{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:42Z","timestamp":1725548322251},"publisher-location":"Berlin, Heidelberg","reference-count":47,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_29","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T11:44:00Z","timestamp":1266839040000},"page":"603-630","source":"Crossref","is-referenced-by-count":0,"title":["Security and Quality of Service in Wireless Networks"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Birkos","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Theofilos","family":"Chrysikos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stavros","family":"Kotsopoulos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ioannis A.","family":"Maniatis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"29_CR1","volume-title":"Wireless Security and Privacy: Best Practices and Design Techniques","author":"T.M. Swaminatha","year":"2002","unstructured":"T.M.\u00a0Swaminatha, C.R.\u00a0Elden: Wireless Security and Privacy: Best Practices and Design Techniques (Addison Wesley, Boston, USA 2002)"},{"key":"29_CR2","volume-title":"GSM System Engineering","author":"A. Mehrotra","year":"1997","unstructured":"A.\u00a0Mehrotra: GSM System Engineering (Artech House, Norwood, USA 1997)"},{"key":"29_CR3","volume-title":"GSM and Personal Communications Handbook","author":"S.M. Pedl","year":"1998","unstructured":"S.M.\u00a0Pedl, M.K.\u00a0Weber, M.W.\u00a0Oliphant: GSM and Personal Communications Handbook (Artech House, Norwood, USA 1998)"},{"key":"29_CR4","volume-title":"Bulletproof Wireless Security-GSM, UMTS, 802.11 and AdHoc Security","author":"P. Chandra","year":"2005","unstructured":"P.\u00a0Chandra: Bulletproof Wireless Security-GSM, UMTS, 802.11 and AdHoc Security (Elsevier, Newnes 2005)"},{"key":"29_CR5","doi-asserted-by":"crossref","DOI":"10.1002\/047001105X","volume-title":"UMTS Networks-Architecture, Mobility and Services","author":"H. Kaaranen","year":"2005","unstructured":"H.\u00a0Kaaranen, A.\u00a0Ahtiainen, L.\u00a0Laitinen, S.\u00a0Naghian, V.\u00a0Niemi: UMTS Networks-Architecture, Mobility and Services (Wiley, New York, USA 2005)"},{"key":"29_CR6","unstructured":"W. Granzow: 3rd Generation Mobile Communications Systems, Ericsson Eurolab Deutschland (2000)"},{"key":"29_CR7","unstructured":"R.\u00a0Nichols, P.\u00a0Lekkas: Wireless Security-Models, Threats and Solutions (McGraw-Hill, 2002)"},{"key":"29_CR8","volume-title":"Wireless Security Handbook","author":"A.E. Earle","year":"2006","unstructured":"A.E.\u00a0Earle: Wireless Security Handbook (Auerbach Publications, Boca Raton, USA 2006)"},{"key":"29_CR9","doi-asserted-by":"crossref","DOI":"10.1002\/9780470319055","volume-title":"WiMAX-Technology for Broadband Wireless Access","author":"L. Nuaymi","year":"2007","unstructured":"L.\u00a0Nuaymi: WiMAX-Technology for Broadband Wireless Access (Wiley, West Sussex, UK 2007)"},{"issue":"6","key":"29_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W.\u00a0Diffie, M.\u00a0Hellman: New directions in cryptography, IEEE Trans. Inf. Theory 22(6), 644\u2013652 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"29_CR11","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"29","author":"C.E. Shannon","year":"1949","unstructured":"C.E.\u00a0Shannon: Communication theory of secrecy systems, Bell Syst. Tech. J. 29, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"29_CR12","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A.D. Wyner","year":"1975","unstructured":"A.D.\u00a0Wyner: The wire-tap channel, Bell Syst. Tech. J. 54, 1355\u20131387 (1975)","journal-title":"Bell Syst. Tech. J."