{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:44:33Z","timestamp":1725551073999},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/imis.2011.126","type":"proceedings-article","created":{"date-parts":[[2011,8,15]],"date-time":"2011-08-15T16:28:24Z","timestamp":1313425704000},"page":"487-490","source":"Crossref","is-referenced-by-count":7,"title":["Enhance IPv6 Dynamic Host Configuration with Cryptographically Generated Addresses"],"prefix":"10.1109","author":[{"given":"Sean","family":"Shen","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Zhili","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"ref11","article-title":"Attack Class: Address Spoofing","author":"lt","year":"0","journal-title":"Proceeding of the 19th National Information Systems"},{"key":"ref12","article-title":"Man in the Middle Attacks Demos","author":"ornaghi","year":"2003","journal-title":"BlackHat"},{"journal-title":"draft-xia-csi-symmetric-keys","year":"0","author":"xia","key":"ref13"},{"key":"ref14","article-title":"Collisions for Hash Functions MD 4, MD 5, HAVAL-128 and RIPEMD","author":"wang","year":"2004","journal-title":"CRYPTO'04"},{"key":"ref15","first-page":"1","article-title":"How to Break MD5 and Other Hash Functions","author":"wang","year":"2005","journal-title":"Advances in Cryptology-Eurocrypt 05 LNCS 3494"},{"key":"ref16","first-page":"1","article-title":"Efficient Collision Search Attacks on SHA-0","author":"wang","year":"2005","journal-title":"Advances in Cryptology-Crypto 05 LNCS 3621"},{"key":"ref17","first-page":"17","article-title":"Finding Collisions in the Full SHA-l","author":"wang","year":"2005","journal-title":"Advances in Cryptology-Crypto 05 LNCS 3621"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2008.33"},{"key":"ref19","article-title":"Stealing The Internet: A Routed, Wide-area, Man in the Middle Attack","author":"pilosov","year":"2008","journal-title":"Defcon 16 Las Vegas NV"},{"key":"ref4","article-title":"Cryptographically Generated Address","author":"aura","year":"2005","journal-title":"RFC3972"},{"key":"ref3","article-title":"Dynamic Host Configure Protocol for IPv6","author":"droms","year":"0","journal-title":"RFC3315"},{"key":"ref6","article-title":"Support for Multiple Hash Algorithms in Cryptographically Generated Addresses (CGAs)","author":"bagnulo","year":"2007","journal-title":"RFC4982"},{"key":"ref5","article-title":"Attacks on Cryptographic Hashed in Internet Protocols","author":"hoffman","year":"2005","journal-title":"RFC 4270"},{"journal-title":"PKCS 1","article-title":"RSA Encryption Standard, Version 2.1","year":"2002","key":"ref8"},{"key":"ref7","article-title":"Deploying a New Hash Algorithm","author":"bellovin","year":"0","journal-title":"NIST Hash Function Workshop"},{"key":"ref2","article-title":"IPv6 Stateless Address Autoconfiguration","author":"thomson","year":"1998","journal-title":"RFC2462"},{"key":"ref1","article-title":"Network Time Protocol (Version 3) Specification, Implementation and Analysis","author":"mills","year":"1992","journal-title":"RFC1305"},{"journal-title":"FIBS PUB 180&#x2013;1","article-title":"Secure Hash Standard","year":"1995","key":"ref9"},{"key":"ref20","article-title":"DHCPv6 and CGA Interaction: Problem Statement","author":"jiang","year":"2010","journal-title":"IETF CSI WG document"},{"journal-title":"IETF DHC WG document","article-title":"Configuring Cryptographically Generated Addresses (CGA) using DHCPv6","year":"2010","key":"ref21"}],"event":{"name":"2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)","start":{"date-parts":[[2011,6,30]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2011,7,2]]}},"container-title":["2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5975322\/5976142\/05976220.pdf?arnumber=5976220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T22:44:49Z","timestamp":1490049889000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5976220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/imis.2011.126","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}