{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:57Z","timestamp":1725558717281},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208303"},{"type":"electronic","value":"9783540398714"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39871-4_4","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T19:33:06Z","timestamp":1277839986000},"page":"20-33","source":"Crossref","is-referenced-by-count":1,"title":["Is Entity Authentication Necessary?"],"prefix":"10.1007","author":[{"given":"Chris J.","family":"Mitchell","sequence":"first","affiliation":[]},{"given":"Paulo S.","family":"Pagliusi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"4_CR2","first-page":"385","volume-title":"GSM and UMTS: The creation of global mobile communication","author":"M. Walker","year":"2002","unstructured":"Walker, M., Wright, T.: Security. In: Hillebrand, F. (ed.) GSM and UMTS: The creation of global mobile communication, pp. 385\u2013406. John Wiley & Sons, Chichester (2002)"},{"key":"4_CR3","volume-title":"Secure communications: Applications and management","author":"R. Sutton","year":"2002","unstructured":"Sutton, R.: Secure communications: Applications and management. John Wiley & Sons, Chichester (2002)"},{"key":"4_CR4","unstructured":"Mitchell, C.: The security of the GSM air interface protocol. Technical Report RHUL-MA-2001-3, Mathematics Department, Royal Holloway, University of London, Egham, Surrey TW20 0EX, UK (2001), Available at \n                  \n                    http:\/\/www.ma.rhul.ac.uk\/techreports"},{"key":"4_CR5","unstructured":"Third Generation Partnership Project: 3GPP TS 33.102: Security Architecture. V3.11.0 edn, Technical Specification Group Services and System Aspects, 3G Security, Valbonne, France (2002)"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/506117.506124","volume":"34","author":"C. Mitchell","year":"2000","unstructured":"Mitchell, C.: Making serial number based authentication robust against loss of state. ACM Operating Systems Review\u00a034, 56\u201359 (2000)","journal-title":"ACM Operating Systems Review"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39871-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T05:33:38Z","timestamp":1552628018000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39871-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208303","9783540398714"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39871-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}