{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T23:48:33Z","timestamp":1649116113406},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,6,14]],"date-time":"2013-06-14T00:00:00Z","timestamp":1371168000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s11227-013-0958-z","type":"journal-article","created":{"date-parts":[[2013,6,13]],"date-time":"2013-06-13T07:14:06Z","timestamp":1371107646000},"page":"635-652","source":"Crossref","is-referenced-by-count":6,"title":["A secure wireless communication system integrating RSA, Diffie\u2013Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment"],"prefix":"10.1007","volume":"67","author":[{"given":"Yi-Li","family":"Huang","sequence":"first","affiliation":[]},{"given":"Fang-Yie","family":"Leu","sequence":"additional","affiliation":[]},{"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]},{"given":"Yao-Kuo","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Cheng-Chung","family":"Chu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,14]]},"reference":[{"issue":"4","key":"958_CR1","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MWC.2004.1325888","volume":"11","author":"I Akyildz","year":"2004","unstructured":"Akyildz I, Xie J, Mohanty S (2004) A survey of mobility management in next generation all IP based wireless systems. IEEE Wirel Commun 11(4):16\u201327","journal-title":"IEEE Wirel Commun"},{"key":"958_CR2","unstructured":"Clark B (2013) Electronic Wallets: past, present and future. http:\/\/www.gpayments.com\/pdfs\/GPayments_eWallet_Whitepaper.pdf . Accessed on 1\u00a0April 2013"},{"key":"958_CR3","unstructured":"Electronic identity card (2013) Wikipedia. http:\/\/en.wikipedia.org\/wiki\/Electronic_identity_card . Accessed on 12 March 2013"},{"key":"958_CR4","unstructured":"Electronic ticket (2013) Wikipedia. http:\/\/en.wikipedia.org\/wiki\/Electronic_ticket . Accessed on 12\u00a0March 2013"},{"key":"958_CR5","unstructured":"3GPP (2013) Wikipedia. http:\/\/en.wikipedia.org\/wiki\/3GPP . Accessed on 17\u00a0February 2013"},{"key":"958_CR6","first-page":"618","volume-title":"IACR cryptology","author":"T Fuhr","year":"2010","unstructured":"Fuhr T, Gilbert H, Reinhard JR, VideauF M (2010) A forgery attack on the candidate LTE integrity algorithm 128-EIA3. In: IACR cryptology, p 618"},{"key":"958_CR7","first-page":"692","volume-title":"The international conference on industrial informatics","author":"H Haddad","year":"2005","unstructured":"Haddad H (2005) Comparative evaluation of successor protocols to Internet key exchange (IKE). In: The international conference on industrial informatics, pp 692\u2013696"},{"key":"958_CR8","unstructured":"Perfect forward secrecy (2013) Wikipedia. http:\/\/en.wikipedia.org\/wiki\/Perfect_forward_secrecy . Accessed on 1\u00a0April 2013"},{"key":"958_CR9","unstructured":"Arora H (2013) Introduction to Diffie Hellman Key Exchange Algorithm. http:\/\/www.thegeekstuff.com\/2013\/01\/diffie-hellman-key-exchange-algorithm\/ . Accessed on 1\u00a0April 2013"},{"issue":"3","key":"958_CR10","doi-asserted-by":"crossref","first-page":"146","DOI":"10.4304\/jcm.4.3.146-154","volume":"4","author":"S Parkvall","year":"2009","unstructured":"Parkvall S, Astely D (2009) The evolution of LTE towards IMT-advanced. J Commun 4(3):146\u2013154","journal-title":"J Commun"},{"issue":"3","key":"958_CR11","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1155\/2011\/408103","volume":"7","author":"YF Ciou","year":"2011","unstructured":"Ciou YF, Leu FY, Huang YL, Yim K (2011) A handover security mechanism employing Diffie\u2013Hellman key exchange approach for IEEE802.16e wireless networks. Mobile Inf Syst 7(3):241\u2013269","journal-title":"Mobile Inf Syst"},{"key":"958_CR12","unstructured":"Factorial (2013) Wikipedia. http:\/\/en.wikipedia.org\/wiki\/Factorial . Accessed on 5\u00a0April 2013"},{"issue":"6","key":"958_CR13","first-page":"891","volume":"17","author":"YF Huang","year":"2011","unstructured":"Huang YF, Leu FY, Chiu CH, Lin IL (2011) Improving security levels of IEEE802.16e authentication by involving Diffie\u2013Hellman PKDS. J Univers Comput Sci 17(6):891\u2013911","journal-title":"J Univers Comput Sci"},{"issue":"3","key":"958_CR14","first-page":"96","volume":"2","author":"YL Huang","year":"2011","unstructured":"Huang YL, Leu FY (2011) Constructing a secure point-to-point wireless environment by integrating Diffie\u2013Hellman PKDS RSA and stream ciphering for users known to each other. J Wirel Mob Netw Ubiquitous Comput Depend Appl 2(3):96\u2013107","journal-title":"J Wirel Mob Netw Ubiquitous Comput Depend Appl"},{"key":"958_CR15","unstructured":"Diffie\u2013Hellman key exchange (2013) Wikipedia. http:\/\/en.wikipedia.org\/wiki\/Diffie%E2%80%93Hellman_key_exchange . Accessed on 23 February 2013"},{"issue":"1","key":"958_CR16","first-page":"46","volume":"1","author":"K Lee","year":"2010","unstructured":"Lee K, Yeuk H, Choi Y, Pho S, You I, Yim K (2010) Safe authentication protocol for secure USB memories. J Wirel Mob Netw Ubiquitous Comput Depend