{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:45Z","timestamp":1740098985268,"version":"3.37.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319681788"},{"type":"electronic","value":"9783319681795"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68179-5_44","type":"book-chapter","created":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T06:04:13Z","timestamp":1510034653000},"page":"509-520","source":"Crossref","is-referenced-by-count":1,"title":["An Agreement Graph-Based-Authentication Scheme for 5G Networks"],"prefix":"10.1007","author":[{"given":"Maroua","family":"Gharam","sequence":"first","affiliation":[]},{"given":"Noureddine","family":"Boudriga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,8]]},"reference":[{"issue":"6","key":"44_CR1","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1109\/JSAC.2014.2328098","volume":"32","author":"JG Andrews","year":"2014","unstructured":"Andrews, J.G., Buzzi, S., Choi, W., Hanly, S.V., Lozano, A., Soong, A.C.K., Zhang, J.C.: What will 5G be? IEEE J. Sel. Areas Commun. 32(6), 1065\u20131082 (2014)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"8","key":"44_CR2","doi-asserted-by":"crossref","first-page":"2119","DOI":"10.1016\/j.comnet.2012.02.012","volume":"56","author":"J Cao","year":"2012","unstructured":"Cao, J., Li, H., Ma, M., Zhang, Y., Lai, C.: A simple and robust handover authentication between HeNB and eNB in lte networks. Comput. Netw. 56(8), 2119\u20132131 (2012)","journal-title":"Comput. Netw."},{"issue":"1","key":"44_CR3","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/LCOMM.2010.01.091607","volume":"14","author":"J Choi","year":"2010","unstructured":"Choi, J., Jung, S.: A handover authentication using credentials based on chameleon hashing. IEEE Commun. Lett. 14(1), 54\u201356 (2010)","journal-title":"IEEE Commun. Lett."},{"key":"44_CR4","unstructured":"3rd Generation Partnership Project: Technical Specification Group Services and System Aspects; 3GPP. System architecture evolution (SAE), security architecture (release 9). 3GPP. TS 33.401 V9.4.0 (2009)"},{"key":"44_CR5","unstructured":"3rd Generation Partnership Project: Technical Specification Group Service, Aspects, S: 3GPP. System architecture evolution (SAE); security architecture (rel 11), 3GPP. TS 33.401 V11.5.0 (2012)"},{"key":"44_CR6","unstructured":"GSMA: LTE and EPC roaming guidelines. GSM Association Official Document IR.88 Version 10.0 (2013)"},{"key":"44_CR7","unstructured":"GSMA: Roaming database, structure and updating procedures. GSM Association Official Document IR.21 Version 9.1 (2013)"},{"issue":"1","key":"44_CR8","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TWC.2011.110811.111240","volume":"11","author":"D He","year":"2012","unstructured":"He, D., Chen, C., Chan, S., Bu, J.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wirel. Commun. 11(1), 48\u201353 (2012)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"44_CR9","unstructured":"Meyer, U.: Secure roaming and handover procedures in wireless access networks. Ph.D. thesis, Vom Fachgebiet Informatik der Technischen Universitat Darmstadt genehmigte (2005)"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Krichene, N., Boudriga, N.: Securing roaming and vertical handover in fourth generation networks. In: Proceeding of the Third International Conference on Network and System Security (NSS 2009), pp. 225\u2013231 (2009)","DOI":"10.1109\/NSS.2009.14"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68179-5_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T06:17:38Z","timestamp":1510035458000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68179-5_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319681788","9783319681795"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68179-5_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}