{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:00:55Z","timestamp":1725559255254},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540258094"},{"type":"electronic","value":"9783540320173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11422778_30","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T16:01:28Z","timestamp":1279036888000},"page":"370-381","source":"Crossref","is-referenced-by-count":5,"title":["Efficient 3G\/WLAN Interworking Techniques for Seamless Roaming Services with Location-Aware Authentication"],"prefix":"10.1007","author":[{"given":"Minsoo","family":"Lee","sequence":"first","affiliation":[]},{"given":"Gwanyeon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sehyun","family":"Park","sequence":"additional","affiliation":[]},{"given":"Sungik","family":"Jun","sequence":"additional","affiliation":[]},{"given":"Jaehoon","family":"Nah","sequence":"additional","affiliation":[]},{"given":"Ohyoung","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Hazas, M., et al.: Location-Aware Computing Comes of Age. IEEE Computer (February 2004)","DOI":"10.1109\/MC.2004.1266301"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-540-24693-0_28","volume-title":"NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"M. Lee","year":"2004","unstructured":"Lee, M., Kim, J., Park, S., Lee, J., Lee, S.: A Secure Web Services for Location Based Services in Wireless Networks. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol.\u00a03042, pp. 332\u2013344. Springer, Heidelberg (2004)"},{"key":"30_CR3","unstructured":"3GPP TR 22.934: Feasibility Study on 3GPP System to WLAN Interworking,R6"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1093\/comjnl\/47.4.405","volume":"47","author":"V.W.-S. Feng","year":"2004","unstructured":"Feng, V.W.-S., et al.: WGSN: WLAN-based GPRS Environment Support Node with Push Mechanism. The Computer Journal\u00a047, 405\u2013417 (2004)","journal-title":"The Computer Journal"},{"key":"30_CR5","doi-asserted-by":"crossref","unstructured":"Salkintzis, A.K.: Interworking Techniques and Architectures for WLAN\/3G Integration toward 4G Mobile Data Networks. IEEE Wireless Communications (June 2004)","DOI":"10.1109\/MWC.2004.1308950"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Denning, D.E., MacDoran, P.D.: Location-Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud and Security (February 1996)","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-39653-6_8","volume-title":"UbiComp 2003: Ubiquitous Computing","author":"J.E. Bardram","year":"2003","unstructured":"Bardram, J.E., et al.: Context-Aware User Authentication-Supporting Proximity-Based Login in Pervasive Computing. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol.\u00a02864, pp. 107\u2013123. Springer, Heidelberg (2003)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"M\u00e4h\u00f6nen, P., et al.: Hop-by-Hop Toward Future Mobile Broadband IP. IEEE Communications Magazine (March 2004)","DOI":"10.1109\/MCOM.2004.1273785"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Akyildiz, I.F., et al.: A survey of mobility management in next-generation all-IPbased wireless systems. IEEE Wireless Communications (August 2004)","DOI":"10.1109\/MWC.2004.1325888"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"McNair, J.F.Z.: Vertical handoffs in fourth-generation multinetwork environments. IEEE Wireless Communications (June 2004)","DOI":"10.1109\/MWC.2004.1308935"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/3-540-36199-5_11","volume-title":"Active Networks","author":"C. Prehofer","year":"2002","unstructured":"Prehofer, C., et al.: Active Networks for 4G Mobile Communication: Motivation, Architecture and Application Scenarios. In: Sterbenz, J.P.G., Takada, O., Tschudin, C.F., Plattner, B. (eds.) IWAN 2002. LNCS, vol.\u00a02546, pp. 132\u2013145. Springer, Heidelberg (2002)"},{"key":"30_CR12","unstructured":"Chellappa-Doss, R., Jennings, A., Shenoy, N.: User Mobility Prediction in Hybrid and Ad Hoc Wireless Networks. In: ATNAC (December 2003)"},{"key":"30_CR13","unstructured":"3GPP TS 23.234 v6.0.0:3G System to WLAN Interworking; System Description, R6"},{"key":"30_CR14","unstructured":"3GPP TS 23.271:Functional stage 2 description of Location Services (LCS), R6"},{"key":"30_CR15","unstructured":"3G TS 33.234 v050: 3G Security; Wireless Local Area Network (WLAN) Interworking Security. R6"},{"key":"30_CR16","unstructured":"Koien, G.M., Haslestad, T.: Security aspects of 3G-WLAN interworking. IEEE Communications (November 2003)"},{"key":"30_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/11496618_29","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"M. Lee","year":"2005","unstructured":"Lee, M., Kim, J., Park, S., Song, O., Jun, S.: A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 394\u2013406. Springer, Heidelberg (2005)"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Montavont, N., et al.: Handover Management for Mobile Nodes in IPv6 Networks. IEEE Communications (August 2002)","DOI":"10.1109\/MCOM.2002.1024413"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Daniel Wong, K., et al.: Mobility Management Scheme for Auto-configured Wireless IP Networks. IEEE Wireless Communications (October 2003)","DOI":"10.1109\/MWC.2003.1241103"},{"key":"30_CR20","unstructured":"He, Q., et al.: The Quest for Personal Control Over Mobile Location Privacy. IEEE Communications (May 2004)"},{"key":"30_CR21","doi-asserted-by":"crossref","unstructured":"Gruteser, M., et al.: Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security & Privacy (March-April 2004)","DOI":"10.1109\/MSECP.2004.1281242"},{"key":"30_CR22","doi-asserted-by":"crossref","unstructured":"Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE PERVASIVE computing (January-March 2003)","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"30_CR23","doi-asserted-by":"crossref","unstructured":"Marques, V., et al.: An IP-based QoS architecture for 4G operator scenarios. IEEE Wireless Communications (June 2003)","DOI":"10.1109\/MWC.2003.1209596"},{"key":"30_CR24","doi-asserted-by":"crossref","unstructured":"Shi, M., et al.: IEEE 802.11 roaming and authentication in wireless LAN\/cellular mobile networks. IEEE Wireless Communications (August 2004)","DOI":"10.1109\/MWC.2004.1325893"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11422778_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:52:16Z","timestamp":1605624736000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11422778_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258094","9783540320173"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11422778_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}