic Support Protocol. IETF RFC 3963 Jan 2005.  V. Devarapalli R. Wakikawa A. Petrescu and P. Thubert. NEMO Basic Support Protocol. IETF RFC 3963 Jan 2005."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246 Aug 2008.  T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246 Aug 2008.","DOI":"10.17487\/rfc5246"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"D. Forsberg Y. Ohba B. Patil H. Tschofenig and A. Yegin. Protocol for Carrying Authentication for Network Access (PANA). IETF RFC 5191 May 2008.  D. Forsberg Y. Ohba B. Patil H. Tschofenig and A. Yegin. Protocol for Carrying Authentication for Network Access (PANA). IETF RFC 5191 May 2008.","DOI":"10.17487\/rfc5191"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2011.5720182"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008780.2008802"},{"key":"e_1_3_2_1_8_1","unstructured":"C. Laat G. Gross L. Gommans J. Vollbrecht and D. Spence. Generic AAA Architecture. IETF RFC 2903 Aug 2000.   C. Laat G. Gross L. Gommans J. Vollbrecht and D. Spence. Generic AAA Architecture. IETF RFC 2903 Aug 2000."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/236387.236400"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"C. Rigney S. Willens A. Rubens and W. Simpson. Remote Authentication Dial In User Service (RADIUS). IETF RFC 2865 Jun 2000.   C. Rigney S. Willens A. Rubens and W. Simpson. Remote Authentication Dial In User Service (RADIUS). IETF RFC 2865 Jun 2000.","DOI":"10.17487\/rfc2865"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"D. Simon B. Aboba and R. Hurst. The EAP-TLS Authentication Protocol. IETF RFC 5216 Mar 2008.  D. Simon B. Aboba and R. Hurst. The EAP-TLS Authentication Protocol. IETF RFC 5216 Mar 2008.","DOI":"10.17487\/rfc5216"}],"event":{"name":"EuroSys '12: Seventh EuroSys Conference 2012","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Bern Switzerland","acronym":"EuroSys '12"},"container-title":["Proceedings of the First Workshop on Measurement, Privacy, and Mobility"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2181196.2181204","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2181196.2181204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:24:09Z","timestamp":1750267449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2181196.2181204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,10]]},"references-count":11,"alternative-id":["10.1145\/2181196.2181204","10.1145\/2181196"],"URL":"https:\/\/doi.org\/10.1145\/2181196.2181204","relation":{},"subject":[],"published":{"date-parts":[[2012,4,10]]},"assertion":[{"value":"2012-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}