{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:14:17Z","timestamp":1749701657110,"version":"3.41.0"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491059"},{"type":"electronic","value":"9783319491066"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49106-6_75","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T10:33:13Z","timestamp":1477045993000},"page":"747-754","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Security of LTE using a Double Masking Technique"],"prefix":"10.1007","author":[{"given":"Jung-Chun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yi-Li","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"75_CR1","doi-asserted-by":"crossref","unstructured":"M. Purkhiabani and A. Salahi, \u201cEnhanced Authentication and Key Agreement Procedure of next Generation 3GPP Mobile Networks,\u201d International Journal of Information and Electronics Engineering, vol. 2, no. 1, January 2012, pp. 69-77.","DOI":"10.7763\/IJIEE.2012.V2.57"},{"key":"75_CR2","doi-asserted-by":"crossref","unstructured":"N. Seddigh, B. Nandy, R. Makkar, and J.F. Beaumont, \u201cSecurity Advances and Challenges in 4G Wireless Networks,\u201d Annual International Conference on Privacy, Security and Trust, 2010, pp. 62-71.","DOI":"10.1109\/PST.2010.5593244"},{"key":"75_CR3","unstructured":"B. Rashidi and C. Fung, \u201cA Survey of Android Security Threats and Defenses,\u201d Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications,\u00a0vol. 6, no. 3, September 2015, pp.\u00a03-35."},{"key":"75_CR4","doi-asserted-by":"crossref","unstructured":"M. Aiash, G.E. Mapp, A. Lasebae and R. Phan, \u201cProviding Security in 4G Systems: Unveiling the Challenges,\u201d Advanced International Conference on Telecommunications, 2010, pp. 439-444.","DOI":"10.1109\/AICT.2010.24"},{"key":"75_CR5","unstructured":"A. Skovoroda and D. Gamayunov, \u201cSecuring mobile devices: malware mitigation methods,\u201d Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 6, no. 2, June 2015, pp.\u00a078-97."},{"key":"75_CR6","doi-asserted-by":"crossref","unstructured":"M.A. Abdrabou, A.D.E. Elbayoumy, E.A. El-Wanis, \u201cLTE Authentication Protocol (EPS-AKA) Weaknesses Solution,\u201d IEEE International Conference on Intelligent Computing and Information Systems, 2015, pp. 434-441.","DOI":"10.1109\/IntelCIS.2015.7397256"},{"key":"75_CR7","unstructured":"A.A. Mazroa, M. Arozullah, \u201cDetection and Remediation of Attack by Fake Base Stations in LTE Networks,\u201d International Journal of Soft Computing and Engineering vol. 5, issue-2, May 2015, pp. 12-15."},{"key":"75_CR8","doi-asserted-by":"crossref","unstructured":"C.G. Apostol and C. R\u0103cuciu, \u201cImproving LTE EPS-AKA using the Security Request Vector,\u201d 7th Edition Electronics, Computers and Artificial Intelligence, June 2015, pp. 185-188.","DOI":"10.1109\/ECAI.2015.7301207"},{"key":"75_CR9","unstructured":"T. kurokawa, R. Nojima, and S. Moriai, \u201cOn the security of CBC Mode in SSL3.0 and TLS1.0,\u201d Journal of Internet Services and Information Security, vol. 6, issue 1, February 2016, pp.\u00a02-19."},{"key":"75_CR10","doi-asserted-by":"crossref","unstructured":"Y.L. Huang, C.R. Dai, and F.Y. Leu, and I. You, \u201cA Secure Data Encryption Method Employing a Sequential-Logic Style Mechanism for a Cloud System,\u201d International Journal of Web and Grid Services, vol. 11, no. 1, January, 2015, pp. 102-124.","DOI":"10.1504\/IJWGS.2015.067158"},{"key":"75_CR11","doi-asserted-by":"crossref","unstructured":"Y.L. Huang, F.Y. Leu and K.C. Wei, \u201cA Secure Communication over Wireless Environments by using a Data Connection Core,\u201d Mathematical and Computer Modelling, vol. 58, no. 5-6, September 2013, pp. 1459-1474.","DOI":"10.1016\/j.mcm.2012.11.022"},{"key":"75_CR12","doi-asserted-by":"crossref","unstructured":"A. Kitana, I. Traore, and I. Woungang, \u201cImpact Study of a Mobile Botnet over LTE Networks,\u201d Journal of Internet Services and Information Security, vol. 6, issue 2, May 2016, pp.\u00a01-22.","DOI":"10.1109\/MALWARE.2016.7888726"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49106-6_75","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:06:03Z","timestamp":1749668763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49106-6_75"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491059","9783319491066"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49106-6_75","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]},"assertion":[{"value":"22 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BWCCA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband and Wireless Computing, Communication and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bwcca2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/bwcca\/2016\/venue.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}