{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:45:50Z","timestamp":1725594350762},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221842"},{"type":"electronic","value":"9783642221859"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22185-9_1","type":"book-chapter","created":{"date-parts":[[2011,6,30]],"date-time":"2011-06-30T07:24:50Z","timestamp":1309418690000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions"],"prefix":"10.1007","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[]},{"given":"William Emmanuel","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"SMS (Short Message Service), http:\/\/www.gsmworld.com\/yechnology\/sms"},{"key":"1_CR2","unstructured":"Information Technology-Security Techniques-Code of Practice for Information Security Management, geneva (2005)"},{"key":"1_CR3","unstructured":"SMS is top service for Asian mobile phone users (March 2006)"},{"key":"1_CR4","unstructured":"Botan cryptography library (2010), http:\/\/botan.randombit.net\/"},{"key":"1_CR5","unstructured":"Python Programming Language (2010), http:\/\/www.python.org\/"},{"key":"1_CR6","unstructured":"3rd Generation Partnership Project: GSM 03.40: Digital cellular telecommunications system (Phase 2+). Technical Realization of the Short Message Service, SMS (2001)"},{"issue":"1","key":"1_CR7","first-page":"1","volume":"1","author":"A. Moh\u2019d","year":"2010","unstructured":"Moh\u2019d, A., Nauman Aslam, H.M.L.T.: Hardware Implementations of Secure Hashing Functions on FPGAs for WSNs. Journal of Networking Technology\u00a01(1), 1\u201343 (2010)","journal-title":"Journal of Networking Technology"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Barkan, E., Eli, B.: Conditional Estimators: An Effective Attack on A5\/1, pp. 1\u201319 (2005)","DOI":"10.1007\/11693383_1"},{"issue":"4","key":"1_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M. Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology\u00a021(4), 469\u2013491 (2008)","journal-title":"Journal of Cryptology"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-25937-4_25","volume-title":"Fast Software Encryption","author":"M. Bellare","year":"2004","unstructured":"Bellare, M., Rogaway, P., Wagner, D.: The EAX mode of operation. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 389\u2013407. Springer, Heidelberg (2004)"},{"issue":"4","key":"1_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M.N.C. Bellare","year":"2008","unstructured":"Bellare, M.N.C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology\u00a021(4), 469\u2013491 (2008)","journal-title":"Journal of Cryptology"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Biham, E., Orr, D.: Cryptanalysis of the A5\/1 GSM Stream Cipher, 43\u201351 (2000)","DOI":"10.1007\/3-540-44495-5_5"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Biham, E., Orr, D.: Cryptanalysis of the A5\/1 GSM Stream Cipher. Indocrypt (2000)","DOI":"10.1007\/3-540-44495-5_5"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Adi, S., Wagner, D.: Real Time Cryptanalysis of A5\/1 on a PC. Encryption-FSE, 1\u201318 (2000)","DOI":"10.1007\/3-540-44706-7_1"},{"key":"1_CR15","unstructured":"Dye, M.S.: End-to-End M2M (Sample\/Excerpts Copy only - Not Full Report)."},{"issue":"1","key":"1_CR16","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TIT.2002.806129","volume":"49","author":"P. Ekdahl","year":"2003","unstructured":"Ekdahl, P., Thomas, J.: Another attack on A5\/1. IEEE Transactions On Information Theory\u00a049(1), 284\u2013289 (2003)","journal-title":"IEEE Transactions On Information Theory"},{"key":"1_CR17","unstructured":"Elad, B., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication by Barkan and Biham of Technion, Full Version (2006)"},{"key":"1_CR18","first-page":"390","volume":"5","author":"T. Elgamal","year":"1997","unstructured":"Elgamal, T., Hickman, K.: Secure socket layer application program apparatus and method. US Patent\u00a05, 390\u2013657 (1997)","journal-title":"US Patent"},{"issue":"5\u20136","key":"1_CR19","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.cose.2008.05.003","volume":"27","author":"J. Lo","year":"2008","unstructured":"Lo, J., Binshop, J., Eloff, J.: SMSSec: an end-to-end protocol for secure SMS. Computers and Security\u00a027(5\u20136), 154\u2013167 (2008)","journal-title":"Computers and Security"},{"key":"1_CR20","unstructured":"LORD, S.: Trouble at Telco: When GSM Goes Bad. 1, 10\u201312 (2003)"},{"key":"1_CR21","unstructured":"Lucero, S.: Maximizing Mobile Operator Opportunities in M2M (2010)"},{"issue":"1","key":"1_CR22","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TIT.2002.806129","volume":"49","author":"E. Patrik","year":"2003","unstructured":"Patrik, E., Johansson, T.: Another attack on A5\/1. IEEE Transactions on Information Theory\u00a049(1), 284\u2013289 (2003) doi:10.1109\/TIT.2002.806129","journal-title":"IEEE Transactions on Information Theory"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM\u00a021 (1978)","DOI":"10.21236\/ADA606588"},{"key":"1_CR24","unstructured":"Schmidt, M.: Consistent M-Commerce Security on Top of GSM-based Data Protocols-A security Analysis (2001)"},{"key":"1_CR25","unstructured":"Yu, W.: New Botan, the C++ Crypto Library, built for Fedora 13 with Python Bindings Enabled and the RSA-PrivateKey fix (August 2010), http:\/\/hip2b2.yutivo.org\/2010\/08\/23\/botan-patch\/"},{"key":"1_CR26","unstructured":"Yu, W., Tagle, P.: Development of an Over-the-Top Network Protocol for Pervasive, Secure and Reliable Data Transmission over GSM Short Messaging Service. In: To be presented at the 2010 International Conference on Computer and Software Modeling (ICCSM 2010),IACSIT (2010)"}],"container-title":["Communications in Computer and Information Science","Networked Digital Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22185-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T11:16:56Z","timestamp":1560338216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22185-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221842","9783642221859"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22185-9_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}