{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:26:06Z","timestamp":1747196766935,"version":"3.40.5"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319138404"},{"type":"electronic","value":"9783319138411"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13841-1_13","type":"book-chapter","created":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T13:02:35Z","timestamp":1417611755000},"page":"226-244","source":"Crossref","is-referenced-by-count":0,"title":["A Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to the EPS"],"prefix":"10.1007","author":[{"given":"Hiten","family":"Choudhury","sequence":"first","affiliation":[]},{"given":"Basav","family":"Roychoudhury","sequence":"additional","affiliation":[]},{"given":"Dilip kr.","family":"Saikia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"3GPP: Formal Analysis of the 3G Authentication Protocol. TR 33.902, 3rd Generation Partnership Project (3GPP) (2001), http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33902.htm"},{"key":"13_CR2","unstructured":"3GPP: Numbering, addressing and identification. TS 23.003, 3rd Generation Partnership Project (3GPP) (2011), http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/23003.htm"},{"key":"13_CR3","unstructured":"3GPP: 3G Security; Security architecture. TS 33.102, 3rd Generation Partnership Project (3GPP) (2012), http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33102.htm"},{"key":"13_CR4","unstructured":"3GPP: 3GPP System Architecture Evolution (SAE);Security aspects of non-3GPP accesses. TS 33.402, 3rd Generation Partnership Project (3GPP) (2012), http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33402.htm"},{"key":"13_CR5","unstructured":"3GPP: Architecture enhancements for non-3GPP accesses. TS 23.402, 3rd Generation Partnership Project (3GPP) (2012), http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/23402.htm"},{"issue":"1871","key":"13_CR6","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences\u00a0426(1871), 233\u2013271 (1989)","journal-title":"Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences"},{"issue":"4","key":"13_CR7","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1016\/j.comcom.2008.11.032","volume":"32","author":"C. Chang","year":"2009","unstructured":"Chang, C., Lee, C., Chiu, Y.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications\u00a032(4), 611\u2013618 (2009)","journal-title":"Computer Communications"},{"issue":"3","key":"13_CR8","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1002\/dac.1158","volume":"24","author":"C. Chen","year":"2011","unstructured":"Chen, C., He, D., Chan, S., Bu, J., Gao, Y., Fan, R.: Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems\u00a024(3), 347\u2013362 (2011)","journal-title":"International Journal of Communication Systems"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Choudhury, H., Roychoudhury, B., Saikia, D.K.: End-to-end user identity confidentiality for umts networks. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), vol.\u00a02, pp. 46\u201350. IEEE (2010)","DOI":"10.1109\/ICCSIT.2010.5564448"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Choudhury, H., Roychoudhury, B., Saikia, D.: Umts user identity confidentiality: An end-to-end solution. In: 2011 Eighth International Conference on Wireless and Optical Communications Networks (WOCN), pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/WOCN.2011.5872916"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Choudhury, H., Roychoudhury, B., Saikia, D.: Enhancing user identity privacy in lte. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 949\u2013957. IEEE (2012)","DOI":"10.1109\/TrustCom.2012.148"},{"key":"13_CR12","unstructured":"Feng, T., Zhou, W., Li, X.: Anonymous identity authentication scheme in wireless roaming communication. In: 2012 8th International Conference on Computing Technology and Information Management (ICCM), vol.\u00a01, pp. 124\u2013129. IEEE (2012)"},{"issue":"2","key":"13_CR13","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TWC.2010.120610.101018","volume":"10","author":"D. He","year":"2011","unstructured":"He, D., Bu, J., Chan, S., Chen, C., Yin, M.: Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications\u00a010(2), 431\u2013436 (2011)","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"13_CR14","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s11277-010-0033-5","volume":"61","author":"D. He","year":"2011","unstructured":"He, D., Chan, S., Chen, C., Bu, J., Fan, R.: Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications\u00a061(2), 465\u2013476 (2011)","journal-title":"Wireless Personal Communications"},{"issue":"8","key":"13_CR15","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1109\/LCOMM.2012.061912.120941","volume":"16","author":"D. He","year":"2012","unstructured":"He, D., Chen, C., Chan, S., Bu, J.: Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters\u00a016(8), 1270\u20131273 (2012)","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"13_CR16","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TWC.2011.110811.111240","volume":"11","author":"D. He","year":"2012","unstructured":"He, D., Chen, C., Chan, S., Bu, J.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications\u00a011(1), 48\u201353 (2012)","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"13_CR17","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D. He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Computer Communications\u00a034(3), 367\u2013374 (2011)","journal-title":"Computer Communications"},{"issue":"5","key":"13_CR18","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MCOM.2004.1299356","volume":"42","author":"Q. He","year":"2004","unstructured":"He, Q., Wu, D., Khosla, P.: The quest for personal control over mobile location privacy. IEEE Communications Magazine\u00a042(5), 130\u2013136 (2004)","journal-title":"IEEE Communications Magazine"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Krawczyk, H., Tsudik, G.: On travelling incognito. In: First Workshop on Mobile Computing Systems and Applications, WMCSA 1994, pp. 205\u2013211. IEEE (1994)","DOI":"10.1109\/WMCSA.1994.29"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/BFb0055870","volume-title":"Computer Security \u2013 ESORICS 98","author":"G. Horn","year":"1998","unstructured":"Horn, G., Preneel, B.: Authentication and payment in future mobile systems. