{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:47:04Z","timestamp":1725565624850},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219590"},{"type":"electronic","value":"9783540246930"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24693-0_2","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T02:02:45Z","timestamp":1284170565000},"page":"13-24","source":"Crossref","is-referenced-by-count":0,"title":["Inter\/Intra Core Network Security with PKI for 3G-and-Beyond Systems"],"prefix":"10.1007","author":[{"given":"Georgios","family":"Kambourakis","sequence":"first","affiliation":[]},{"given":"Angelos","family":"Rouskas","sequence":"additional","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"3GPP Tech. Spec., \u201cMAP Application Layer Security\u201d, (TS 33.200 v. 5.1.0), Dec. 2002."},{"key":"2_CR2","volume-title":"The MAP Security Domain of Interpretation for Internet Security Association and Key Management Protocol","author":"J Arko","year":"2002","unstructured":"Arko, J. and Blom, R., \u201cThe MAP Security Domain of Interpretation for Internet Security Association and Key Management Protocol\u201d, <draft-arkko-map-doi-07.txt>, May 2002."},{"key":"2_CR3","volume-title":"Security Architecture for the Internet Protocol","author":"S Kent","year":"1998","unstructured":"Kent, S. & Atkinson, R., \u201cSecurity Architecture for the Internet Protocol\u201d, IETF RFC 2401, Nov. 1998."},{"key":"2_CR4","unstructured":"3GPP Tech. Spec, \u201cIP Network Layer Security\u201d, (TS 33.210 v.5.3.0), Mar 2003."},{"key":"2_CR5","unstructured":"3GPP TSG, \u201cUsing PKI to provide network domain security\u201d, Discussion Document S3\u2013010622 SA WG3 Security \u2014 S3#21, Nov. 2001."},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"3GPP TSG, \u201cSecurity Services using Public Key Cryptography\u201d, Discussion Document S3z000025 SA WG3 Security \u2014 S3#15bis, Nov. 2000.","DOI":"10.1016\/S1353-4858(00)03013-0"},{"key":"2_CR7","unstructured":"ASPeCT Proj, Securing the Future of Mobile Comm., www.esat.kuleuven.ac.be \/cosic\/aspect."},{"key":"2_CR8","volume-title":"Intermediate report on PKI architecture for UMTS","author":"USECA Project, UMTS Security Architecture","year":"1999","unstructured":"USECA Project, UMTS Security Architecture: Intermediate report on PKI architecture for UMTS, Public Report, July 1999."},{"key":"2_CR9","unstructured":"3GPP TSG, \u201cArchitecture proposal to support subscriber certificates\u201d, Discussion and Approval document, Tdoc S2\u2013022854, Oct. 2002."},{"key":"2_CR10","first-page":"109","volume-title":"Proc. of the IFIPSEC2003 18th MP Int\u2019l Information Security","author":"G Kambourakis","year":"2003","unstructured":"Kambourakis G., Rouskas A., Gritzalis S., \u201cIntroducing PKI to enhance Security in Future Mobile Networks\u201d, in the Proc. of the IFIPSEC2003 18th MP Int\u2019l Information Security Conf., pp. 109\u2013120, Athens, Greece May 2003."},{"key":"2_CR11","unstructured":"3GPP Tech. Spec, \u201cAccess security for IP-based services\u201d, (TS 33.203 v.5.2.0), June 2002."},{"key":"2_CR12","unstructured":"3GPP TSG, \u201cSupport of certificates in 3GPP security Architecture\u201d, Discussion Document S3\u2013010353 SA WG3 Security \u2014 S3#19, July 2001."},{"key":"2_CR13","first-page":"169","volume-title":"Proc. of 4. Fachtagung Sicherheit in Informationsystemen (SIS 2000)","author":"R Oppliger","year":"2000","unstructured":"Oppliger, R., Pernul, G. & Strauss, C, \u201cUsing Attribute Certificates to Implement Role Based Authorization and Access Control Models\u201d, In the Proc. of 4. Fachtagung Sicherheit in Informationsystemen (SIS 2000), pp. 169\u2013184, Oct. 2000."