{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:49:03Z","timestamp":1725983343181},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319949642"},{"type":"electronic","value":"9783319949659"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94965-9_1","type":"book-chapter","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T09:41:58Z","timestamp":1530870118000},"page":"1-10","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Temporary Internet Access for Authentication and Key Agreement for LTE Networks"],"prefix":"10.1007","author":[{"given":"Xue Jun","family":"Li","sequence":"first","affiliation":[]},{"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Jiecheng","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,7]]},"reference":[{"key":"1_CR1","unstructured":"Abdo, J.B.B., Chaouchi, H., Aoude, M.: Ensured confidentiality authentication and key agreement protocol for EPS. In: RELABIRA 2012 (2012)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Abdrabou, M.A., Elbayoumy, A.D.E., El-Wanis, E.A.: LTE authentication protocol (EPS-AKA) weaknesses solution. In: ICICIS 2015, pp. 434\u2013441 (2015)","DOI":"10.1109\/IntelCIS.2015.7397256"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed, T., Barankanira, D., Antonie, S., Huang, X., Duvocelle, H.: Inter-system mobility in evolved packet system (EPS): connecting non-3GPP accesses. In: ICIN 2010 (2010)","DOI":"10.1109\/ICIN.2010.5640919"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Alezabi, K.A., Hashim, F., Hashim, S.J., Ali, B.M.: An efficient authentication and key agreement protocol for 4G (LTE) networks. In: IEEE Region 10 Symposium 2014, pp. 502\u2013507 (2014)","DOI":"10.1109\/TENCONSpring.2014.6863085"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Apostol, C.-G., Racuciu, C.: Improving LTE EPS-AKA using the security request vector. In: ECAI 2015 (2015)","DOI":"10.1109\/ECAI.2015.7301207"},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/SURV.2013.041513.00174","volume":"16","author":"J Cao","year":"2014","unstructured":"Cao, J., Ma, M., Li, H., Zhang, Y., Luo, Z.: A survey on security aspects for LTE and LTE-A networks. IEEE Commun. Surv. Tutor. 16(1), 283\u2013302 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"El Idrissi, Y.E.H., Zahid, N., Jedra, M.: Security analysis of 3GPP (LTE) - WLAN interworking and a new local authentication method on EAP-AKA. In: FGCT 2012, pp. 137\u2013142 (2012)","DOI":"10.1109\/FGCT.2012.6476561"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Forsberg, D., Huang, L., Tsuyoshi, K., Alanaram, S.: Enhancing security and privacy in 3GPP E-UTRAN radio interface. In: PIMRC 2007 (2007)","DOI":"10.1109\/PIMRC.2007.4394792"},{"key":"1_CR9","volume-title":"Mobile Communication Handbook","author":"JD Gibson","year":"2013","unstructured":"Gibson, J.D.: Mobile Communication Handbook, 3rd edn. CRC Press, Boca Raton (2013)","edition":"3"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Gu, L., Gregory, M.A.: A green and secure authentication for the 4th generation mobile network. In: ATNAC 2011, pp. 1\u20137 (2011)","DOI":"10.1109\/ATNAC.2011.6096633"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Hamandi, K., Sarji, I., Chehab, A., Elhajj, I.H., Kayssi, A.: Privacy enhanced and computationally efficient HSK-AKA LTE scheme. In: Barolli, L., Xhafa, F., Takizawa, M., Enokido, T., Hsu, H.H. (eds.) WAINA 2013, pp. 929\u2013934. IEEE (2013)","DOI":"10.1109\/WAINA.2013.133"},{"key":"1_CR12","unstructured":"ETSI: Digital cellular telecommunication system (phase 2+) (GSM). Universal Mobile Telecommunications System (UMTS), LTE Network Architecture, May 2017"},{"key":"1_CR13","unstructured":"ETSI: LTE; general packet radio service (GPRS) enhancements for evolved universal terrestrial radio access network (E-UTRAN) access, October 2017"},{"key":"1_CR14","unstructured":"ETSI: Universal mobile telecommunications system (UMTS); LTE; 3G security; specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; document 2: Algorithm specification, April 2017"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"K\u00f8ien, G.M.: Mutual entity authentication for LTE. In: IWCMC 2011 (2011)","DOI":"10.1109\/IWCMC.2011.5982630"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Li, X.H., Wang, Y.J.: Security enhanced authentication and key agreement protocol for LTE\/SAE network. In: WiCOM 2011 (2011)","DOI":"10.1109\/wicom.2011.6040169"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Mun, H., Han, K., Kim, K.: 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA. In: WTS 2009 (2009)","DOI":"10.1109\/WTS.2009.5068983"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Purkhiabani, M., Salahi, A.: Enhanced authentication and key agreement procedure of next generation evolved mobile networks. In: ICCSN 2011, pp. 557\u2013563 (2011)","DOI":"10.1109\/ICCSN.2011.6014956"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Yu, D., Wen, W.: Non-access-stratum request attack in E-UTRAN. In: ComComAp 2012, pp. 48\u201353 (2012)","DOI":"10.1109\/ComComAp.2012.6154001"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Smart Grid and Innovative Frontiers in Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94965-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T12:03:50Z","timestamp":1571573030000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-94965-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319949642","9783319949659"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94965-9_1","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}