{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:51:01Z","timestamp":1725745861378},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405105"},{"type":"electronic","value":"9783642405112"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40511-2_14","type":"book-chapter","created":{"date-parts":[[2013,8,18]],"date-time":"2013-08-18T21:53:28Z","timestamp":1376862808000},"page":"195-207","source":"Crossref","is-referenced-by-count":1,"title":["GPRS Security for Smart Meters"],"prefix":"10.1007","author":[{"given":"Martin Gilje","family":"Jaatun","sequence":"first","affiliation":[]},{"given":"Inger Anne","family":"T\u00f8ndel","sequence":"additional","affiliation":[]},{"given":"Geir M.","family":"K\u00f8ien","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"T\u00f8ndel, I.A., Jaatun, M.G., Line, M.B.: Threat Modeling of AMI. In: Proceedings of the 7th International Conference on Critical Information Infrastructures Security, CRITIS 2012 (2012)","DOI":"10.1007\/978-3-642-41485-5_23"},{"key":"14_CR2","unstructured":"Telenor: Smart metering white paper \u2013 Best practices recommendation by Telenor Connexion (2013)"},{"issue":"4","key":"14_CR3","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MIE.2012.2207489","volume":"6","author":"V. Gungor","year":"2012","unstructured":"Gungor, V., Sahin, D., Kocak, T., Ergut, S., Buccella, C., Cecati, C., Hancke, G.: Smart grid and smart homes: Key players and pilot projects. IEEE Industrial Electronics Magazine\u00a06(4), 18\u201334 (2012)","journal-title":"IEEE Industrial Electronics Magazine"},{"key":"14_CR4","unstructured":"3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and system Aspects; Security related network functions (Release 12), 3GPP TS 43.020 V12.0.0 (2013)"},{"key":"14_CR5","unstructured":"SDA: Smartcard Developer Association Clones Digital GSM Cellphones (1998), \n                      \n                        http:\/\/www.isaac.cs.berkeley.edu\/isaac\/gsm-press.html"},{"key":"14_CR6","unstructured":"Rao, J.R., Rohatgi, P., Scherzer, H., Tinguely, S.: Partitioning attacks: or how to rapidly clone some gsm cards. In: Proceedings of 2002 IEEE Symposium on Security and Privacy, pp. 31\u201341 (2002)"},{"key":"14_CR7","unstructured":"3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Specification of the GSM-MILENAGE Algorithms: An example algorithm set for the GSM authentication and key generation functions A3 and A8 (Release 8), 3GPP TS 55.205 V8.0.0 (2008)"},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MWC.2004.1269712","volume":"11","author":"G.M. K\u00f8ien","year":"2004","unstructured":"K\u00f8ien, G.M.: An introduction to access security in UMTS. IEEE Wireless Communications\u00a011(1), 8\u201318 (2004)","journal-title":"IEEE Wireless Communications"},{"key":"14_CR9","unstructured":"Niemi, V., Nyberg, K.: UMTS security. John Wiley & Sons (2003)"},{"key":"14_CR10","unstructured":"3GPP: Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security architecture (Release 11), 3GPP TS 33.102 V11.0.0 (2012)"},{"key":"14_CR11","unstructured":"3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General (Release 1999), 3GPP TS 35.205 V3.0.0 (2001)"},{"key":"14_CR12","unstructured":"3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Digital cellular telecommunications system (Phase 2+); General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements (Release 4), 3GPP TS 41.061 V4.0.0 (2002)"},{"issue":"2","key":"14_CR13","first-page":"158","volume":"6","author":"C. Xenakis","year":"2008","unstructured":"Xenakis, C.: Security measures and weaknesses of the gprs security architecture. International Journal of Network Security\u00a06(2), 158\u2013169 (2008)","journal-title":"International Journal of Network Security"},{"key":"14_CR14","unstructured":"3GPP: Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Network Domain Security (NDS); IP network layer security (Release 12), 3GPP TS 33.210 V12.0.0 (2012)"},{"key":"14_CR15","unstructured":"3GPP: 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Closed User Group (CUG) Supplementary Services - Stage 1 (Release 9), 3GPP TS 22.085 V9.0.0 (2009)"},{"key":"14_CR16","unstructured":"Mitchell, C.J.: The security of the GSM air interface protocol (2001), \n                      \n                        http:\/\/www.ma.rhul.ac.uk\/static\/techrep\/2001\/RHUL-MA-2001-3.pdf"},{"key":"14_CR17","unstructured":"Stanley, N.: Mobile Phone Hacking for \u00a31000. ComputerWeekly (2010), \n                      \n                        http:\/\/www.computerweekly.com\/blogs\/Bloor-on-IT-security\/2010\/04\/mobile-phone-hacking-for-1000.html"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems and HCI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40511-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T14:45:25Z","timestamp":1558017925000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40511-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405105","9783642405112"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40511-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}