},{"key":"2_CR14","volume-title":"Demystifying IPsec Puzzle","author":"S Frankel","year":"2001","unstructured":"Frankel, S., Demystifying IPsec Puzzle, Artech House, 2001."},{"key":"2_CR15","doi-asserted-by":"publisher","DOI":"10.1201\/9780203997499","volume-title":"A Technical Guide to IPsec Virtual Private Networks","author":"J Tiller","year":"2000","unstructured":"Tiller, J., A Technical Guide to IPsec Virtual Private Networks, Auerbach CRC Press, 2000."},{"key":"2_CR16","first-page":"138","volume-title":"Interworking between IP Security and Performance Enhancing Proxies for Mobile Networks","author":"N Assaf","year":"2002","unstructured":"Assaf, N. etal., \u201cInterworking between IP Security and Performance Enhancing Proxies for Mobile Networks\u201d, IEEE Comm. Mag., pp.138\u2013144, May 2002."},{"key":"2_CR17","first-page":"8","volume-title":"An All-IP Approach for UMTS Third-Generation Mobile Networks","author":"Y Lin","year":"2002","unstructured":"Lin, Y., & Pang, A., \u201cAn All-IP Approach for UMTS Third-Generation Mobile Networks\u201d, IEEE Network, pp. 8\u201319, Sept.\/Oct. 2002."},{"key":"2_CR18","unstructured":"3GPP Tech. Spec, \u201cSecurity Architecture\u201d, (TS 33.102 v.5.1.0), December 2002."},{"key":"2_CR19","volume-title":"SIP: Session Initiation Protocol","author":"J Rosenberg","year":"2002","unstructured":"Rosenberg, J. et al., \u201cSIP: Session Initiation Protocol\u201d, IETF RFC 3261, June 2002."},{"key":"2_CR20","volume-title":"Internet Security Association and Key Management Protocol (ISAKMP)","author":"D Maughan","year":"1998","unstructured":"Maughan, D., et al, \u201cInternet Security Association and Key Management Protocol (ISAKMP)\u201d, IETF RFC 2408, Nov. 1998."},{"key":"2_CR21","first-page":"152","volume-title":"Proc. of the 4th IEEE Int\u2019l Conf. on Mobile and Wireless Comm. Networks. (MWCN), Stockholm","author":"G Kambourakis","year":"2002","unstructured":"Kambourakis G., Rouskas A., & Gritzalis S., \u201cUsing SSL\/TLS in Authentication and Key Agreement Procedures of Future Mobile Networks\u201d, In the Proc. of the 4th IEEE Int\u2019l Conf. on Mobile and Wireless Comm. Networks. (MWCN), Stockholm, pp. 152\u2013156, Sep 2002."},{"key":"2_CR22","first-page":"859","volume-title":"Proc. of IEEE Wireless Comm. & Networking Conf. (WCNC 2002)","author":"V Gupta","year":"2002","unstructured":"Gupta V. & Gupta S., \u201cExperiments in Wireless Internet Security\u201d, In the Proc. of IEEE Wireless Comm. & Networking Conf. (WCNC 2002),no. 1,pp. 859\u2013863, March 2002."},{"key":"2_CR23","first-page":"1050","volume-title":"Proc. of the IEEE Int\u2019l Conf. On Communications (ICC 2002)","author":"P Nachiketh","year":"2002","unstructured":"Nachiketh, P., Srivaths, R., Anand, R. & Ganesh, L., \u201cOptimizing Public-Key Encryption for Wireless Clients\u201d, In the Proc. of the IEEE Int\u2019l Conf. On Communications (ICC 2002), no 1, pp. 1050\u20131056, April 2002."},{"key":"2_CR24","volume-title":"-AKA Authentication","author":"J Arkko","year":"2003","unstructured":"Arkko, J. and Haverinen, H., \u201cEAP-AKA Authentication\u201d, <draft-arkko-pppext-eap-aka-10.txt>, June 2003."}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24693-0_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:54:10Z","timestamp":1605761650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24693-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219590","9783540246930"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24693-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}