{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:17:20Z","timestamp":1761401840051},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Commun. Inf. Netw."],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/bf03391547","type":"journal-article","created":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T08:30:58Z","timestamp":1493368258000},"page":"72-85","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Survey on key security technologies for space information networks"],"prefix":"10.23919","volume":"1","author":[{"given":"Liu","family":"Jianwei","sequence":"first","affiliation":[]},{"given":"Liu","family":"Weiran","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Qianhong","sequence":"additional","affiliation":[]},{"given":"Li","family":"Dawei","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Shigang","sequence":"additional","affiliation":[]}],"member":"263","published-online":{"date-parts":[[2017,4,27]]},"reference":[{"issue":"6","key":"BF03391547_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MWC.2005.1561945","volume":"12","author":"A Roy-Chowdhury","year":"2005","unstructured":"[1]ROY-CHOWDHURY A, BARASJOHN S, HADJITHEODOSIOU M, et al. Security issues in hybrid networks with a satellite component[J]. IEEE wireless communications, 2005, 12(6): 50\u201361.","journal-title":"IEEE wireless communications"},{"key":"BF03391547_CR2","volume-title":"Iran-U.S. RQ-170 Incident[EB\/OL]","author":"WIKIPEDIA.","year":"2011","unstructured":"WIKIPEDIA. Iran-U.S. RQ-170 Incident[EB\/OL]. 2011. https:\/\/en.wikipedia.org \/wiki\/Iran-U.S._RQ-170_incident."},{"key":"BF03391547_CR3","volume-title":"Iran\u2019s captured RQ-170: How bad is the damage?[EB\/OL]","author":"D Majumdar","year":"2011","unstructured":"MAJUMDAR D. Iran\u2019s captured RQ-170: How bad is the damage?[EB\/OL]. 2011. http:\/\/www.airforcetimes.com \/news\/2011\/12\/defense-iran-captured-rq-170-how-bad-120911\/."},{"issue":"2","key":"BF03391547_CR4","first-page":"19","volume":"25","author":"J S Warner","year":"2002","unstructured":"WARNER J S, JOHNSTON R G. A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing[J]. Journal of security administration, 2002, 25(2): 19\u201327.","journal-title":"Journal of security administration"},{"key":"BF03391547_CR5","volume-title":"Death of muammar gaddafi[EB\/OL]","author":"WIKIPEDIA.","year":"2011","unstructured":"WIKIPEDIA. Death of muammar gaddafi[EB\/OL]. 2011. https:\/\/en.wikipedia.org \/wiki\/Death of Muammar Caddafi."},{"issue":"2","key":"BF03391547_CR6","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/SURV.2012.062612.00134","volume":"15","author":"J Mukherjee","year":"2013","unstructured":"MUKHERJEE J, RAMAMURTHY B. Communication technologies and architectures for space network and interplanetary internet[J]. IEEE communications surveys and tutorials, 2013, 15(2): 881\u2013897.","journal-title":"IEEE communications surveys and tutorials"},{"key":"BF03391547_CR7","first-page":"1","volume-title":"A key management and authentication model for ad hoc network[C]","author":"J Liu","year":"2007","unstructured":"LIU J, LIU C, GUO K. A key management and authentication model for ad hoc network[C]\/\/Proceedings of the IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2007), c2007: 1\u20135."},{"key":"BF03391547_CR8","unstructured":"CCSDS 713.5-B-1. Space communication protocol specification (SCPS)-security protocol[S]. The Consultative Committee for Space Data Systems (CCSDS), 1999."},{"key":"BF03391547_CR9","unstructured":"CCSDS 733.5-O-0.1. Next generation space internet (NGSI) - end-to-end security for space mission communications[S]. The Consultative Committee for Space Data Systems (CCSDS), 2003."},{"key":"BF03391547_CR10","unstructured":"RFC 2409. The Internet key exchange (IKE)[Z]. Network Working Group, 1998."},{"key":"BF03391547_CR11","unstructured":"CCSDS 350.1-G-1. Security threats against space missions[S]. The Consultative Committee for Space Data Systems (CCSDS), 2006."},{"key":"BF03391547_CR12","unstructured":"CCSDS 350.0-G-2. The application of CCSDS protocols to secure systems[S]. The Consultative Committee for Space Data Systems (CCSDS), 2006."