{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T17:46:49Z","timestamp":1750441609245},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,8,4]],"date-time":"2011-08-04T00:00:00Z","timestamp":1312416000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1007\/s00779-011-0434-9","type":"journal-article","created":{"date-parts":[[2011,8,3]],"date-time":"2011-08-03T00:27:10Z","timestamp":1312331230000},"page":"677-685","source":"Crossref","is-referenced-by-count":10,"title":["Secure and efficient public key management in next generation mobile networks"],"prefix":"10.1007","volume":"16","author":[{"given":"Kyusuk","family":"Han","sequence":"first","affiliation":[]},{"given":"Hyeran","family":"Mun","sequence":"additional","affiliation":[]},{"given":"Taeshik","family":"Shon","sequence":"additional","affiliation":[]},{"given":"Chan Yeob","family":"Yeun","sequence":"additional","affiliation":[]},{"given":"James J.","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,4]]},"reference":[{"key":"434_CR1","unstructured":"Abe T, Okamoto M (2002) Delegation chains secure up to constant length. IEICE Trans. Fundamentals E85-A(1):110\u2013116"},{"key":"434_CR2","unstructured":"Abid M, Song S, Moustafa H, Afifi H (2009) Integrating identity-based cryptography in IMS service authentication. Int J Netw Secur Appl (IJNSA) 1(3)"},{"key":"434_CR3","unstructured":"Boneh D, Franklin MK (2001) Identity-based encryption from the Weil Pairing advances in cryptology. Proceedings of CRYPTO 2001"},{"key":"434_CR4","doi-asserted-by":"crossref","unstructured":"Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. In: EUROCRYPT \u201802 proceedings of the international conference on the theory and applications of cryptographic techniques: advances in cryptology","DOI":"10.1007\/3-540-46035-7_5"},{"key":"434_CR5","doi-asserted-by":"crossref","unstructured":"Dodis Y, Katz J, Xu S, Yung M (2003) Strong key-insulated signature schemes. Proceedings of PKC\u201903","DOI":"10.1007\/3-540-36288-6_10"},{"key":"434_CR6","doi-asserted-by":"crossref","unstructured":"Handschuh H, Paillier P (2000) Smart card crypto-coprocessors for public-key cryptography, CARDIS \u201898. In: Proceedings of the international conference on smart card research and applications, Springer, London, UK, pp 372\u2013379","DOI":"10.1007\/10721064_35"},{"key":"434_CR7","doi-asserted-by":"crossref","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. In: Mathematics of Computation 48, p 203\u2013209","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"434_CR8","unstructured":"Martin L (2008) Introduction to identity-based encryption. Number ISBN-13: 978-1-59693-238-8. Artech House, Inc., 685 Canton Street, Norwood, MA 02062"},{"key":"434_CR9","first-page":"80","volume":"116","author":"JC Na","year":"2008","unstructured":"Na JC (2008) Next generation USIM technologies. TTA Journal (written in Korean) 116:80\u201385","journal-title":"TTA Journal (written in Korean)"},{"key":"434_CR10","doi-asserted-by":"crossref","unstructured":"Ohtake G, Hanaoka G, Ogawa K (2008) An efficient strong key-insulated signature scheme and its application. 5th European PKI Workshop, NTNU, Trondheim, Norway, June 16\u201317","DOI":"10.1007\/978-3-540-69485-4_11"},{"key":"434_CR11","unstructured":"RSA Laboratories (2000) RSAES-OAEP Encryption Scheme\u2014Algorithm specification and supporting documentation"},{"key":"434_CR12","unstructured":"Sun Microsystems, Inc. (2009) Runtime Environment Specification, java card platform, version 3.0.1 connected edition"},{"key":"434_CR13","unstructured":"Third Generation Partnership (3GPP) (2011) TS 33.401 v 11.0.1 3GPP System Architecture Evolution (SAE); Security Architecture (Release 11)"},{"key":"434_CR14","unstructured":"Third Generation Partnership (3GPP) (2010) TS 33.220 v10.0.0 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (Release 10)"},{"key":"434_CR15","unstructured":"Third Generation Partnership (3GPP) (2010) TS 33.102 v10.0.0 3G Security: security architecture (Release 10)"},{"key":"434_CR16","unstructured":"Third Generation Partnership (3GPP) (2010) TS 33.221 v10.0.0 Generic Authentication Architecture (GAA); Support for Subscriber Certificates (Release 10)"},{"key":"434_CR17","doi-asserted-by":"crossref","unstructured":"Traynor P, Lin M, Ongtang M, Rao V, Jaeger T, McDaniel P, La Porta V (2009) On cellular botnets: measuring the impact of malicious devices on a cellular network core. In CCS\u201909: Proceedings of the 16th ACM conference on Computer and communications security, p 223\u2013234, New York, NY, USA, ACM","DOI":"10.1145\/1653662.1653690"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0434-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0434-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0434-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T14:04:17Z","timestamp":1560434657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0434-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,4]]},"references-count":17,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,8]]}},"alternative-id":["434"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0434-9","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,4]]}}}