{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:00:57Z","timestamp":1725566457844},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540265474"},{"type":"electronic","value":"9783540316848"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11506157_35","type":"book-chapter","created":{"date-parts":[[2010,9,26]],"date-time":"2010-09-26T18:04:36Z","timestamp":1285524276000},"page":"417-428","source":"Crossref","is-referenced-by-count":5,"title":["Deposit-Case Attack Against Secure Roaming"],"prefix":"10.1007","author":[{"given":"Guomin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Xiaotie","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Herzberg, A., Krawczyk, H., Tsudik, G.: On traveling incognito. In: Proc. of the IEEE Workshop on Mobile Systems and Applications (December 1994)","DOI":"10.1109\/WMCSA.1994.29"},{"key":"35_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)"},{"issue":"2","key":"35_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes, and Cryptography\u00a02(2), 107\u2013125 (1992)","journal-title":"Designs, Codes, and Cryptography"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Dworkin, M.: Recommendation for Block Cipher Modes of Operation. NIST Special Publication 800-38A 2001 Edition, US Department of Commerce \/ NIST (December 2001)","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"35_CR5","unstructured":"Go, J., Kim, K.: Wireless authentication protocol preserving user anonymity. In: Proc. of the 2001 Symposium on Cryptography and Information Security (SCIS 2001), January 2001, pp. 159\u2013164 (2001)"},{"key":"35_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-49135-X_29","volume-title":"Security Protocols","author":"D. Gollmann","year":"1999","unstructured":"Gollmann, D.: Insider fraud (position paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 213\u2013219. Springer, Heidelberg (1999)"},{"issue":"2","key":"35_CR7","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/TWC.2003.809452","volume":"2","author":"K.F. Hwang","year":"2003","unstructured":"Hwang, K.F., Chang, C.C.: A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans. on Wireless Communications\u00a02(2), 400\u2013407 (2003)","journal-title":"IEEE Trans. on Wireless Communications"},{"key":"35_CR8","unstructured":"Mouly, M., Pautet, M.-B.: The GSM System for Mobile Communications. Published by the authors (1992)"},{"key":"35_CR9","unstructured":"NIST FIPS PUB 197. Announcing the ADVANCED ENCRYPTION STANDARD (AES) (November 2001)"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Samfat, D., Molva, R., Asokan, N.: Untraceability in mobile networks. In: Proc. of MobiCom 1995, pp. 26\u201336 (1995)","DOI":"10.1145\/215530.215548"},{"key":"35_CR11","unstructured":"The Telecommunications Industry Association (TIA). Mobile Station-Base Station Compatibility Standard for Wideband Spread Spectrum Cellular Systems (TIA\/EIA-95-B-99) (February 1999)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Varadharajan, V., Mu, Y.: Preserving privacy in mobile communications: A hybrid method. In: IEEE International Conference on Personal Wireless Communications, pp. 532\u2013536 (1997)","DOI":"10.1109\/ICPWC.1997.655576"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11506157_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:03:17Z","timestamp":1605643397000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11506157_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540265474","9783540316848"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11506157_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}