},{"key":"BF03391547_CR13","unstructured":"CCSDS 350.9-G-1. CCSDS cryptographic algorithms[S]. The Consultative Committee for Space Data Systems (CCSDS), 2014."},{"key":"BF03391547_CR14","unstructured":"CCSDS 351.0-M-1. Security architecture for space data systems[S]. The Consultative Committee for Space Data Systems (CCSDS), 2012."},{"key":"BF03391547_CR15","volume-title":"Command and Control Research Program Publication Series","author":"D S Alberts","year":"2000","unstructured":"ALBERTS D S, GARSTKA J J, STEIN F P. Network centric warfare: developing and leveraging information superiority[M]. Command and Control Research Program Publication Series, 2000."},{"key":"BF03391547_CR16","unstructured":"SIMONSEN E. Integrated defense systems[EB\/OL]. https:\/\/www.boeing.com\/news\/frontiers\/archive\/2005\/october\/i_ids3 html ."},{"key":"BF03391547_CR17","first-page":"22","volume-title":"Broadband radio access for IP-based networks in the IST BRAIN project[C]","author":"W Mohr","year":"2000","unstructured":"MOHR W. Broadband radio access for IP-based networks in the IST BRAIN project[C]\/\/Proceedings of the International Conference on Telecommunications (ICT 2000), c2000: 22\u201325."},{"issue":"2","key":"BF03391547_CR18","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1145\/996943.996946","volume":"7","author":"W Aiello","year":"2004","unstructured":"AIELLO W, BELLOVIN S M, BLAZE M, et al. Just fast keying: Key agreement in a hostile internet[J], ACM transactions on information and system security, 2004, 7(2): 242\u2013273.","journal-title":"ACM transactions on information and system security"},{"key":"BF03391547_CR19","volume-title":"Internet Engineering Task Force (ITEF)","author":"P Eronen","year":"2010","unstructured":"ERONEN P. Internet key exchange protocol version 2 (IKEv2)[S]. Internet Engineering Task Force (ITEF). 2010."},{"key":"BF03391547_CR20","volume-title":"Internet Engineering Task Force (ITEF)","author":"T Wu","year":"2000","unstructured":"WU T. The SRP authentication and key exchange system[S]. Internet Engineering Task Force (ITEF). 2000."},{"issue":"10","key":"BF03391547_CR21","first-page":"19","volume":"8","author":"R J Shen","year":"2006","unstructured":"SHEN R J. Some thoughts of Chinese integrated space-ground network system[J]. Engineering science, 2006, 8(10): 19\u201330.","journal-title":"Engineering science"},{"key":"BF03391547_CR22","first-page":"46","volume":"8","author":"S Min","year":"2013","unstructured":"MIN S. Discussion on space-based integrated information network[J], Space international, 2013, 8: 46\u201354.","journal-title":"Space international"},{"key":"BF03391547_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES-the advanced encryption standard[M]","author":"J Daemen","year":"2002","unstructured":"DAEMEN J, VINCENT R. The design of Rijndael: AES-the advanced encryption standard[M]. Berlin Heidelberg: Springer, 2002."},{"issue":"3\u20134","key":"BF03391547_CR24","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1504\/IJSN.2006.011773","volume":"1","author":"J Zhen","year":"2006","unstructured":"ZHEN J, LI J, LEE M J, et al. A lightweight encryption and authentication scheme for wireless sensor networks[J]. International journal of security and networks, 2006, 1(3\u20134): 138\u2013146.","journal-title":"International journal of security and networks"},{"key":"BF03391547_CR25","first-page":"447","volume-title":"ALE: AES-based lightweight authenticated encryption[C]","author":"A Bogdanov","year":"2013","unstructured":"BOGDANOV A, MENDEL F, REGAZZONI F, et al. ALE: AES-based lightweight authenticated encryption[C]\/\/Proceedings of the 20th International Workshop on Fast Software Encryption (FSE 2013), Singapore, c2013: 447\u2013466."