{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:31:37Z","timestamp":1743132697397,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_10","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"126-139","source":"Crossref","is-referenced-by-count":1,"title":["Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol"],"prefix":"10.1007","author":[{"given":"Talal","family":"Alharbi","sequence":"first","affiliation":[]},{"given":"Abdullah","family":"Almuhaideb","sequence":"additional","affiliation":[]},{"given":"Phu Dung","family":"Le","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Ahonen, T.T., Moore, A.: Putting 2.7 billion in context: Mobile phone users. Communities Dominate Brands\u00a02010 (2007)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Shrestha, A., Choi, D., Kwon, G., Han, S.: Kerberos based authentication for inter-domain roaming in wireless heterogeneous network. Computers & Mathematics with Applications (2010)","DOI":"10.1016\/j.camwa.2010.01.019"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Y., Chuang, S., Yeh, L., Huang, J.: A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing (2010)","DOI":"10.1002\/wcm.933"},{"key":"10_CR4","unstructured":"Wuu, L., Hung, C.: Anonymous Roaming Authentication Protocol with ID-Based Signatures (2006)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Computer Communications (2010)","DOI":"10.1016\/j.comcom.2010.02.031"},{"key":"10_CR6","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TCE.2004.1277867","volume":"50","author":"J. Zhu","year":"2004","unstructured":"Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics\u00a050, 231\u2013235 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C. Lee","year":"2006","unstructured":"Lee, C., Hwang, M., Liao, I.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics\u00a053, 1683\u20131687 (2006)","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Wu, C., Lee, W., Tsaur, W.: A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters\u00a012 (2008)","DOI":"10.1109\/LCOMM.2008.080283"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Zeng, P., Cao, Z., Choo, K., Wang, S.: On the anonymity of some authentication schemes for wireless communications. IEEE Commun. Lett. 13 (2009)","DOI":"10.1109\/LCOMM.2009.081821"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Chang, C., Lee, C., Lee, W.: Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications. IEEE, 902\u2013904 (2009)","DOI":"10.1109\/IIH-MSP.2009.172"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1016\/j.comcom.2008.11.032","volume":"32","author":"C. Chang","year":"2009","unstructured":"Chang, C., Lee, C., Chiu, Y.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications\u00a032, 611\u2013618 (2009)","journal-title":"Computer Communications"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:16:54Z","timestamp":1566764214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}