{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:17:29Z","timestamp":1725887849782},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504988"},{"type":"electronic","value":"9783319505008"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50500-8_4","type":"book-chapter","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T11:14:46Z","timestamp":1495106086000},"page":"93-128","source":"Crossref","is-referenced-by-count":0,"title":["Smart Cards and Security for Mobile Communications"],"prefix":"10.1007","author":[{"given":"Keith","family":"Mayes","sequence":"first","affiliation":[]},{"given":"Tim","family":"Evans","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"key":"4_CR1","unstructured":"3GPP, TR 35.935: Universal Mobile Telecommunications System (UMTS); LTE; Performance evaluation of the Tuak algorithm set, version 12.0.0 Release (2015)"},{"key":"4_CR2","unstructured":"3GPP TS 35.206: 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification (2014)"},{"key":"4_CR3","unstructured":"3GPP, TS 35.231: 3G Security; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification (2014)"},{"key":"4_CR4","unstructured":"3GPP2, Removable User Identity Module (RUIM) for Spread Spectrum Systems, 3GPP2 CS0023-C V2.0 October 2008"},{"key":"4_CR5","unstructured":"G. Bertoni, J. Daemen, M. Peeters, and G. van Aasche, The KECCAK Reference, version 3.0, 14 (2011)"},{"key":"4_CR6","unstructured":"CC, Common criteria for information technology security evaluation part1: Introduction and general model, version 3.1 release 4, (2012)"},{"key":"4_CR7","unstructured":"Comprion, IT3 Move 2 Datasheet, http:\/\/www.comprion.com\/en\/products\/monitoring\/move_2\/overview , cited 25 Apr 2016"},{"key":"4_CR8","unstructured":"Damien Giry (2015), Cryptographic Key Length Recommendations, Keylength.com, http:\/\/www.keylength.com\/en\/3\/ , cited 25 Apr 2016"},{"key":"4_CR9","unstructured":"David Wagner and Ian Goldberg (1998), GSM Cloning, ISAAC Berkley, http:\/\/www.isaac.cs.berkeley.edu\/isaac\/gsm.html , cited 25 Apr 2016"},{"key":"4_CR10","unstructured":"ETSI SCP Group, SCP Specifications, https:\/\/portal.etsi.org\/tb.aspx?tbid=534&SubTB=534,639,640,714 , cited 25 Apr 2016"},{"key":"4_CR11","unstructured":"ETSI, TS 102 221, Smart Cards; UICC-Terminal interface; Physical and logical characteristics, Release 8 (2009)"},{"key":"4_CR12","unstructured":"European Technical Standards Institute (ETSI), http:\/\/www.etsi.org\/ , cited 25 Apr 2016"},{"key":"4_CR13","unstructured":"Garg V.K, IS-95 CDMA and cdma 2000, Prentice Hall 2000"},{"key":"4_CR14","unstructured":"GSM Association, http:\/\/www.gsma.com\/ , cited 25 Apr 2016"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"F. Hillebrand, GSM & UMTS - The Creation of Global Mobile Communication, Wiley 2002","DOI":"10.1002\/0470845546"},{"key":"4_CR16","unstructured":"International Organization for Standardisation, ISO 7816 Parts 1-4, http:\/\/www.iso.org\/iso\/home\/store\/catalogue_tc\/catalogue_detail.htm?csnumber=54089 , cited 25 Apr 2016"},{"key":"4_CR17","unstructured":"International Standards Organisation, http:\/\/www.iso.org\/ , cited 25 Apr 2016"},{"key":"4_CR18","unstructured":"Java Community Process (JCP), http:\/\/jcp.org\/en\/home\/index , cited 25 Apr 2016"},{"key":"4_CR19","unstructured":"Java Community Process, JSR177, https:\/\/jcp.org\/en\/jsr\/detail?id=177 , cited 25 Apr 2016"},{"key":"4_CR20","unstructured":"M. Mouly, M-B Pautet, The GSM System for Mobile Communications, Cell & Sys. Correspondence 1992"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Mayes K and Markantonakis K On the potential of high density smart cards, Elsevier Information Security Technical Report Vol 11 No 3 2006","DOI":"10.1016\/j.istr.2006.05.002"},{"key":"4_CR22","unstructured":"K. Mayes, S. Babbage, and A. Maximov, Performance Evaluation of the new TUAK Mobile Authentication Algorithm, ICONS16\/EMBEDDED2016 p 38\u201344 (2016)"},{"key":"4_CR23","unstructured":"Near Field Communication (NFC) Forum