},{"issue":"3","key":"BF03391547_CR26","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/CC.2014.6825260","volume":"11","author":"N Li","year":"2014","unstructured":"LI N, LIN K, LIN W, et al. A joint encryption and error correction method used in satellite communications[J]. China communications, 2014, 11(3): 70\u201379.","journal-title":"China communications"},{"key":"BF03391547_CR27","first-page":"1","volume-title":"On-board security services in small satellites[C]","author":"T Vladimirova","year":"2006","unstructured":"VLADIMIROVA T, BANU R, SWEETING M. On-board security services in small satellites[C]\/\/Proceedings of the IEEE 23rd International Conference on Geoscience and Remote Sensing Symposium (IGARSS 2006), c2006: 1\u201315."},{"issue":"1","key":"BF03391547_CR28","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/TAES.2009.4805278","volume":"45","author":"R Banu","year":"2009","unstructured":"BANU R, VLADIMIROVA T. Fault-tolerant encryption for space applications [J]. IEEE transactions on aerospace and electronic systems, 2009, 45(1): 266\u2013279.","journal-title":"IEEE transactions on aerospace and electronic systems"},{"key":"BF03391547_CR29","first-page":"196","volume-title":"McOE: a family of almost foolproof on-line authenticated encryption schemes[C]","author":"E Fleischmann","year":"2012","unstructured":"FLEISCHMANN E, FORLER C, LUCKS S. McOE: a family of almost foolproof on-line authenticated encryption schemes[C]\/\/Proceedings of the 19th International Workshop on Fast Software Encryption (FSE 2012), c2012: 196\u2013215."},{"key":"BF03391547_CR30","unstructured":"ISO\/IEC 19772:2009. Information security-Security techniques-Authenticated Encryption[S]. International Organization for Standardization, 2009."},{"key":"BF03391547_CR31","first-page":"531","volume-title":"Authenticated encryption: Relations among notions and analysis of the generic composition paradigm[C]","author":"M Bellare","year":"1976","unstructured":"BELLARE M, NAMPREMPRE C. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm[C]\/\/Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2000), c1976: 531\u2013545."},{"issue":"4","key":"BF03391547_CR32","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M Bellare","year":"2008","unstructured":"BELLARE M, NAMPREMPRE C. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm[J]. Journal of cryptology, 2008, 21(4): 469\u2013491.","journal-title":"Journal of cryptology"},{"key":"BF03391547_CR33","first-page":"16","volume-title":"Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC[C]","author":"P Rogaway","year":"2004","unstructured":"ROGAWAY P. Efficient instantiations of tweakable blockciphers and refinements to modes OCB and PMAC[C]\/\/Proceedings of the 10th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2004), c2004: 16\u201331."},{"key":"BF03391547_CR34","first-page":"373","volume-title":"A provable-security treatment of the key-wrap problem[C]","author":"P Rogaway","year":"2006","unstructured":"ROGAWAY P, SHRIMPTON T. A provable-security treatment of the key-wrap problem[C]\/\/Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2006), c2006: 373\u2013390."},{"key":"BF03391547_CR35","volume-title":"National Institute of Standards and Technology","author":"M J Dworkin","year":"2005","unstructured":"DWORKIN M J. Special Publication 800-38C: recommendation for block cipher modes of operation: the ccm mode for authentication and confidentiality[S]. National Institute of Standards and Technology, 2005."},{"key":"BF03391547_CR36","first-page":"389","volume-title":"The EAX mode of operation[C]","author":"M Bellare","year":"2004","unstructured":"BELLARE M, ROGAWAY P, WAGNER D. The EAX mode of operation[C]\/\/Proceedings of the 11th International Workshop on Fast Software Encryption (FSE 2004), c2004: 389\u2013407."},{"key":"BF03391547_CR37","first-page":"343","volume-title":"The security and performance of the Galois\/Counter Mode (GCM) of operation[C]","author":"D A McGrew","year":"2004","unstructured":"MCGREW D A, VIEGA J. The security and performance of the Galois\/Counter Mode (GCM) of operation[C]\/\/Proceedings of the 5th International Conference on Cryptology in India (INDOC-RYPT 2004), c2004: 343\u2013355."},{"key":"BF03391547_CR38","volume-title":"National Institute of Standards and Technology","author":"M J Dworkin","year":"2007","unstructured":"DWORKIN M J. Special Publication 800-38D: recommendation for block cipher modes of operation: Galois\/Counter Mode (GCM) and GMAC[S]. National Institute of Standards and Technology, 2007."