{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:10:56Z","timestamp":1725725456624},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_83","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T11:40:44Z","timestamp":1367667644000},"page":"752-760","source":"Crossref","is-referenced-by-count":1,"title":["Improved Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks"],"prefix":"10.1007","author":[{"given":"Youngseok","family":"Chung","sequence":"first","affiliation":[]},{"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"83_CR1","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TCE.2004.1277867","volume":"50","author":"J. Zhu","year":"2004","unstructured":"Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics\u00a050(1), 231\u2013235 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"5","key":"83_CR2","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C.C. Lee","year":"2006","unstructured":"Lee, C.C., Hwang, M.S., Lio, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronic\u00a053(5), 1683\u20131687 (2006)","journal-title":"IEEE Transactions on Industrial Electronic"},{"issue":"10","key":"83_CR3","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/LCOMM.2008.080283","volume":"12","author":"C.C. Wu","year":"2008","unstructured":"Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letter\u00a012(10), 722\u2013723 (2008)","journal-title":"IEEE Communications Letter"},{"issue":"1-2","key":"83_CR4","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.mcm.2011.04.036","volume":"55","author":"H. Mun","year":"2012","unstructured":"Mun, H., Han, K., Lee, Y.S., Yeun, C.Y., Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling\u00a055(1-2), 214\u2013222 (2012)","journal-title":"Mathematical and Computer Modelling"},{"issue":"1","key":"83_CR5","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1093\/ietfec\/e90-a.1.299","volume":"E90-A","author":"J. Nam","year":"2007","unstructured":"Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences\u00a0E90-A(1), 299\u2013302 (2007)","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"83_CR6","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1016\/j.comcom.2008.11.032","volume":"32","author":"C.C. Chang","year":"2009","unstructured":"Chang, C.C., Lee, C.Y., Chiu, Y.C.: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications\u00a032, 611\u2013618 (2009)","journal-title":"Computer Communications"},{"issue":"7","key":"83_CR7","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/LCOMM.2009.090488","volume":"13","author":"T.Y. Youn","year":"2009","unstructured":"Youn, T.Y., Park, Y.H., Lim, J.: Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letter\u00a013(7), 471\u2013473 (2009)","journal-title":"IEEE Communications Letter"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_83","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T17:49:33Z","timestamp":1557683373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_83","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}