{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T09:58:25Z","timestamp":1742378305761},"reference-count":0,"publisher":"RFC Editor","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.17487\/rfc5169","type":"report","created":{"date-parts":[[2015,4,11]],"date-time":"2015-04-11T20:09:05Z","timestamp":1428782945000},"source":"Crossref","is-referenced-by-count":20,"title":["Handover Key Management and Re-Authentication Problem Statement"],"prefix":"10.17487","author":[{"given":"T.","family":"Clancy","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Nakhjiri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V.","family":"Narayanan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"L.","family":"Dondeti","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"7045","published-online":{"date-parts":[[2008,3]]},"container-title":[],"original-title":[],"deposited":{"date-parts":[[2015,4,12]],"date-time":"2015-04-12T01:06:46Z","timestamp":1428800806000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.rfc-editor.org\/info\/rfc5169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":0,"URL":"https:\/\/doi.org\/10.17487\/rfc5169","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}