},{"issue":"2","key":"BF03391547_CR39","first-page":"343","volume":"31","author":"L Zhang","year":"2009","unstructured":"ZHANG L, ZHOU J, TANG C. Research on application of AEAD techniques for CCSDS telecommand protocol[J]. Journal of electronics and information security, 2009, 31(2): 343\u2013348.","journal-title":"Journal of electronics and information security"},{"key":"BF03391547_CR40","volume-title":"American Institute of Aeronautics and Astronzautics","author":"H Weiss","year":"2012","unstructured":"WEISS H. CCSDS standardization of security algorithms for civil space missions[S]. American Institute of Aeronautics and Astronzautics, 2012."},{"issue":"1","key":"BF03391547_CR41","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TIFS.2013.2289993","volume":"9","author":"X Lyu","year":"2014","unstructured":"LYU X, MU Y, LI H. Non-interactive key establishment for bundle security protocol of space DTNs[J]. IEEE transactions on information forensics and security, 2014, 9(1): 5\u201313.","journal-title":"IEEE transactions on information forensics and security"},{"issue":"1","key":"BF03391547_CR42","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s11277-013-1505-1","volume":"77","author":"J Zhou","year":"2014","unstructured":"ZHOU J, SONG M, SONG J, et al. Autonomic group key management in deep space DTN[J], Wireless personal communications, 2014, 77(1): 269\u2013287.","journal-title":"Wireless personal communications"},{"issue":"1","key":"BF03391547_CR43","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.compeleceng.2008.05.003","volume":"35","author":"T H Cheng","year":"2009","unstructured":"CHENG T H, LEE W B, CHEN H B. A self-verification authentication mechanism for mobile satellite communication systems[J]. Computers and electrical engineering, 2009, 35(1): 41\u201348.","journal-title":"Computers and electrical engineering"},{"issue":"5","key":"BF03391547_CR44","first-page":"1081","volume":"28","author":"Y Wang","year":"2007","unstructured":"WANG Y, LU Y, WU Z, et al. Constructing multi-level and multilayer security infrastructure of space information system[J], Journal of astronautics, 2007, 28(5): 1081\u20131085.","journal-title":"Journal of astronautics"},{"key":"BF03391547_CR45","first-page":"47","volume-title":"Identity-based cryptosystems and signature schemes[C]","author":"A Shamir","year":"1984","unstructured":"SHAMIR A. Identity-based cryptosystems and signature schemes[C]\/\/Proceedings of the 14th Annual International Cryptology Conference Santa Barbara (CRYPTO 1984), c1984: 47\u201353."},{"key":"BF03391547_CR46","first-page":"213","volume-title":"Identity-based encryption from the Weil pairing[C]","author":"D Boneh","year":"2001","unstructured":"BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C]\/\/Proceedings of the 21st Annual International Cryptology Conference (CRYPTO 2001), c2001: 213\u2013229."},{"issue":"3","key":"BF03391547_CR47","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[J]. SIAM journal on computing, 2003, 32(3): 586\u2013615.","journal-title":"SIAM journal on computing"},{"key":"BF03391547_CR48","first-page":"114","volume-title":"Efficient identity-based encryption without random oracles[C]","author":"B Waters","year":"2005","unstructured":"WATERS B. Efficient identity-based encryption without random oracles[C]\/\/Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2005), c2005: 114\u2013127."},{"key":"BF03391547_CR49","first-page":"445","volume-title":"Practical identity-based encryption without random oracles[C]","author":"C Gentry","year":"2006","unstructured":"GENTRY C. Practical identity-based encryption without random oracles[C]\/\/Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2006), c2006: 445\u2013464."},{"issue":"1","key":"BF03391547_CR50","first-page":"183","volume":"32","author":"C Luo","year":"2010","unstructured":"LUO C, LI W, XING H, et al. Research on identity-based distributed key management in space network[J], China communications, 2010, 32(1): 183\u2013188.","journal-title":"China communications"},{"key":"BF03391547_CR51","first-page":"466","volume-title":"Toward hierarchical identity-based encryption[C]","author":"J Horwitz","year":"2002","unstructured":"HORWITZ J, LYNN B. Toward hierarchical identity-based encryption[C]\/\/Proceedings of the 20th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2002), c2002: 466\u2013481."