{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:15Z","timestamp":1725475815476},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_33","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"400-411","source":"Crossref","is-referenced-by-count":8,"title":["AKA Protocols for Mobile Communications"],"prefix":"10.1007","author":[{"given":"KookHeui","family":"Lee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"SangJae","family":"Moon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1109\/49.232291","volume":"11","author":"M.J. Beller","year":"1993","unstructured":"Beller, M.J., Chang, L.-F., Yacobi, Y.: Privacy and authentication on a portable communications system. IEEE Journal on Selected Areas in Communications\u00a011, 821\u2013829 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"11","key":"33_CR2","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1049\/el:19930666","volume":"29","author":"M.J. Beller","year":"1993","unstructured":"Beller, M.J., Yacobi, Y.: Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics Letters\u00a029(11), 999\u20131001 (1993)","journal-title":"Electronics Letters"},{"issue":"3","key":"33_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/182110.182112","volume":"28","author":"U. Carlsen","year":"1994","unstructured":"Carlsen, U.: Optimal privacy and authentication on a portable communications system. ACM Operating Systems Review\u00a028(3), 16\u201323 (1994)","journal-title":"ACM Operating Systems Review"},{"key":"33_CR4","unstructured":"JTC\/J-STD-14: 1995, Personal Communication Services, PACS Air Interface Specification"},{"key":"33_CR5","unstructured":"Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization, MIT Lab. Comp. Sci., Technical Report (January 1979)"},{"key":"33_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"issue":"177","key":"33_CR7","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048(177), 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"33_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"A.J. Menezes","year":"1993","unstructured":"Menezes, A.J.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Zheng, Y.: An authentication and security protocol for mobile computing. In: Proceedings of IFIP, pp. 249\u2013257 (September 1996)","DOI":"10.1007\/978-0-387-34980-0_25"},{"key":"33_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/BFb0055870","volume-title":"Computer Security \u2013 ESORICS 98","author":"G. Horn","year":"1998","unstructured":"Horn, G., Preneel, B.: Authentication and payment in future mobile systems. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 277\u2013293. Springer, Heidelberg (1998)"},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost (Signature & encryption) <\u2009< cost(Signature) + cost(Encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"},{"key":"33_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/BFb0054014","volume-title":"Public Key Cryptography","author":"F. Bao","year":"1998","unstructured":"Bao, F., Deng, R.H.: A signcryption scheme with signature directly verifiable by public key. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, pp. 55\u201359. Springer, Heidelberg (1998)"},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-49162-7_6","volume-title":"Public Key Cryptography","author":"C. Gamage","year":"1999","unstructured":"Gamage, C., Leiwo, J., Zheng, Y.: Encrypted message authentication by firewalls. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, pp. 69\u201381. Springer, Heidelberg (1999)"},{"key":"33_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/10719994_21","volume-title":"Information Security and Cryptology - ICISC\u201999","author":"M. Seo","year":"2000","unstructured":"Seo, M., Kim, K.: Electronic funds transfer protocol using domain-verifiable sign- cryption scheme. In: Song, J.S. (ed.) ICISC 1999. LNCS, vol.\u00a01787, pp. 263\u2013271. Springer, Heidelberg (2000)"},{"key":"33_CR15","unstructured":"Horn, G., Martin, K.M., Mitchell, C.J.: Authentication protocols for mobile network environment value-added services, draft, available at \n                    \n                      http:\/\/isg.rhbnc.ac.uk\/cjm\/Chris_Mitchell.htm"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Petersen, H., Michels, M.: Cryptanalysis and improvement of signcryption schemes. IEE Proc. Comput. Digit. Tech.\u00a0145(2) (1998)","DOI":"10.1049\/ip-cdt:19981862"},{"key":"33_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/3-540-45482-9","volume-title":"Information Security and Cryptology - ICISC\u201999","author":"K. Lee","year":"2000","unstructured":"Lee, K., Moon, S., Jeong, W., Kim, T.: A 2-pass Authentication and Key Agreement Protocol for Mobile Communications. In: Song, J.S. (ed.) ICISC 1999. LNCS, vol.\u00a01787, pp. 143\u2013155. Springer, Heidelberg (2000)"},{"issue":"4","key":"33_CR18","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"33_CR19","unstructured":"ISO\/IEC\/11770-3: 1997, Information Technology - Security Techniques - Key Management, Part 3: Mechanisms Using Asymmetric Techniques"},{"key":"33_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-540-46588-1_29","volume-title":"Public Key Cryptography","author":"D. Park","year":"2000","unstructured":"Park, D., Boyd, C., Moon, S.: Forward secrecy and its application to future mobile communications security. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 433\u2013445. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:11:57Z","timestamp":1558300317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/10718964_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}