},{"issue":"3","key":"29_CR13","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csiszar","year":"1978","unstructured":"I.\u00a0Csiszar, J.\u00a0Korner: Broadcast channels with confidential messages, IEEE Trans. Inf. Theory 24(3), 339\u2013348 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"29_CR14","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"S.K. Leung-Yan-Cheong","year":"1978","unstructured":"S.K. Leung-Yan-Cheong, M.E. Hellman: The Gaussian wiretap channel, IEEE Trans. Inf. Theory 24(4), 451\u2013456 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"29_CR15","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U.M. Maurer","year":"1993","unstructured":"U.M.\u00a0Maurer: Secret key agreement by public discussion from common information, IEEE Trans. Inf. Theory 39(3), 733\u2013742 (1993)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/3-540-69053-0_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT \u201997","author":"U.M. Maurer","year":"1997","unstructured":"U.M.\u00a0Maurer: Information-theoretically secure secret-key agreement by NOT authenticated public discussion. In: Advances in Cryptology \u2013 EUROCRYPT \u201997, Lecture Notes in Computer Science, Vol. 1233, ed. by W.\u00a0Fumy (Springer, Berlin Heidelberg 1997) pp. 209\u2013225"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2000","author":"U.M. Maurer","year":"2000","unstructured":"U.M.\u00a0Maurer, S.\u00a0Wolf: Information-theoretic key agreement: from weak to strong secrecy for free. In: Advances in Cryptology \u2013 EUROCRYPT 2000, Lecture Notes in Computer Science, Vol. 1807, ed. by B.\u00a0Preneel (Springer, Berlin Heidelberg 2000) pp. 351\u2013368"},{"issue":"4","key":"29_CR18","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1109\/TIT.2003.809563","volume":"49","author":"U.M. Maurer","year":"2003","unstructured":"U.M.\u00a0Maurer, S.\u00a0Wolf: Secret-key agreement over unauthenticated public channels \u2013 Part I: Definitions and a completeness result, IEEE Trans. Inf. Theory 49(4), 822\u2013831 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"29_CR19","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1109\/TIT.2003.809560","volume":"49","author":"U.M. Maurer","year":"2003","unstructured":"U.M.\u00a0Maurer, S.\u00a0Wolf: Secret-key agreement over unauthenticated public channels \u2013 Part II: The simulatability condition, IEEE Trans. Inf. Theory 49(4), 832\u2013838 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"29_CR20","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1109\/TIT.2003.809559","volume":"49","author":"U.M. Maurer","year":"2003","unstructured":"U.M.\u00a0Maurer, S.\u00a0Wolf: Secret-key agreement over unauthenticated public channels \u2013 Part III: Privacy Amplification, IEEE Trans. Inf. Theory 49(4), 839\u2013851 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"29_CR21","unstructured":"A.\u00a0Sayeed, A.\u00a0Perrig: Secure Wireless Communications: Secret Keys through Multipath, Proc. IEEE 2008 Conference on Acoustics, Speech and Signal Processing (2008) pp. 3013\u20133016"},{"key":"29_CR22","unstructured":"J.\u00a0Barros, M.\u00a0Bloch: Strong Secrecy for Wireless Channels, Int. Conference on Information-Theoretic Security, Calgary (2008)"},{"key":"29_CR23","volume-title":"Radio Wave Propagation for Telecommunication Applications","author":"H. Sizun","year":"2005","unstructured":"H.\u00a0Sizun: Radio Wave Propagation for Telecommunication Applications (Springer, Berlin Heidelberg 2005)"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"J.\u00a0Barros, M.R.D.