},{"key":"BF03391547_CR52","first-page":"548","volume-title":"Hierarchical ID-based cryptography[C]","author":"C Gentry","year":"2002","unstructured":"GENTRY C, SILVERBERG A. Hierarchical ID-based cryptography[C]\/\/Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT2002), c2002: 548\u2013566."},{"key":"BF03391547_CR53","first-page":"437","volume-title":"Hierarchical identity based encryption with polynomially many levels[C]","author":"C Gentry","year":"2009","unstructured":"GENTRY C, HALEVI S. Hierarchical identity based encryption with polynomially many levels[C]\/\/Proceedings of the 6th Theory of Cryptography Conference (TCC 2009), c2009: 437\u2013456."},{"key":"BF03391547_CR54","first-page":"455","volume-title":"New techniques for dual system encryption and fully secure HIBE with short ciphertexts[C]","author":"A Lewko","year":"2010","unstructured":"LEWKO A, WATERS B. New techniques for dual system encryption and fully secure HIBE with short ciphertexts[C]\/\/Proceedings of the 7th Theory of Cryptography Conference (TCC 2010), c2010: 455\u2013479."},{"issue":"2","key":"BF03391547_CR55","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/JSAC.2003.819978","volume":"22","author":"M P Howarth","year":"2004","unstructured":"HOWARTH M P, IYENGAR S, SUN Z, et al. Dynamics of key management in secure satellite multicast[J]. IEEE journal on selected areas in communications, 2004, 22(2): 308\u2013319.","journal-title":"IEEE journal on selected areas in communications"},{"key":"BF03391547_CR56","first-page":"227","volume-title":"A secure and efficient satellite-based multicast architecture[C]","author":"J V Hubenko","year":"2008","unstructured":"HUBENKO J V, RAINES R, BALDWIN R, et al. A secure and efficient satellite-based multicast architecture[C]\/\/IEEE Radio and Wireless Symposium, FL, USA, c2008: 227\u2013230."},{"issue":"6","key":"BF03391547_CR57","first-page":"824","volume":"34","author":"Y Sun","year":"2013","unstructured":"SUN Y, MA H, ZHENG G, et al. Multiple group shared key management for satellite multicast[J]. Journal of astronautics, 2013, 34(6): 824\u2013832.","journal-title":"Journal of astronautics"},{"key":"BF03391547_CR58","first-page":"242","volume-title":"Hierarchical identity-based broadcast encryption[C]","author":"W Liu","year":"2014","unstructured":"LIU W, LIU J, WU Q, et al. Hierarchical identity-based broadcast encryption[C]\/\/Proceedings of the 19th Australasian Conference on Information Security and Privacy (ACISP 2014), c2014: 242\u2013257."},{"key":"BF03391547_CR59","first-page":"336","volume-title":"Auditing and revocation enabled role-based access control over outsourced private EHRs[C]","author":"W Liu","year":"2015","unstructured":"LIU W, LIU X, LIU J, et al. Auditing and revocation enabled role-based access control over outsourced private EHRs[C]\/\/Proceedings of the 17th International Conference on High Performance Computing and Communications (HPCC 2015), New York, USA, c2015: 336\u2013341."},{"issue":"1","key":"BF03391547_CR60","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s10207-015-0287-8","volume":"15","author":"W Liu","year":"2016","unstructured":"LIU W, LIU J, WU Q, et al. Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption[J]. International journal of information security, 2016, 15(1): 35\u201350.","journal-title":"International journal of information security"},{"issue":"3","key":"BF03391547_CR61","doi-asserted-by":"publisher","first-page":"1652","DOI":"10.1360\/jos181652","volume":"11","author":"M Liu","year":"2007","unstructured":"LIU M, LI Z, GUO X, et al. Evaluation and improvement of vertical handoff algorithms in heterogeneous wireless networks[J]. Journal of software, 2007, 11(3): 1652\u20131659.","journal-title":"Journal of software"},{"key":"BF03391547_CR62","doi-asserted-by":"publisher","DOI":"10.1145\/1185373.1185415","volume-title":"SAP: seamless authentication protocol for vertical handoff in heterogeneous wireless networks [C]","author":"S C Huang","year":"2006","unstructured":"HUANG S C, ZHU H, ZHANG W. SAP: seamless authentication protocol for vertical handoff in heterogeneous wireless networks [C]\/\/Proceedings of the 3rd International Conference on Quality of Service in Heterogeneous Wired\/Wireless Networks (QSHINE 2006), Seoul, South Korea, c2006."