Appl 1(1):46\u201355","journal-title":"J Wirel Mob Netw Ubiquitous Comput Depend Appl"},{"key":"958_CR17","unstructured":"Motorola, Inc. (2007) Long term evolution (LTE): a technical overview. Technical White Paper, July 2007"},{"key":"958_CR18","first-page":"1","volume-title":"2007 IEEE globecom workshop","author":"T Park","year":"2007","unstructured":"Park T, Park Y (2007) A survey of security threats on 4G networks. In: 2007 IEEE globecom workshop, November 2007, pp 1\u20136"},{"key":"958_CR19","first-page":"29","volume-title":"The 10th international conference on networks","author":"VV Patriciu","year":"2011","unstructured":"Patriciu VV, Bica I (2011) Security analysis of LTE access network. In: The 10th international conference on networks, pp 29\u201334"},{"issue":"1","key":"958_CR20","first-page":"69","volume":"2","author":"M Purkhiabani","year":"2012","unstructured":"Purkhiabani M, Salahi A (2012) Enhanced authentication and key agreement procedure of next generation 3GPP mobile networks. Int J Inf Electron Eng 2(1):69\u201377","journal-title":"Int J Inf Electron Eng"},{"key":"958_CR21","unstructured":"Rand (2013) Wikipedia. http:\/\/en.wikipedia.org\/wiki\/Rand . Accessed on 27\u00a0March 2013"},{"key":"958_CR22","doi-asserted-by":"crossref","unstructured":"Leu FY, You I, Huang YL, Yim K, Dai CR (2012) Improving security level of LTE authentication and key agreement procedure. In: The international workshop on mobility management in the networks of the future world (MobiWorld 2012), pp\u00a01032\u20131036, December 2012","DOI":"10.1109\/GLOCOMW.2012.6477719"},{"issue":"9","key":"958_CR23","first-page":"874","volume":"2","author":"C Hao","year":"2009","unstructured":"Hao C, Liu H, Zhan J (2009) A velocity adaptive handover scheme for mobile WiMAX. Int J Commun Netw Syst Sci 2(9):874\u2013878","journal-title":"Int J Commun Netw Syst Sci"},{"key":"958_CR24","first-page":"16","volume-title":"IEEE wireless pervasive computing conference","author":"DH Lee","year":"2006","unstructured":"Lee DH, Kyamakya K (2006) Fast handover algorithm for IEEE 802.16e broadband wireless access system. In: IEEE wireless pervasive computing conference, January 2006, pp 16\u201318"},{"issue":"1","key":"958_CR25","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.pmcj.2007.03.002","volume":"4","author":"A George","year":"2008","unstructured":"George A et al (2008) Protocols for mobility management in heterogeneous multihop wireless networks. Pervasive Mob Comput 4(1):92\u2013116","journal-title":"Pervasive Mob Comput"},{"key":"958_CR26","first-page":"24","volume-title":"Mobile WiMAX\u2014part\u00a0I","author":"WiMAX Forum","year":"2006","unstructured":"WiMAX Forum (2006) A technical overview and performance evaluation. In: Mobile WiMAX\u2014part\u00a0I, August 2006, pp 24\u201340"},{"key":"958_CR27","first-page":"149","volume-title":"Joint workshop on foundations of computer security and automated reasoning for security protocol analysis","author":"E Yuksel","year":"2007","unstructured":"Yuksel E, Nielson HR, Nielsen CR, Orencik MB (2007) A secure simplification of the PKMv2 protocol in IEEE 802.16 e 2005. In: Joint workshop on foundations of computer security and automated reasoning for security protocol analysis, July 2007, pp 149\u2013164"},{"issue":"2S","key":"958_CR28","first-page":"523S","volume":"7","author":"CL Chen","year":"2013","unstructured":"Chen CL, Cheng KW, Chen CC, Chang IC (2013) Enhancing an AAA scheme using ID-based ticket with anonymity in future mobile communication. Appl Math Inf Sci 7(2S):523S\u2013532S","journal-title":"Appl Math Inf Sci"},{"key":"958_CR29","unstructured":"Hansen E (2003) Analysis of design for implementing confidentiality, integrity, authentication, and non-repudiation solutions. Global Information Assurance Certification Paper"},{"issue":"4","key":"958_CR30","first-page":"681","volume":"13","author":"YL Huang","year":"2012","unstructured":"Huang YL, Lin CH, Leu FY (2012) A batch verification scheme by using the Matrix-Detection Algorithm. J Internet Technol 13(4):681\u2013690","journal-title":"J Internet Technol"},{"issue":"8","key":"958_CR31","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1002\/wcm.354","volume":"5","author":"SY Wang","year":"2005","unstructured":"Wang SY, Lin YB (2005) NCTUns network simulation and emulation for wireless resource management. Wiley Wirel Commun Mob Comput 5(8):899\u2013916","journal-title":"Wiley Wirel Commun Mob Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-0958-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-013-0958-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-013-0958-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T05:19:30Z","timestamp":1563167970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-013-0958-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,14]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["958"],"URL":"https:\/\/doi.org\/10.1007\/s11227-013-0958-z","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,14]]}}}