{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:07:22Z","timestamp":1730304442196,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/wcnc.2005.1424727","type":"proceedings-article","created":{"date-parts":[[2005,4,25]],"date-time":"2005-04-25T18:49:51Z","timestamp":1114454991000},"page":"1440-1445 Vol. 3","source":"Crossref","is-referenced-by-count":22,"title":["Early binding updates for mobile IPv6"],"prefix":"10.1109","author":[{"given":"C.","family":"Vogt","sequence":"first","affiliation":[{"name":"Inst. of Telematics, Karlsruhe Univ., Germany"}]},{"given":"R.","family":"Bless","sequence":"additional","affiliation":[{"name":"Inst. of Telematics, Karlsruhe Univ., Germany"}]},{"given":"M.","family":"Doll","sequence":"additional","affiliation":[{"name":"Inst. of Telematics, Karlsruhe Univ., Germany"}]},{"given":"T.","family":"Kuefner","sequence":"additional","affiliation":[{"name":"Inst. of Telematics, Karlsruhe Univ., Germany"}]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424727"},{"key":"2","article-title":"Mobile IP version 6 route optimization security design background","author":"nikander","year":"2004","journal-title":"Internet draft"},{"journal-title":"Kame-shisa Mobile IPv6 Implementation","year":"0","key":"10"},{"key":"1","article-title":"Mobility support in IPv6","volume":"3775","author":"johnson","year":"2004","journal-title":"RFC"},{"key":"7","article-title":"Applying cryptographically generated addresses to optimize MIPvo (CGA-OMIPv6)","author":"haddad","year":"2004","journal-title":"Internet draft"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/505666.505668"},{"key":"5","article-title":"Cryptographically Generated Addresses (CGA)","author":"aura","year":"2004","journal-title":"Internet draft"},{"key":"4","article-title":"Credit-based authorization for Mobile IPv6 early binding updates","author":"vogt","year":"2004","journal-title":"Internet draft"},{"key":"9","article-title":"Credit-based authorization for binding lifetime extension","author":"arkko","year":"2004","journal-title":"Internet draft"},{"key":"8","article-title":"Preconfigured binding management keys for Mobile IPv6","author":"perkins","year":"2004","journal-title":"Internet draft"}],"event":{"name":"2005 IEEE Wireless Communications and Networking Conference","start":{"date-parts":[[2005,3,13]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2005,3,17]]}},"container-title":["IEEE Wireless Communications and Networking Conference, 2005"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9744\/30730\/01424727.pdf?arnumber=1424727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,8]],"date-time":"2024-03-08T18:47:10Z","timestamp":1709923630000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1424727\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2005.1424727","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}