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 277\u2013293. Springer, Heidelberg (1998)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. In: Wireless Personal Communications, pp. 1\u201315 (2012)","DOI":"10.1007\/s11277-012-0535-4"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Kaufman, C., Hoffman, P., Nir, Y., Eronen, P.: Internet key exchange protocol version 2 (ikev2). The Internet Engineering Task Force Request for Comments (IETF RFC) 5996 (2010)","DOI":"10.17487\/rfc5996"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Kuo, W.C., Wei, H.J., Cheng, J.C.: An efficient and secure anonymous mobility network authentication scheme. Journal of Information Security and Applications (2014)","DOI":"10.1016\/j.jisa.2013.12.002"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Lee, C., Chen, C., Ou, H., Chen, L.: Extension of an efficient 3gpp authentication and key agreement protocol. Wireless Personal Communications, 1\u201312 (2011)","DOI":"10.1007\/s11277-011-0486-1"},{"issue":"5","key":"13_CR25","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C. Lee","year":"2006","unstructured":"Lee, C., Hwang, M., Liao, I.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics\u00a053(5), 1683\u20131687 (2006)","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"4","key":"13_CR26","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/217391.217456","volume":"25","author":"H. Lin","year":"1995","unstructured":"Lin, H., Harn, L.: Authentication protocols for personal communication systems. ACM SIGCOMM Computer Communication Review\u00a025(4), 256\u2013261 (1995)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Liu, H., Liang, M.: Privacy-preserving registration protocol for mobile network. International Journal of Communication Systems (2012)","DOI":"10.1002\/dac.2426"},{"key":"13_CR28","unstructured":"Park, J., Go, J., Kim, K.: Wireless authentication protocol preserving user anonymity. In: Proceedings of the 2001 Symposium on Cryptography and Information Security (SCIS 2001), vol.\u00a026, pp. 159\u2013164. Citeseer (2001)"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Samfat, D., Molva, R., Asokan, N.: Untraceability in mobile networks. In: Proceedings of the 1st Annual International Conference on Mobile Computing and Networking, pp. 26\u201336. ACM (1995)","DOI":"10.1145\/215530.215548"},{"key":"13_CR30","unstructured":"Trai: Highlights on telecom subscription data as on 07 july 2014. Press release, Telecom Regulatory Authority of India (2014)"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Varadharajan, V., Mu, Y.: Preserving privacy in mobile communications: a hybrid method. In: 1997 IEEE International Conference on Personal Wireless Communications, pp. 532\u2013536. IEEE (1997)","DOI":"10.1109\/ICPWC.1997.655576"},{"key":"13_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-61770-1_39","volume-title":"Computer Security - ESORICS 96","author":"G. Wedel","year":"1996","unstructured":"Wedel, G., Kessler, V.: Formal semantics for authentication logics. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 219\u2013241. Springer, Heidelberg (1996)"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Wong, D.: Security analysis of two anonymous authentication protocols for distributed wireless networks. In: Third IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom 2005 Workshops, pp. 284\u2013288. IEEE (2005)","DOI":"10.1109\/PERCOMW.2005.70"},{"issue":"10","key":"13_CR34","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/LCOMM.2008.080283","volume":"12","author":"C. Wu","year":"2008","unstructured":"Wu, C., Lee, W., Tsaur, W.: A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters\u00a012(10), 722\u2013723 (2008)","journal-title":"IEEE Communications Letters"},{"issue":"2","key":"13_CR35","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s11277-013-1309-3","volume":"74","author":"Q. Xie","year":"2014","unstructured":"Xie, Q., Hu, B., Tan, X., Bao, M., Yu, X.: Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications\u00a074(2), 601\u2013614 (2014)","journal-title":"Wireless Personal Communications"},{"issue":"9","key":"13_CR36","doi-asserted-by":"publisher","first-page":"3461","DOI":"10.1109\/TWC.2007.06020042","volume":"6","author":"G. Yang","year":"2007","unstructured":"Yang, G., Wong, D., Deng, X.: Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications\u00a06(9), 3461\u20133472 (2007)","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"7","key":"13_CR37","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/LCOMM.2009.090488","volume":"13","author":"T. Youn","year":"2009","unstructured":"Youn, T., Park, Y., Lim, J.: Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters\u00a013(7), 471\u2013473 (2009)","journal-title":"IEEE Communications Letters"},{"issue":"3","key":"13_CR38","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/LCOMM.2009.081821","volume":"13","author":"P. Zeng","year":"2009","unstructured":"Zeng, P., Cao, Z., Choo, K., Wang, S.: On the anonymity of some authentication schemes for wireless communications. IEEE Communications Letters\u00a013(3), 170\u2013171 (2009)","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"13_CR39","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.comnet.2010.08.008","volume":"55","author":"T. Zhou","year":"2011","unstructured":"Zhou, T., Xu, J.: Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Computer Networks\u00a055(1), 205\u2013213 (2011)","journal-title":"Computer Networks"},{"issue":"1","key":"13_CR40","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TCE.2004.1277867","volume":"50","author":"J. Zhu","year":"2004","unstructured":"Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics\u00a050(1), 231\u2013235 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13841-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T22:48:41Z","timestamp":1747176521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13841-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319138404","9783319138411"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13841-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}