{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T15:58:24Z","timestamp":1720713504365},"reference-count":25,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2005,11,1]],"date-time":"2005-11-01T00:00:00Z","timestamp":1130803200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2005,11]]},"DOI":"10.1016\/j.cose.2005.06.001","type":"journal-article","created":{"date-parts":[[2005,7,13]],"date-time":"2005-07-13T22:12:55Z","timestamp":1121292775000},"page":"629-641","source":"Crossref","is-referenced-by-count":3,"title":["A novel mix-based location privacy mechanism in Mobile IPv6"],"prefix":"10.1016","volume":"24","author":[{"given":"Jun","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Chen","family":"He","sequence":"additional","affiliation":[]},{"given":"Ling-ge","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2005.06.001_bib5","unstructured":"Anonymizer.com, ."},{"issue":"2","key":"10.1016\/j.cose.2005.06.001_bib3","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return address, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.cose.2005.06.001_bib20","series-title":"Advances in cryptology \u2013 CRYPTO'89","first-page":"212","article-title":"Undeniable signatures","author":"Chaum","year":"1990"},{"key":"10.1016\/j.cose.2005.06.001_bib9","series-title":"GLOBECOM2003","article-title":"Authentication and payment protocol preserving location privacy in mobile IP","author":"Choi","year":"2003"},{"key":"10.1016\/j.cose.2005.06.001_bib10","series-title":"Proceedings of the WISA 2003, 25\u201327 Aug, Jeju, Korea","first-page":"69","article-title":"Practical solution for location privacy in mobile IPv6","author":"Choi","year":"2003"},{"key":"10.1016\/j.cose.2005.06.001_bib6","series-title":"INET 2001 \u2013 Proceedings, Stockholm, Sweden","article-title":"Flying freedom: location privacy in mobile internetworking","author":"Escudero","year":"2001"},{"key":"10.1016\/j.cose.2005.06.001_bib7","series-title":"46th IEEE vehicular technology society conference","article-title":"Variable and scalable security: protection of location information in mobile IP","author":"Fasbender","year":"1996"},{"key":"10.1016\/j.cose.2005.06.001_bib24","doi-asserted-by":"crossref","unstructured":"Ferguson P, Senie D. Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing. RFC 2267; January 1998.","DOI":"10.17487\/rfc2267"},{"key":"10.1016\/j.cose.2005.06.001_bib13","doi-asserted-by":"crossref","unstructured":"Hinden R, Deering S. Internet protocol version 6 (IPv6) addressing architecture. IETF RFC 3513; April 2003.","DOI":"10.17487\/rfc3513"},{"key":"10.1016\/j.cose.2005.06.001_bib11","series-title":"Eurocrypt'98","first-page":"448","article-title":"A practical mix","author":"Jakobsson","year":"1998"},{"key":"10.1016\/j.cose.2005.06.001_bib22","series-title":"3rd ACM conference on computer and communications security","first-page":"76","article-title":"Revocable and versatile electronic money","author":"Jakobsson","year":"1996"},{"key":"10.1016\/j.cose.2005.06.001_bib25","series-title":"SAC '98","first-page":"157","article-title":"Mix-based electronic payments","author":"Jakobsson","year":"1999"},{"issue":"4","key":"10.1016\/j.cose.2005.06.001_bib15","doi-asserted-by":"crossref","DOI":"10.1109\/49.668973","article-title":"Real-time mixes: a bandwidth-efficient anonymity protocol","volume":"16","author":"Jerichow","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/j.cose.2005.06.001_bib2","doi-asserted-by":"crossref","unstructured":"Johnson D, Perkins C, Arkko J. Mobility support in IPv6. IETF Internet Draft, draft-ietf-mobileip-ipv6-24.txt; 30 June 2003.","DOI":"10.17487\/rfc3775"},{"key":"10.1016\/j.cose.2005.06.001_bib8","series-title":"Communications and multimedia security (CMS)","article-title":"MMIP \u2013 mixed mobile internet protocol","author":"Lopatik","year":"1997"},{"key":"10.1016\/j.cose.2005.06.001_bib16","series-title":"Topics in cryptology \u2013 CT-RSA","first-page":"244","article-title":"Provably secure public-key encryption for length-preserving Chaumain mixes","author":"Moller","year":"2003"},{"key":"10.1016\/j.cose.2005.06.001_bib19","doi-asserted-by":"crossref","unstructured":"Pedersen TP. A threshold cryptosystem without a trusted party. In: Eurocrypt'91. LNCS 547. Springer-Verlag; 1991. p. 522\u20136.","DOI":"10.1007\/3-540-46416-6_47"},{"key":"10.1016\/j.cose.2005.06.001_bib1","doi-asserted-by":"crossref","unstructured":"Perkins C. IP mobility support. IETF RFC 2002; October 1996.","DOI":"10.17487\/rfc2002"},{"key":"10.1016\/j.cose.2005.06.001_bib14","series-title":"Information security, Proceedings of the IFIP\/Sec'91","first-page":"245","article-title":"ISDN-MIXes \u2013 untraceable communication with very small bandwidth overhead","author":"Pfitzmann","year":"1991"},{"issue":"4","key":"10.1016\/j.cose.2005.06.001_bib4","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1109\/49.668972","article-title":"Anonymous connections and onion routing","volume":"16","author":"Reed","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"10.1016\/j.cose.2005.06.001_bib17","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","article-title":"Crowds: anonymity for web transactions","volume":"1","author":"Reiter","year":"1998","journal-title":"ACM Transactions on Information System Security"},{"key":"10.1016\/j.cose.2005.06.001_bib21","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","article-title":"On blind signatures and perfect crimes","volume":"11","author":"von Solms","year":"1992","journal-title":"Computers and Security"},{"key":"10.1016\/j.cose.2005.06.001_bib18","doi-asserted-by":"crossref","unstructured":"Thomson S, Narten T. IPv6 stateless address autoconfiguration. RFC 2462; December 1998.","DOI":"10.17487\/rfc2462"},{"key":"10.1016\/j.cose.2005.06.001_bib23","series-title":"8th IEEE mobile multimedia communications (MoMuC), Germany","article-title":"Ubiquitous networking in heterogeneous environments","author":"Vidales","year":"2003"},{"issue":"2","key":"10.1016\/j.cose.2005.06.001_bib12","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/35.983919","article-title":"MIRAI architecture for heterogeneous network","volume":"40","author":"Wu","year":"2002","journal-title":"IEEE Communications Magazine"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404805000957?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404805000957?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T07:09:03Z","timestamp":1586329743000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404805000957"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2005,11]]}},"alternative-id":["S0167404805000957"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2005.06.001","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2005,11]]}}}