{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:55:03Z","timestamp":1725530103648},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642008429"},{"type":"electronic","value":"9783642008436"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00843-6_21","type":"book-chapter","created":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T10:42:08Z","timestamp":1238582528000},"page":"230-244","source":"Crossref","is-referenced-by-count":7,"title":["An Extended Authentication and Key Agreement Protocol of UMTS"],"prefix":"10.1007","author":[{"given":"Farshid","family":"Farhat","sequence":"first","affiliation":[]},{"given":"Somayeh","family":"Salimi","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Salahi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"3GPP TS 33.102 V8.0.0 (2008-06), 3GPP Technical Specification Group Services and System Aspects, 3G Security, Security Architecture (Release 8)"},{"key":"21_CR2","unstructured":"3GPP TS 35.206 V7.0.0 (2007-06), Technical Specification Group Services and System Aspects, 3G Security, Algorithm Specification (Release 7)"},{"key":"21_CR3","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W. Stallings","year":"1998","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice-Hall, Englewood Cliffs (1998)"},{"key":"21_CR4","unstructured":"National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES), Federal Information Processing Standards Publications (FIPS PUBS) 197 (2001)"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11506447_1","volume-title":"Advanced Encryption Standard \u2013 AES","author":"H. Dobbertin","year":"2005","unstructured":"Dobbertin, H., Knudsen, L., Robshaw, M.: The cryptanalysis of the AES - A brief survey. In: Dobbertin, H., Rijmen, V., Sowa, A. (eds.) AES 2005. LNCS, vol.\u00a03373, pp. 1\u201310. Springer, Heidelberg (2005)"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C.E. Shannon","year":"1948","unstructured":"Shannon, C.E.: A Mathematical Theory of Communication. The Bell System Technical Journal\u00a027, 379\u2013423, 623\u2013656 (1948)","journal-title":"The Bell System Technical Journal"},{"key":"21_CR7","unstructured":"Huang, C.M., Li, J.W.: Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (2005)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Juang, W.S., Wu, J.L.: Efficient 3GPP Authentication and Key Agreement with Robust User Privacy Protection. In: IEEE Communications Society. Proceedings of the WCNC (2007)","DOI":"10.1109\/WCNC.2007.505"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Al-Saraireh, J., Yousef, S.: A New Authentication Protocol for UMTS Mobile Networks. EURASIP Journal on Wireless Communications and Networking, Article ID 98107, 1\u201310 (2006)","DOI":"10.1155\/WCN\/2006\/98107"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Meyer, U., Wetzel, S.: A Man-in-the-Middle Attack on UMTS. In: Proceedings of the 3rd ACM workshop on Wireless security, pp. 90\u201397 (2004) ISBN:1-58113-925-X","DOI":"10.1145\/1023646.1023662"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Harn, L., Hsin, W.J.: On the Security of Wireless Network Access with Enhancements. In: Proceedings of the 2nd ACM workshop on Wireless security, pp. 88\u201395 (2003) ISBN:1-58113-769-9","DOI":"10.1145\/941311.941325"},{"issue":"1","key":"21_CR12","first-page":"109","volume":"1","author":"J. AL-Saraireh","year":"2006","unstructured":"AL-Saraireh, J., Yousef, S.: Extension of Authentication and Key Agreement Protocol (AKA) for Universal Mobile Telecommunication System (UMTS). International Journal of Theoretical and Applied Computer Sciences\u00a01(1), 109\u2013118 (2006)","journal-title":"International Journal of Theoretical and Applied Computer Sciences"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, M., Fang, Y.: Security Analysis and Enhancements of 3GPP: Authentication and Key Agreement Protocol. IEEE Transactions on Wireless Communications\u00a04(2) (March 2005)","DOI":"10.1109\/TWC.2004.842941"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00843-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T03:14:22Z","timestamp":1558235662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00843-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642008429","9783642008436"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00843-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}