{"id":"https://openalex.org/W1999434064","doi":"https://doi.org/10.1145/1179601.1179612","title":"Privacy management for secure mobility","display_name":"Privacy management for secure mobility","publication_year":2006,"publication_date":"2006-10-30","ids":{"openalex":"https://openalex.org/W1999434064","doi":"https://doi.org/10.1145/1179601.1179612","mag":"1999434064"},"language":"en","primary_location":{"id":"doi:10.1145/1179601.1179612","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1179601.1179612","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM workshop on Privacy in electronic society","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019562468","display_name":"Janne Lindqvist","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Janne Lindqvist","raw_affiliation_strings":["Helsinki University of Technology, Finland"],"affiliations":[{"raw_affiliation_string":"Helsinki University of Technology, Finland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012832240","display_name":"Laura Takkinen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Laura Takkinen","raw_affiliation_strings":["Helsinki University of Technology, Finland"],"affiliations":[{"raw_affiliation_string":"Helsinki University of Technology, Finland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019562468"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.3849,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.9169796,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"63","last_page":"66"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.770506739616394},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6897259950637817},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6473445892333984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5064207315444946},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.5053520798683167},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4261154234409332},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.41099798679351807},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3719427287578583},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.13251420855522156}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.770506739616394},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6897259950637817},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6473445892333984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5064207315444946},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.5053520798683167},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4261154234409332},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.41099798679351807},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3719427287578583},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13251420855522156},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1179601.1179612","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1179601.1179612","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM workshop on Privacy in electronic society","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1511711279","https://openalex.org/W1521478060","https://openalex.org/W1876212707","https://openalex.org/W1987383232","https://openalex.org/W2103349187","https://openalex.org/W2143638081","https://openalex.org/W2260273397","https://openalex.org/W2494603296","https://openalex.org/W4205358955","https://openalex.org/W4300952447"],"related_works":["https://openalex.org/W2034419863","https://openalex.org/W2296396257","https://openalex.org/W3007106793","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2116285675","https://openalex.org/W2054202867","https://openalex.org/W2109882692","https://openalex.org/W2547137208","https://openalex.org/W2061637199"],"abstract_inverted_index":{"Anonymous":[0],"Internet":[1],"access":[2],"has":[3],"been":[4],"researched":[5],"extensively":[6],"and":[7,114],"many":[8],"proposals":[9],"exist":[10],"for":[11,40,67,79,118],"enhancing":[12],"the":[13,30,33,59,82,86,92,107,131],"privacy":[14,31,68,76,97],"of":[15,22,32,50],"users.":[16],"However,":[17],"there":[18],"are":[19],"vast":[20],"amounts":[21],"legacy":[23],"authentication":[24,56],"systems":[25,57],"that":[26],"do":[27],"not":[28],"take":[29],"users":[34,93],"into":[35],"consideration.":[36],"Many":[37],"networks":[38],"use,":[39],"example,":[41],"MAC":[42,65],"address":[43,46],"or":[44],"IP":[45,87,128],"based":[47],"authentication,":[48],"despite":[49],"their":[51,96,101],"limited":[52],"security":[53],"properties.":[54],"These":[55],"hinder":[58],"possibility":[60],"to":[61,94,111,126],"use":[62],"e.g.":[63],"pseurandom":[64],"addresses":[66],"protection.":[69],"In":[70],"this":[71],"paper,":[72],"we":[73],"propose":[74],"a":[75],"management":[77],"system":[78],"layers":[80],"below":[81],"transport":[83],"layer":[84],"in":[85],"stack.":[88],"Our":[89],"implementation":[90,105],"allows":[91],"decide":[95],"parameters":[98],"depending":[99],"on":[100],"current":[102],"situation.":[103],"The":[104,121],"uses":[106],"Host":[108,132],"Identity":[109,133],"Protocol":[110],"provide":[112],"authenticated":[113],"secure":[115],"seamless":[116],"handovers":[117],"mobile":[119],"nodes.":[120],"approach":[122],"is":[123],"also":[124],"applicable":[125],"an":[127],"stack":[129],"without":[130],"Protocol.":[134]},"counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
