{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:35:31Z","timestamp":1762004131720},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,12]]},"DOI":"10.1109\/msn.2008.27","type":"proceedings-article","created":{"date-parts":[[2008,12,22]],"date-time":"2008-12-22T16:29:01Z","timestamp":1229963341000},"page":"129-136","source":"Crossref","is-referenced-by-count":7,"title":["An Authentication Protocol for Proxy Mobile IPv6"],"prefix":"10.1109","author":[{"given":"Huachun","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Hongke","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"optimization of handover performance by link layer triggers in ip-based networks; parameters, protocol extensions, and apis for implementation","year":"2002","author":"festag","key":"19"},{"year":"0","key":"17"},{"journal-title":"Unified L2 Abstraction for L3-Driven Fast Handover","year":"2007","author":"teraoka","key":"18"},{"journal-title":"Access Authentication Protocol in FMIP6","year":"2006","author":"jung","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3957"},{"journal-title":"IP Mobility Support for IPv4","year":"2002","author":"perkins","key":"13"},{"journal-title":"Handover Keys Using AAA","year":"2007","author":"narayanan","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4285"},{"journal-title":"Mobile IPv6 Bootstrapping for the Authentication Option Protocol","year":"2007","author":"devarapalli","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4283"},{"journal-title":"Transport of Media Independent Handover Messages Over IP","year":"2006","author":"rahman","key":"20"},{"journal-title":"Mobile Node Agnostic Fast Handovers for Proxy Mobile IPv6","year":"2007","author":"xia","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4068"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/BF01985754"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/12.689647"},{"journal-title":"Performance Evaluation of AAA\/Mobile IP authentication","year":"0","author":"hess","key":"27"},{"journal-title":"Fundamentals of Queueing Theory","year":"1974","author":"gross","key":"28"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"year":"0","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3775"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3588"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.10.016"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4721"},{"journal-title":"Proxy Mobile IPv6","year":"2007","author":"gundavelli","key":"4"},{"journal-title":"Diameter Mobile IPv6 Application","year":"2004","author":"le","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4004"}],"event":{"name":"2008 4th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2008)","start":{"date-parts":[[2008,12,10]]},"location":"Wuhan, China","end":{"date-parts":[[2008,12,12]]}},"container-title":["2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4721231\/4721232\/04721262.pdf?arnumber=4721262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T11:36:45Z","timestamp":1489750605000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4721262\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/msn.2008.27","relation":{},"subject":[],"published":{"date-parts":[[2008,12]]}}}