{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:23:22Z","timestamp":1771662202712,"version":"3.50.1"},"reference-count":28,"publisher":"Zhejiang University Press","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1631\/fitee.1500382","type":"journal-article","created":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T02:07:23Z","timestamp":1476324443000},"page":"1044-1055","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Anonymous-address-resolution model"],"prefix":"10.1631","volume":"17","author":[{"given":"Guang-jia","family":"Song","sequence":"first","affiliation":[]},{"given":"Zhen-zhou","family":"Ji","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2016,10,14]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/icoin.2012.6164388"},{"key":"ref2","article-title":"SEcure Neighbor Discovery (SEND)","author":"Arkko","year":"2005","journal-title":"Internet Engineering Task Force"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/sceecs.2012.6184794"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icsmc.2011.6084088"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/csac.2003.1254311"},{"key":"ref6","volume-title":"TCP\/IP Illustrated, Volume I: the Protocols","author":"Fall","year":"2011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2012.100812.121517"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/s1389-1286(02)00326-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_4"},{"key":"ref10","first-page":"959","article-title":"Routing attack in the ND and SEND mixed environment","volume-title":"4th IEEE Int. Conf. on Multimedia Information Networking and Security","author":"Hou","year":"2012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/icon.2005.1635503"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/indcon.2013.6726054"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1016.2012.00085"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2010.02.092108"},{"key":"ref15","article-title":"Neighbor Discovery for IP Version 6 (IPv6)","author":"Narten","year":"2007","journal-title":"Internet Engineering Task Force"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icact.2007.358569"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2011.0566"},{"key":"ref18","article-title":"An Ethernet Address Resolution Protocol-or-Converting Network Protocol Addresses to 48. Bit Ethernet Address for Transmission on Ethernet Hardware","author":"Plummer","year":"1982","journal-title":"Internet Engineering Task Force"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2070425.2070469"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.11.08"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1201\/9781420057133"},{"key":"ref22","first-page":"769","article-title":"A quick CGA generation method","volume-title":"2nd IEEE Int. Conf. on Future Computer and Communication","author":"Su","year":"2010"},{"key":"ref23","volume-title":"THC IPv6","author":"Van Heuse","year":"2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/icnp.2007.4375858"},{"key":"ref27","article-title":"A Source Address Validation Architecture (SAVA) Testbed and Deployment Experience","author":"Wu","year":"2008","journal-title":"Internet Engineering Task Force"},{"issue":"9","key":"ref28","first-page":"1999","article-title":"OpenFlow based intra-AS source ad-dress validation","volume":"34","author":"Xiao","year":"2013","journal-title":"J. Chin. Comput. Syst."}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1500382\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1500382.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1500382.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:45:59Z","timestamp":1771659959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1500382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":28,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["128"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1500382","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10]]}}}