http:\/\/www.nfc-forum.org\/ , cited 25 Apr 2016"},{"key":"4_CR24","unstructured":"NIST, Announcing Draft Federal Information Processing Standard (FIPS) 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, and Draft Revision of the Applicability Clause of FIPS 180-4, Secure Hash Standard, and Request for Comments, (2004)"},{"key":"4_CR25","unstructured":"Open Mobile Alliance OMA, http:\/\/www.openmobilealliance.org\/ , cited 25 Apr 2016"},{"key":"4_CR26","unstructured":"Security Algorithms Group of Experts (SAGE), https:\/\/portal.etsi.org\/TBSiteMap\/Sage\/ActivityReport , cited 25 Apr 2016"},{"key":"4_CR27","unstructured":"The Javacard Forum https:\/\/javacardforum.com\/ , cited 25 Apr 2016"},{"key":"4_CR28","unstructured":"Third Generation Partnership project (3GPP), http:\/\/www.3gpp.org\/ , cited 25 Apr 2016"},{"key":"4_CR29","unstructured":"Third Generation Partnership Project, Digital cellular telecommunications system (Phase 2+); Subscriber Identity Modules (SIM);Functional characteristics (GSM 02.17 version 8.0.0 Release 1999)"},{"key":"4_CR30","unstructured":"Third Generation Partnership Project, Security mechanisms for the SIM application toolkit; Stage 2 (Release 1999) TS 03.48 V8.9.0 Jun 2005"},{"key":"4_CR31","unstructured":"Third Generation Partnership Project, Security related network functions (Release 1999) TS 03.20 V8.6.0 Dec 2007"},{"key":"4_CR32","unstructured":"Third Generation Partnership Project, Specification of the Subscriber Identity Module-Mobile Equipment (SIM - ME) interface (Release 1999) TS 11.11 V8.14.0 Jun 2007"},{"key":"4_CR33","unstructured":"Third Generation Partnership Project, Specification of the SIM Application Toolkit for the Subscriber Identity Module - Mobile Equipment (SIM - ME) interface (Release 1999) 3GPP TS 11.14 V8.18.0 Jun 2007"},{"key":"4_CR34","unstructured":"Third Generation Partnership Project, Technical Specification Group Core Network and Terminals, USIM and IC card requirements, (Release 13) TS 21.111 V13.0.0 Jan 2016"},{"key":"4_CR35","unstructured":"Third Generation Partnership Project, Technical Specification Group Core Network and Terminals, UICC-terminal interface; Physical and logical characteristics, (Release 13) TS 31.101 V13.1.0 Jan 2016"},{"key":"4_CR36","unstructured":"Third Generation Partnership Project, Technical Specification Group Core Network and Terminals, Characteristics of the Universal Subscriber Identity Module (USIM) application, (Release 13) TS 31.102 V13.3.0 Mar 2016"},{"key":"4_CR37","unstructured":"Third Generation Partnership Project, Technical Specification Group Core Network and Terminals, Universal Subscriber Identity Module (USIM) Application Toolkit (USAT) (Release 13) TS 31.111 V13.3.0 Mar 2016"},{"key":"4_CR38","unstructured":"Third Generation Partnership Project, Technical Specification Group Core Network and Terminals, Security mechanisms for the SIM application toolkit; Stage 2, (Release 5) TS 23.048 V5.9.0 Jun 2005"},{"key":"4_CR39","unstructured":"Third Generation Partnership Project, Technical Specification Group Core Network and Terminals, 3G Security; Security architecture, (Release 13) TS 33.102 V13.0.0 Jan 2016"},{"key":"4_CR40","unstructured":"Third Generation Partnership Project 2 (3GPP2), http:\/\/www.3gpp2.org\/ , cited 25 Apr 2016"},{"key":"4_CR41","unstructured":"Universal Serial Bus (USB) Forum, http:\/\/www.usb.org\/ , cited 25 Apr 2016"},{"key":"4_CR42","unstructured":"Vodafone, SIM\/USIM Cards Applications & Security for Mobile Telephony, Masters Lecture Slides at Royal Holloway University of London 2006"}],"container-title":["Smart Cards, Tokens, Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50500-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T20:16:56Z","timestamp":1569356216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50500-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319504988","9783319505008"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50500-8_4","relation":{},"subject":[],"published":{"date-parts":[[2017]]}}}