},{"issue":"2","key":"BF03391547_CR63","first-page":"1908","volume":"5","author":"M W Khan","year":"2013","unstructured":"KHAN M W. Secure and efficient vertical handover in heterogeneous wireless networks[J]. International journal of advanced networking and applications, 2013, 5(2): 1908\u20131912.","journal-title":"International journal of advanced networking and applications"},{"key":"BF03391547_CR64","first-page":"2088","volume-title":"Transparent end-user authentication across heterogeneous wireless networks[C]","author":"H Chen","year":"2003","unstructured":"CHEN H, PLAS D. Transparent end-user authentication across heterogeneous wireless networks[C]\/\/Proceedings of the IEEE 58th Vehicular Technology Conference (VTC 2003), Orlando, Florida, USA, c2003: 2088\u20132092."},{"issue":"10","key":"BF03391547_CR65","first-page":"2358","volume":"38","author":"Y Guo","year":"2010","unstructured":"GUO Y, WANG C, WANG L. Universally composable authentication and key exchange protocol for access control in spatial information networks[J]. Acta electronica sinica, 2010, 38(10): 2358\u20132364.","journal-title":"Acta electronica sinica"},{"key":"BF03391547_CR66","first-page":"136","volume-title":"Universally composable security: A new paradigm for cryptographic protocols [C]","author":"R Canetti","year":"2001","unstructured":"CANETTI R. Universally composable security: A new paradigm for cryptographic protocols [C]\/\/Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (FOCS 2001), Las Vegas, Nevada, USA, c2001: 136\u2013145."},{"key":"BF03391547_CR67","first-page":"337","volume-title":"Universally composable notions of key exchange and secure channels[C]","author":"R Canetti","year":"2002","unstructured":"CANETTI R, KRAWCZYK H. Universally composable notions of key exchange and secure channels[C]\/\/Proceedings of the 20th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2002), c2002: 337\u2013351."},{"issue":"2","key":"BF03391547_CR68","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1360\/zc2010-40-2-139","volume":"40","author":"C Shen","year":"2010","unstructured":"SHEN C, ZHANG H, WANG H, et al. Researches and developes of trusted computing[J]. Scientia sinica: informationis, 2010, 40(2): 139\u2013166.","journal-title":"Scientia sinica: informationis"},{"key":"BF03391547_CR69","volume-title":"Computational security analysis of the UMTS and LTE authentication and key agreement protocols[S]","author":"S Mj\u00f8lsnes","year":"2012","unstructured":"MJ\u00d8LSNES S, TSAY J. Computational security analysis of the UMTS and LTE authentication and key agreement protocols[S]. Cornell University Library. 2012."},{"key":"BF03391547_CR70","first-page":"1","volume-title":"3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA[C]","author":"H Mun","year":"2009","unstructured":"MUN H, HAN K, KIM K. 3G-WLAN interworking: security analysis and new authentication and key agreement based on EAP-AKA[C]\/\/Proceedings of the IEEE Wireless Telecommunications Symposium (WTS 2009), Prague, Czechoslovakia, c2009: 1\u20138."}],"container-title":["Journal of Communications and Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03391547.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T12:12:26Z","timestamp":1656072746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF03391547"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":70,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["BF03391547"],"URL":"https:\/\/doi.org\/10.1007\/bf03391547","relation":{},"ISSN":["2096-1081","2509-3312"],"issn-type":[{"value":"2096-1081","type":"print"},{"value":"2509-3312","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6]]}}}