{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T16:22:26Z","timestamp":1743524546935,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.2002.1176281","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T11:35:00Z","timestamp":1056627300000},"page":"78-87","source":"Crossref","is-referenced-by-count":17,"title":["Security of Internet location management"],"prefix":"10.1109","author":[{"given":"T.","family":"Aura","sequence":"first","affiliation":[]},{"given":"M.","family":"Roe","sequence":"additional","affiliation":[]},{"given":"J.","family":"Arkko","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1999.779758"},{"key":"ref11","article-title":"Statistically unique and cryptographically verifiable identifiers and addresses","author":"montenegro","year":"2002","journal-title":"Proc ISOC Symp Network and Distributed Systems Security (NDSS)"},{"key":"ref12","article-title":"Privacy extensions for stateless address autoconfiguration in IPv6","author":"narten","year":"2001","journal-title":"RFC 3041 IETF Network Working Group"},{"key":"ref13","article-title":"Neighbor discovery for IP version 6 (IPv6)","author":"narten","year":"1998","journal-title":"Network Working Group RFC 2461"},{"key":"ref14","article-title":"A scaleable architecture for IPv6 address ownership","author":"nikander","year":"2001","journal-title":"Internet-draft"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/505666.505668"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/505659.505664"},{"key":"ref17","article-title":"Route optimization in mobile IP. Internet-Draft draft-ietf-mobileip-optim-11.txt","author":"perkins","year":"2001","journal-title":"IETF Mobile IP Working Group"},{"key":"ref18","article-title":"Authentication of mobile IPv6 binding updates and acknowledgments. Internet-Draft draft-roe-mobileip-updateauth-02.txt","author":"roe","year":"2002","journal-title":"IETF Mobile IP Working Group"},{"key":"ref19","article-title":"Security of IPv6 routing header and home address options","author":"savola","year":"2002","journal-title":"Internet-Draft IETF"},{"key":"ref4","article-title":"Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing","author":"ferguson","year":"2000","journal-title":"RFC 2827 IETF Network Working Group"},{"key":"ref3","article-title":"3rd. Secure domain name system dynamic update","author":"e eastlake","year":"1997","journal-title":"RFC 2137 IETF Network Working Group"},{"key":"ref6","article-title":"Mobility support in IPv6. Internet-Draft draft-ietf-mobileip-ipv6–18.txt","author":"b johnson","year":"2002","journal-title":"IETF Mobile IP Working Group"},{"key":"ref5","article-title":"IP version 6 addressing architecture","author":"m hinden","year":"1998","journal-title":"RFC 2373 IETF Network Working Group"},{"key":"ref8","article-title":"Photuris: session-key management protocol","author":"karn","year":"1999","journal-title":"RFC 2522 IETF Network Working Group"},{"key":"ref7","first-page":"151","article-title":"Client puzzles: a cryptographic countermeasure against connection depletion attacks","author":"juels","year":"1999","journal-title":"Proc 1999 Network and Distributed Systems Security Symposium (NDSS)"},{"key":"ref2","first-page":"170","article-title":"DOS-resistant authentication with client puzzles","volume":"2133","author":"aura","year":"2000","journal-title":"Proc Security Protocols Workshop 2000"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/BFb0028465","article-title":"Stateless connections","volume":"1334","author":"aura","year":"1997","journal-title":"Proc International Conference on Information and Communications Security (ICICS'97)"},{"key":"ref9","article-title":"Security architecture for the Internet Protocol","author":"kent","year":"1998","journal-title":"Network Working Group RFC 2401"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"ref22","article-title":"Dynamic updates in the domain name system (DNS UPDATE)","author":"vixie","year":"1997","journal-title":"RFC 2136 IETF Network Working Group"},{"key":"ref21","article-title":"IPv6 stateless address autoconfiguration","author":"thomson","year":"1998","journal-title":"Network Working Group RFC 2462"}],"event":{"name":"Eighteenth Annual Computer Security Applications Conference","acronym":"CSAC-02","location":"Las Vegas, NV, USA"},"container-title":["18th Annual Computer Security Applications Conference, 2002. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8386\/26404\/01176281.pdf?arnumber=1176281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,24]],"date-time":"2018-02-24T19:58:37Z","timestamp":1519502317000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1176281\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/csac.2002.1176281","relation":{},"subject":[]}}