{"id":"https://openalex.org/W2148634115","doi":"https://doi.org/10.1109/wimob.2005.1512847","title":"Authenticated stateful auto-configuration for mobile IPv6 based on pre-IP access control","display_name":"Authenticated stateful auto-configuration for mobile IPv6 based on pre-IP access control","publication_year":2006,"publication_date":"2006-10-04","ids":{"openalex":"https://openalex.org/W2148634115","doi":"https://doi.org/10.1109/wimob.2005.1512847","mag":"2148634115"},"language":"en","primary_location":{"id":"doi:10.1109/wimob.2005.1512847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2005.1512847","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100361907","display_name":"Jun Li","orcid":"https://orcid.org/0000-0002-6767-3328"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I4210092230","display_name":"Beijing Shijingshan Hospital","ror":"https://ror.org/00g87gv13","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210092230"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Li","raw_affiliation_strings":["Graduate School of the Chinese Academy of Sciences, Shijingshan District, Beijing, China","Institute of Computing Technology Chinese Academy of Sciences, Zhongguancun, Beijing, China","Inst. of Comput. Technol., Chinese Acad. of Sci, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Graduate School of the Chinese Academy of Sciences, Shijingshan District, Beijing, China","institution_ids":["https://openalex.org/I4210092230","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Institute of Computing Technology Chinese Academy of Sciences, Zhongguancun, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"Inst. of Comput. Technol., Chinese Acad. of Sci, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089723017","display_name":"Xinming Ye","orcid":"https://orcid.org/0000-0003-4083-0300"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210092230","display_name":"Beijing Shijingshan Hospital","ror":"https://ror.org/00g87gv13","country_code":"CN","type":"healthcare","lineage":["https://openalex.org/I4210092230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin-ming Ye","raw_affiliation_strings":["Graduate School of the Chinese Academy of Sciences, Shijingshan District, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Graduate School of the Chinese Academy of Sciences, Shijingshan District, Beijing, China","institution_ids":["https://openalex.org/I4210092230","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005419550","display_name":"Jinglin Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing-lin Shi","raw_affiliation_strings":["Institute of Computing Technology Chinese Academy of Sciences, Zhongguancun, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology Chinese Academy of Sciences, Zhongguancun, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100415854","display_name":"Miao Wang","orcid":"https://orcid.org/0000-0002-7584-6524"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Miao Wang","raw_affiliation_strings":["Institute of Computing Technology Chinese Academy of Sciences, Zhongguancun, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology Chinese Academy of Sciences, Zhongguancun, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100361907"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210090176","https://openalex.org/I4210092230"],"apc_list":null,"apc_paid":null,"fwci":0.3761,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.67781182,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2","issue":null,"first_page":"32","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.9376716613769531},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8076745271682739},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7851511240005493},{"id":"https://openalex.org/keywords/mobile-ip","display_name":"Mobile IP","score":0.7375240325927734},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.6940498352050781},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5990068912506104},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5657169818878174},{"id":"https://openalex.org/keywords/general-packet-radio-service","display_name":"General Packet Radio Service","score":0.5191789865493774},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4752625823020935},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.44524237513542175},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3170449733734131},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25121766328811646},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.10344165563583374},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08026084303855896}],"concepts":[{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.9376716613769531},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8076745271682739},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7851511240005493},{"id":"https://openalex.org/C82203111","wikidata":"https://www.wikidata.org/wiki/Q205936","display_name":"Mobile IP","level":3,"score":0.7375240325927734},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.6940498352050781},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5990068912506104},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5657169818878174},{"id":"https://openalex.org/C86338984","wikidata":"https://www.wikidata.org/wiki/Q79708","display_name":"General Packet Radio Service","level":3,"score":0.5191789865493774},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4752625823020935},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.44524237513542175},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3170449733734131},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25121766328811646},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.10344165563583374},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08026084303855896},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob.2005.1512847","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2005.1512847","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W99893282","https://openalex.org/W114546523","https://openalex.org/W1508194741","https://openalex.org/W1553166108","https://openalex.org/W1599573165","https://openalex.org/W1905021885","https://openalex.org/W1923289336","https://openalex.org/W1970651164","https://openalex.org/W1994231293","https://openalex.org/W2045048466","https://openalex.org/W2102471557","https://openalex.org/W2132147947","https://openalex.org/W2132391275","https://openalex.org/W2138158583","https://openalex.org/W2148642494","https://openalex.org/W2170604589","https://openalex.org/W2254691854","https://openalex.org/W2288708226","https://openalex.org/W2289338357","https://openalex.org/W2292659874","https://openalex.org/W2505630732","https://openalex.org/W2737058386","https://openalex.org/W2773436718","https://openalex.org/W2925787206","https://openalex.org/W4210921465","https://openalex.org/W4214488115","https://openalex.org/W4249476872","https://openalex.org/W4298921906","https://openalex.org/W6639557410","https://openalex.org/W6670984045","https://openalex.org/W6679610976","https://openalex.org/W6680655296","https://openalex.org/W6692002590","https://openalex.org/W6737980207","https://openalex.org/W6841655463"],"related_works":["https://openalex.org/W2583381754","https://openalex.org/W2144255176","https://openalex.org/W2286614685","https://openalex.org/W109977192","https://openalex.org/W1970797462","https://openalex.org/W2566747981","https://openalex.org/W2237022168","https://openalex.org/W2131950972","https://openalex.org/W2384737516","https://openalex.org/W2350960964"],"abstract_inverted_index":{"Based":[0],"on":[1],"pre-IP":[2],"level":[3],"access":[4],"control,":[5],"a":[6,71],"method":[7],"called":[8],"authenticated":[9,42],"stateful":[10],"auto-configuration":[11],"(ASAC)":[12],"for":[13,55],"MIPv6":[14],"is":[15,41,59,74],"proposed":[16],"in":[17,20],"this":[18,69],"paper,":[19],"which":[21],"both":[22],"security":[23],"issue":[24],"and":[25,43,48],"handover":[26,56],"performance":[27],"are":[28],"considered.":[29],"In":[30],"order":[31],"not":[32],"to":[33],"introduce":[34],"any":[35],"vulnerability":[36],"into":[37],"network,":[38],"ASAC":[39,58],"information":[40],"signed":[44],"by":[45],"mobile":[46],"node":[47],"backend":[49],"server.":[50],"To":[51],"meet":[52],"the":[53,66],"requirement":[54],"performance,":[57],"combined":[60],"together":[61],"with":[62],"authentication":[63],"procedure.":[64],"At":[65],"end":[67],"of":[68],"paper":[70],"result":[72],"analysis":[73],"presented.":[75]},"counts_by_year":[],"updated_date":"2026-02-25T21:11:00.739837","created_date":"2025-10-10T00:00:00"}
