{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:57:30Z","timestamp":1740099450949,"version":"3.37.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_4","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"36-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Blockchain-Based Mobility Management for LTE and Beyond"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9206-8613","authenticated-orcid":false,"given":"Han","family":"Lee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1438-7018","authenticated-orcid":false,"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Duan, X., Wang, X.: Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer. In: IEEE ICC 2016 Communication and Information Systems Security Symposium (2016)","DOI":"10.1109\/ICC.2016.7510994"},{"issue":"4","key":"4_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCOM.2015.7081072","volume":"53","author":"X Duan","year":"2015","unstructured":"Duan, X., Wang, X.: Authentication handover and privacy protection in 5G HetNets using software-defined networking. IEEE Commun. Mag. 53(4), 28\u201335 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Tesema, F.B., Awada, A., Viering, I., Simsek, M., Fettweis, G.P.: Fast cell select for mobility robustness in intra-frequency 5G ultra dense networks. In: IEEE 27th Annual International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1\u20137 (2016)","DOI":"10.1109\/PIMRC.2016.7794931"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"9073","DOI":"10.1109\/ACCESS.2016.2642538","volume":"4","author":"R Arshad","year":"2017","unstructured":"Arshad, R., et al.: Handover management in 5G and beyond : a topology aware skipping approach. IEEE Access 4, 9073\u20139081 (2017)","journal-title":"IEEE Access"},{"issue":"8","key":"4_CR5","first-page":"1","volume":"14","author":"A Habbal","year":"2017","unstructured":"Habbal, A., Member, S., Goudar, S.I., Hassan, S., Member, S.: Context-aware radio access technology selection in 5G ultra dense networks. IEEE Access 14(8), 1\u201313 (2017)","journal-title":"IEEE Access"},{"issue":"12","key":"4_CR6","first-page":"124","volume":"8","author":"X Wang","year":"2016","unstructured":"Wang, X., et al.: Handover reduction in virtualized cloud radio access networks using TWDM-PON fronthaul. J. Opt. Soc. Am. 8(12), 124\u2013134 (2016)","journal-title":"J. Opt. Soc. Am."},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Jung, M.Y., Jang, J.W.: Data management and searching system and method to provide increased security for IoT platform. In: International Conference on Information and Communication Technology. ICT Convergence Technologies Leading the Fourth Industrial Revolution, ICTC 2017, December 2017, pp. 873\u2013878 (2017)","DOI":"10.1109\/ICTC.2017.8190803"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Ram Basnet, S., Shakya, S.: BSS: blockchain security over software defined network. In: IEEE ICCCA, pp. 720\u2013725 (2017)","DOI":"10.1109\/CCAA.2017.8229910"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: International Conference on Advanced Communication Technology, ICACT, pp. 464\u2013467 (2017)","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"4_CR10","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"key":"4_CR11","unstructured":"Rao, V.S., Gajula, R.: Interoperable UE Handovers in LTE. Radysis (2011)"},{"key":"4_CR12","unstructured":"Secp256k1. \n                    https:\/\/en.bitcoin.it\/wiki\/Secp256k1\n                    \n                  . Accessed 02 May 2018"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"14686","DOI":"10.1109\/ACCESS.2018.2810096","volume":"6","author":"NAN Guo","year":"2018","unstructured":"Guo, N.A.N., Wang, X.: An anonymous authentication scheme based on PMIPv6 for VANETs. IEEE Access 6, 14686\u201314698 (2018)","journal-title":"IEEE Access"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Jawad Alam, M., Ma, M.: DC and CoMP authentication in LTE-advanced 5G HetNet. In: Proceedings of IEEE Global Communications Conference, GLOBECOM 2017, January 2018, pp. 1\u20136 (2018)","DOI":"10.1109\/GLOCOM.2017.8254719"},{"issue":"2","key":"4_CR15","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TMC.2012.242","volume":"13","author":"CK Han","year":"2014","unstructured":"Han, C.K., Choi, H.K.: Security analysis of handover key management in 4G LTE\/SAE networks. IEEE Trans. Mob. Comput. 13(2), 457\u2013468 (2014)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Cichonski, J., Franklin, J.M., Bartock, M.: Guide to LTE Security. NIST Special Publication 800-187 (2018)","DOI":"10.6028\/NIST.SP.800-187"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:03:45Z","timestamp":1562771025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}