\u00a0Rodrigues: Secrecy capacity of wireless channels, Proc. IEEE Int. Symposium on Information Theory (ISIT), Seattle (2006)","DOI":"10.1109\/ISIT.2006.261613"},{"key":"29_CR25","unstructured":"M.\u00a0Bloch, J.\u00a0Barros, M.R.D.\u00a0Rodrigues, S.W.\u00a0McLaughlin: An opportunistic physical-layer approach to secure wireless communications, Proc. 44th Allerton Conference on Communication Control and Computing, Allerton (2006)"},{"key":"29_CR26","unstructured":"M. Bloch, J. Barros, M.R.D. Rodrigues, S.W.\u00a0McLaughlin: Wireless Information-Theoretic Security \u2013 Part I: Theoretical Aspects (2006), available at http:\/\/arxiv.org\/abs\/CS\/0611120v1"},{"key":"29_CR27","unstructured":"M. Bloch, J. Barros, M.R.D. Rodrigues, S.W.\u00a0McLaughlin: Wireless Information-Theoretic Security \u2013 Part II: Practical Implementation (2006), available at http:\/\/arxiv.org\/abs\/CS\/0611121v1"},{"key":"29_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/0471743690","volume-title":"Introduction to RF Propagation","author":"J.S. Seybold","year":"2005","unstructured":"J.S.\u00a0Seybold: Introduction to RF Propagation (Wiley Interscience, Hoboken, NJ 2005)"},{"key":"29_CR29","unstructured":"A. Aguiar, J. Gross: Wireless Channel Models, Telecommunication Networks Group, Technical University Berlin, April 2003, Berlin"},{"key":"29_CR30","volume-title":"Wireless Communications: Principles and Practice","author":"T. Rappaport","year":"2001","unstructured":"T.\u00a0Rappaport: Wireless Communications: Principles and Practice, 2nd edn. (Prentice Hall, Upper Saddle River, NJ 2001)","edition":"2"},{"key":"29_CR31","unstructured":"T. Chrysikos, G. Georgopoulos, K. Birkos, S. Kotsopoulos: Wireless Channel Characterization: On the validation issues of indoor RF models at 2.4 GHz, Pacet (Panhellenic Congress of Electronics and Communications), Patras, Greece, March 20\u201322 (2009)"},{"issue":"25","key":"29_CR32","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/TCOM.1977.1093888","volume":"7","author":"H. Suzuki","year":"1977","unstructured":"H.\u00a0Suzuki: A statistical model for urban radio propagation, IEEE Trans. Commun. 7(25), 673\u2013680 (1977)","journal-title":"IEEE Trans. Commun."},{"key":"29_CR33","doi-asserted-by":"publisher","first-page":"2470","DOI":"10.1109\/TIT.2008.921678","volume":"54","author":"Y. Liang","year":"2008","unstructured":"Y.\u00a0Liang, H.V.\u00a0Poor, S.\u00a0Shamai: Secure communication over fading channels, IEEE Trans. Inf. Theory 54, 2470\u20132492 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"29_CR34","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815102","volume-title":"Security and Cooperation in Wireless Networks-Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing","author":"L. Buttyan","year":"2007","unstructured":"L.\u00a0Buttyan, J.\u00a0Hubaux: Security and Cooperation in Wireless Networks-Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing (Cambridge Univ. Press, Cambridge 2007)"},{"key":"29_CR35","doi-asserted-by":"publisher","first-page":"1693","DOI":"10.1016\/j.comnet.2008.02.012","volume":"52","author":"M. Shi","year":"2008","unstructured":"M.\u00a0Shi, X.\u00a0Shen, J.W.\u00a0Mark, D.\u00a0Zhao, Y.\u00a0Jiang: User authentication and undeniable billing support for agent-based roaming service in WLAN\/cellular integrated mobile networks, Comput. Netw. 52, 1693\u20131702 (2008)","journal-title":"Comput. Netw."},{"key":"29_CR36","unstructured":"S.\u00a0Lin, O.\u00a0Yi, C.\u00a0Jung, K.