{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:10:14Z","timestamp":1766067014525,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3341498","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["6G Network Needs to Support Embedded Trust"],"prefix":"10.1145","author":[{"given":"Raimo","family":"Kantola","sequence":"first","affiliation":[{"name":"Department of Communications and Networking, Aalto University, Finland"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"White Paper of 1st 6G Summit","author":"Lepp\u00e4nen M.","year":"2019","unstructured":"K. Lepp\u00e4nen , M. Latva -aho , ed., White Paper of 1st 6G Summit , 2019 (arxiv.org). K. Lepp\u00e4nen, M. Latva-aho, ed., White Paper of 1st 6G Summit, 2019 (arxiv.org)."},{"unstructured":"Regulation (EU) 2015\/2120 of the European Parliament and of the Council of 25 November 2015 laying down measures concerning open internet access and amending Directive 2002\/22\/EC on universal service and users' rights relating to electronic communications networks and services and Regulation (EU) No 531\/2012 on roaming on public mobile communications networks within the Union OJ L 310 26.11.2015 p. 1--18 ELI: http:\/\/data.europa.eu\/eli\/reg\/2015\/2120\/oj  Regulation (EU) 2015\/2120 of the European Parliament and of the Council of 25 November 2015 laying down measures concerning open internet access and amending Directive 2002\/22\/EC on universal service and users' rights relating to electronic communications networks and services and Regulation (EU) No 531\/2012 on roaming on public mobile communications networks within the Union OJ L 310 26.11.2015 p. 1--18 ELI: http:\/\/data.europa.eu\/eli\/reg\/2015\/2120\/oj","key":"e_1_3_2_1_2_1"},{"unstructured":"Body of European Regulators for Electronic Communications BEREC Guidelines on the Implementation by National Regulators of European Net Neutrality Rules.  Body of European Regulators for Electronic Communications BEREC Guidelines on the Implementation by National Regulators of European Net Neutrality Rules.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","volume-title":"5GPPP Phase 1 Security Landscape","author":"Security WG","year":"2017","unstructured":"5GPPP Security WG , 5GPPP Phase 1 Security Landscape , 2017 . 5GPPP Security WG, 5GPPP Phase 1 Security Landscape, 2017."},{"unstructured":"5G Ensure Deliverable D 2.5. Trust Model (final) 2018.  5G Ensure Deliverable D 2.5. Trust Model (final) 2018.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1002\/sec.1253"},{"unstructured":"C. Huitema D. Thaler R. Winter Current Hostname Practice Considered Harmful RFC 8117.  C. Huitema D. Thaler R. Winter Current Hostname Practice Considered Harmful RFC 8117.","key":"e_1_3_2_1_7_1"},{"unstructured":"V. P. Kafle ID\/locator split networks Akari NICT 2009.  V. P. Kafle ID\/locator split networks Akari NICT 2009.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/MCOM.2010.5402677"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/icc.2011.5963378"},{"key":"e_1_3_2_1_11_1","volume-title":"RFC","author":"Moskowitz T. H.","year":"2015","unstructured":"R. Moskowitz , T. H. Hirschmann , P. Jokela , T. Hendersson , Host Identity Protocol v2 , RFC 7401, April 2015 . R. Moskowitz, T. H. Hirschmann, P. Jokela, T. Hendersson, Host Identity Protocol v2, RFC 7401, April 2015."},{"doi-asserted-by":"crossref","unstructured":"D. Farinacci V. Fuller D. Meyer D. Lewis The Locator\/ID Separation Protocol RFC 6830 1\/2013.  D. Farinacci V. Fuller D. Meyer D. Lewis The Locator\/ID Separation Protocol RFC 6830 1\/2013.","key":"e_1_3_2_1_12_1","DOI":"10.17487\/rfc6830"}],"event":{"acronym":"ARES '19","name":"ARES '19: 14th International Conference on Availability, Reliability and Security","location":"Canterbury CA United Kingdom"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3341498","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3341498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:29Z","timestamp":1750204469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3341498"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":12,"alternative-id":["10.1145\/3339252.3341498","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3341498","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}