{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:35:09Z","timestamp":1725600909768},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642232992"},{"type":"electronic","value":"9783642233005"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23300-5_20","type":"book-chapter","created":{"date-parts":[[2011,8,17]],"date-time":"2011-08-17T12:34:23Z","timestamp":1313584463000},"page":"255-270","source":"Crossref","is-referenced-by-count":0,"title":["A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks"],"prefix":"10.1007","author":[{"given":"Fang-Yie","family":"Leu","sequence":"first","affiliation":[]},{"given":"Yi-Fu","family":"Ciou","sequence":"additional","affiliation":[]},{"given":"Yi-Li","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.20","volume":"2","author":"D. Johnston","year":"2004","unstructured":"Johnston, D., Walker, J.: Overview of IEEE 802.16 security. IEEE Security & Privacy\u00a02, 40\u201348 (2004)","journal-title":"IEEE Security & Privacy"},{"key":"20_CR2","unstructured":"WiMAX Forum Network Architecture. Stage 2: Architecture Tenets, Reference Model and Reference Points - Part 2, pp. 167. WiMAX Forum (2009)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Leu, F.Y., Huang, Y.F., Chiu, C.H.: Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS. In: Conference Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS, pp. 391\u2013397 (2010)","DOI":"10.1109\/CISIS.2010.28"},{"key":"20_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-68192-4","volume-title":"Mobile broadband including WiMAX and LTE","author":"M. Ergen","year":"2009","unstructured":"Ergen, M.: Mobile broadband including WiMAX and LTE. Springer Science+Business Media, LLC, Boston (2009)"},{"key":"20_CR5","first-page":"16","volume":"1","author":"C.J. Bernardos","year":"2010","unstructured":"Bernardos, C.J., Gramaglia, M., Contreras, L.M., Calderon, M., Soto, I.: Network-based Localized IP mobility Management: Proxy Mobile IPv6 and Current Trends in Standardization. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a01, 16\u201335 (2010)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"20_CR6","first-page":"52","volume":"1","author":"Z. Yan","year":"2010","unstructured":"Yan, Z., Zhou, H., You, I.: N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\u00a01, 52\u201370 (2010)","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). RFC. Internet Engineering Task Force: Network Working Group (2006)","DOI":"10.17487\/rfc4187"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. Elgamal","year":"1985","unstructured":"Elgamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE T. Inform Theory\u00a031, 469\u2013472 (1985)","journal-title":"IEEE T. Inform Theory"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security for Business, Enterprise and Health Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23300-5_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T21:01:56Z","timestamp":1686258116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23300-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642232992","9783642233005"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23300-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}