\u00a0Bang: A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro, COMSWARE 2007 (2007) pp. 1\u20137"},{"issue":"9B","key":"29_CR37","first-page":"138","volume":"6","author":"P. Kim","year":"2006","unstructured":"P.\u00a0Kim, Y.\u00a0Kim: New authentication mechanism for vertical handovers between IEEE 802.16e and 3G wireless networks, Int. J. Comput. Sci. Net. Secur. 6(9B), 138\u2013142 (2006)","journal-title":"Int. J. Comput. Sci. Net. Secur."},{"key":"29_CR38","unstructured":"V.K.\u00a0Gondi, N.\u00a0Agoulmine: Secured Roaming Over WLAN and WIMAX Networks, IEEE\/IFIP Int. Workshop on Broadband Convergence Networks (2007) pp. 1\u201312"},{"key":"29_CR39","unstructured":"N.\u00a0Krichene, N.\u00a0Boudriga: Securing Roaming and Vertical Handover between Mobile WiMAX and UMTS, New Technologies, Mobility and Security (2008) pp. 1\u20135"},{"key":"29_CR40","unstructured":"H.\u00a0Wang, A.R.\u00a0Prasad: Security Context Transfer in Vertical Handover, PIMRC 2003, Vol. 3 (2003) pp. 2775\u20132779"},{"key":"29_CR41","doi-asserted-by":"crossref","unstructured":"H.\u00a0Wang, A.R.Prasad: Fast Authentication for Inter-domain Handover, Telecommunications and Networking \u2013 ICT 2004 (Springer, 2004) pp. 973\u2013982","DOI":"10.1007\/978-3-540-27824-5_127"},{"key":"29_CR42","unstructured":"X.\u00a0Fu, D.\u00a0Hogrefe, S.\u00a0Narayanan, R.\u00a0Soltwisch: QoS and Security in 4G Networks, Proc. 1st Annual Global Mobile Congress (2004)"},{"key":"29_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/11552055_22","volume-title":"Communication and Multimedia Security","author":"M. Lee","year":"2005","unstructured":"M.\u00a0Lee, S.\u00a0Park: A secure context management for QoS-aware vertical handovers in 4G networks. In: Communication and Multimedia Security, Lecture Notes in Computer Science, Vol. 3677, ed. by G.\u00a0Goos, J.\u00a0Hartmanis, J.\u00a0van Leeuwen (Springer, Heidelberg, Germany 2005) pp. 220\u2013229"},{"key":"29_CR44","unstructured":"X. Fu, T. Chen, A. Festag, G. Schafer, H. Karl: SeQoMo architecture: Interactions of security, QoS and mobility components, TKN Technical Reports Series, TKN-02-008"},{"key":"29_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1007\/11496618_29","volume-title":"Information Security and Cryptology \u2013 ICISC\u20192004","author":"M. Lee","year":"2005","unstructured":"M.\u00a0Lee, J.\u00a0Kim, S.\u00a0Park: A location-aware secure interworking architecture between 3GPP and WLAN systems. In: Information Security and Cryptology \u2013 ICISC\u20192004, Lecture Notes in Computer Science, Vol. 3506, ed. by G.\u00a0Goos, J.\u00a0Hartmanis, J.\u00a0van Leeuwen (Springer, Heidelberg, Germany 2005) pp. 394\u2013406"},{"key":"29_CR46","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1016\/j.jpdc.2007.05.009","volume":"67","author":"A. Gupta","year":"2007","unstructured":"A.\u00a0Gupta, A.\u00a0Mukherjee, B.\u00a0Xie, D.P.\u00a0Agrawal: Decentralized key generation scheme for cellular-based heterogeneous wireless Adhoc Networks, J.\u00a0Parallel Distrib. Comput. 67, 981\u2013991 (2007)","journal-title":"J. Parallel Distrib. Comput."},{"key":"29_CR47","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/TNET.2004.833129","volume":"12","author":"Y. Sun","year":"2004","unstructured":"Y.\u00a0Sun, W.\u00a0Trappe, K.J.R.\u00a0Liu: A scalable multicast key management scheme for heterogeneous wireless Networks, IEEE Trans. Netw. 12, 653\u2013666 (2004)","journal-title":"IEEE Trans. Netw."}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T08:09:09Z","timestamp":1685434149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_29","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}