{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:45:39Z","timestamp":1742975139177,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540200505"},{"type":"electronic","value":"9783540394044"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39404-4_29","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T00:04:45Z","timestamp":1277683485000},"page":"381-395","source":"Crossref","is-referenced-by-count":2,"title":["Authentication Issues in Multi-service Residential Access Networks"],"prefix":"10.1007","author":[{"given":"Judith","family":"Rosseb\u00f8","sequence":"first","affiliation":[]},{"given":"John","family":"Ronan","sequence":"additional","affiliation":[]},{"given":"Kristian","family":"Walsh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Florida (1997)"},{"key":"29_CR2","unstructured":"Ronan, J., Malone, P., \u00d3 Foghl\u00fa, M.: Overhead Issues for Local Access Points in IPsec enabled VPNs\u00d3. In: IPS Workshop, Salzburg (February 2003) retreived: April 3, 2003, from http:\/\/www.ist-intermon.org\/workshop\/papers\/0901vpn-overhead.pdf"},{"key":"29_CR3","unstructured":"\u00d8lnes, J.: Trusted Certificate Validation Services \u2013 Breaking the PKI Deadlock, jon.olnes@validsign.com, October 10 (2002), http:\/\/www.validsign.com"},{"key":"29_CR4","unstructured":"Houmb, S.H.: Security Issues in FIPA Agents (paper in progress)"},{"key":"29_CR5","unstructured":"Cert Advisory CA-2001-08, Multiple Vulnerabilities in Alcatel ADSL Modems, April 12 (2001) (retreived April 3, 2003), from http:\/\/www.cert.org\/advisories\/CA-2001-08.html"},{"key":"29_CR6","unstructured":"Schlumberger, Schlumberger Smart cards Cryptoflex Home Page (retreived: April 3, 2003), from http:\/\/www.cryptoflex.com\/index.html"},{"key":"29_CR7","unstructured":"IST-SHAMAN Deliverable D09: \u00d2Detailed Technical Specification of Security for Heterogeneous Access\u00d3 (June 2002)"},{"key":"29_CR8","unstructured":"TORRENT (Technology for a Realistic End User Access Network Test-bed), IST- 2000-25187, http:\/\/www.torrent-innovations.org"},{"key":"29_CR9","unstructured":"Telenor Mobil MobilHandel TM overview (retrieved June 10, 2003), from http:\/\/telenormobil.no\/tjenester\/mobilhandel\/index.jsp"},{"key":"29_CR10","unstructured":"ETSI AT MGN@Home Access and Terminals (AT); Home Area Networks and the support of Next Generation Services; Part 6: Security and Copyright issues (retrieved: June 10, 2003) (work in progress), from http:\/\/portal.etsi.org\/Portal_Common\/home.asp"},{"key":"29_CR11","unstructured":"WLAN Smartcard Consortium, homepage (retrieved: June 10, 2003), from http:\/\/www.wlansmartcard.org\/"},{"issue":"9","key":"29_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B.C. Neuman","year":"1994","unstructured":"Neuman, B.C., Ts\u2019o, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications\u00a032(9), 33\u201338 (1994)","journal-title":"IEEE Communications"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022, 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"29_CR14","unstructured":"EU Directive 1999\/93 on Electronic Signatures ETSI TS 111 456 for Qualified Certificates"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/BFb0054012","volume-title":"Public Key Cryptography","author":"T. Satoh","year":"1998","unstructured":"Satoh, T., Araki, K., Miura, S.: Overview of elliptic curve cryptography. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol.\u00a01431, pp. 29\u201349. Springer, Heidelberg (1998)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Gupta, V., Gupta, S., Chang, S.: Performance Analysis of Elliptic Curve Cryptography for SSL. In: ACM Workshop on Wireless Security (WiSe), Mobicom 2002, Atlanta, Georgia, USA (September 2002) (retrieved June 10, 2003), from http:\/\/research.sun.com\/projects\/crypto\/performance.pdf","DOI":"10.1145\/570681.570691"},{"key":"29_CR17","unstructured":"Aydos, M., Yan\u0131k, T., Ko\u00e7, \u00c7.: An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. In: Annual Computer Security Applications Conference, New Orleans (2000) (retreived June 10, 2003), from http:\/\/acsac.org\/2000\/papers\/24.pdf"},{"key":"29_CR18","unstructured":"Woodbury, A.: Efficient Algorithms for Elliptic Curve Cryptosystems on Embedded Systems, Worcester Polytechnic Institue, Massachusetts (retrieved June 10, 2003), from http:\/\/www.wpi.edu\/Pubs\/ETD\/Available\/etd-1001101-195321\/unrestricted\/woodbury.pdf"},{"key":"29_CR19","unstructured":"International Organisation for Standardization, ISO\/IEC 7816-3:1997: Information technology \u2013 Identification cards \u2013 Integrated circuit(s) cards with contacts \u2013 Part 3: Electronic signals and transmission protocols, Geneva (1997)"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Santesson, S., et al.: RFC 3039: Internet X.509 Public Key Infrastructure Qualified Certificates Profile (January 2001) (retreived April 3, 2003), from http:\/\/www.ietf.org\/rfc\/rfc3039.txt","DOI":"10.17487\/rfc3039"}],"container-title":["Lecture Notes in Computer Science","Management of Multimedia Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39404-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:35:07Z","timestamp":1559208907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39404-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540200505","9783540394044"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39404-4_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}