{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T13:04:07Z","timestamp":1696338247005},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,1,15]],"date-time":"2010-01-15T00:00:00Z","timestamp":1263513600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1007\/s11235-009-9276-4","type":"journal-article","created":{"date-parts":[[2010,1,14]],"date-time":"2010-01-14T21:08:06Z","timestamp":1263503286000},"page":"31-41","source":"Crossref","is-referenced-by-count":14,"title":["An efficient authentication protocol for mobile communications"],"prefix":"10.1007","volume":"46","author":[{"given":"Cheng-Chi","family":"Lee","sequence":"first","affiliation":[]},{"given":"I-En","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,15]]},"reference":[{"key":"9276_CR1","doi-asserted-by":"crossref","unstructured":"Al-tawil, K., Akrami, A., & Youssef, H. (1998). A new authentication protocol for GSM networks. In IEEE 23rd annual conference on Local Computer Networks (LCN\u201998) (pp.\u00a021\u201330).","DOI":"10.1109\/LCN.1998.727643"},{"key":"9276_CR2","doi-asserted-by":"crossref","unstructured":"Ammayappan, K., Saxena, A., & Negi, A. (2006). Mutual authentication and key agreement based on elliptic curve cryptography for GSM. In International conference on advanced computing and communications, 2006 (pp.\u00a0183\u2013186), Dec. 2006.","DOI":"10.1109\/ADCOM.2006.4289879"},{"key":"9276_CR3","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1016\/j.comcom.2005.01.015","volume":"28","author":"C. C. Chang","year":"2005","unstructured":"Chang, C. C., Lee, J. S., & Chang, Y. F. (2005). Efficient authentication protocols of GSM. Computer Communications, 28, 921\u2013928.","journal-title":"Computer Communications"},{"issue":"3","key":"9276_CR4","first-page":"279","volume":"3","author":"A. P. Dominguez","year":"2006","unstructured":"Dominguez, A. P. (2006). Cryptanalysis of Parka\u2019s authentication protocol in wireless mobile communication systems. International Journal of Network Security, 3(3), 279\u2013282.","journal-title":"International Journal of Network Security"},{"key":"9276_CR5","unstructured":"ETSI (1993). Recommendation GSM 02.09: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993."},{"key":"9276_CR6","unstructured":"ETSI (1993). Recommendation GSM 03.20: Security related network functions. Tech. rep., European Telecommunications Standards Institute, ETSI, June 1993."},{"issue":"2","key":"9276_CR7","first-page":"143","volume":"9","author":"V. Falletta","year":"2009","unstructured":"Falletta, V., & Ricciato, F. (2009). Detecting scanners: empirical assessment on a 3G network. International Journal of Network Security, 9(2), 143\u2013155.","journal-title":"International Journal of Network Security"},{"key":"9276_CR8","doi-asserted-by":"crossref","unstructured":"Fanian, A., Berenjkoub, M., & Gulliver, T. A. (2009). A\u00a0new mutual authentication protocol for GSM networks. In Canadian conference on electrical and computer engineering (pp.\u00a0798\u2013803), May 2009.","DOI":"10.1109\/CCECE.2009.5090238"},{"key":"9276_CR9","doi-asserted-by":"crossref","unstructured":"Hahn, G., Kwon, T., Kim, S., & Song, J. (2004). Design and analysis of improved GSM authentication protocol for roaming users. In Lecture notes of computer science (vol.\u00a03222, pp.\u00a0451\u2013458).","DOI":"10.1007\/978-3-540-30141-7_63"},{"key":"9276_CR10","unstructured":"Harn, L., & Lin, H. Y. (1995). Modification to enhance the security of the GSM protocol. In Proceedings of the 5th national conference on information security (pp.\u00a0416\u2013420), Taipei, May 1995."},{"issue":"5","key":"9276_CR11","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1109\/25.790522","volume":"48","author":"M.-S. Hwang","year":"1999","unstructured":"Hwang, M.-S. (1999). Dynamic participation in a secure conference scheme for mobile communications. IEEE Transactions on Vehicular Technology, 48(5), 1469\u20131474.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3","key":"9276_CR12","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1078\/1434-8411-54100232","volume":"58","author":"M.-S. Hwang","year":"2004","unstructured":"Hwang, M.-S., Lee, C.-C., & Lee, J.-Z. (2004). A new anonymous channel protocol in wireless communications. International Journal on Electronics and Communications, 58(3), 218\u2013222.","journal-title":"International Journal on Electronics and Communications"},{"issue":"3","key":"9276_CR13","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s11235-005-1689-0","volume":"29","author":"M.-S. Hwang","year":"2005","unstructured":"Hwang, M.-S., Lee, C.-C., Lee, J.-Z., & Yang, C.-C. (2005). A secure protocol for bluetooth piconets using elliptic curve cryptography. Telecommunication Systems, 29(3), 165\u2013180.","journal-title":"Telecommunication Systems"},{"key":"9276_CR14","unstructured":"Hwang, M.-S., Tang, Y.-L., & Lee, C.-C. (2000). An efficient authentication protocol for GSM networks. In AFCEA\/IEEE EuroComm\u20192000 (pp.\u00a0326\u2013330), Munich, Germany, May 2000."},{"issue":"2","key":"9276_CR15","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/BF01202542","volume":"1","author":"R. Jain","year":"1995","unstructured":"Jain, R., & Lin, Y. B. (1995). Performance modeling of an auxiliary user location strategy in a\u00a0PCS network. ACM-Baltzer Wireless Networks, 1(2), 197\u2013210.","journal-title":"ACM-Baltzer Wireless Networks"},{"key":"9276_CR16","doi-asserted-by":"crossref","unstructured":"Kalaichelvi, V., & Chandrasekaran, R. M. (2008). Secure authentication protocol for mobile. In International conference on computing, communication and networking (pp.\u00a01\u20134), Dec. 2008.","DOI":"10.1109\/ICCCNET.2008.4787666"},{"key":"9276_CR17","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/98.403454","volume":"2","author":"P. A. Karger","year":"1995","unstructured":"Karger, P. A., Frankel, Y., & Herzberg, A. (1995). Security issues in a CDPD wireless network. IEEE Personal Communications, 2, 16\u201327.","journal-title":"IEEE Personal Communications"},{"key":"9276_CR18","unstructured":"Kumar, K. P., Shailaja, G., Kavitha, A., & Saxena, A. (2006). Mutual authentication and key agreement for GSM. In International conference on mobile business (pp.\u00a025\u201328), June 2006."},{"key":"9276_CR19","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1023\/A:1019103228471","volume":"5","author":"C. H. Lee","year":"1999","unstructured":"Lee, C. H., Hwang, M.-S., & Yang, W. P. (1999). Enhanced privacy and authentication for the global system for mobile communications. Wireless Networks, 5, 231\u2013243.","journal-title":"Wireless Networks"},{"issue":"5","key":"9276_CR20","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1002\/wcm.495","volume":"8","author":"C.-C. Lee","year":"2008","unstructured":"Lee, C.-C., Hwang, M.-S., & Liao, I.-E. (2008). A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communications and Mobile Computing, 8(5), 661\u2013672.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"2","key":"9276_CR21","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1049\/ip-com:20030290","volume":"150","author":"C.-C. Lee","year":"2003","unstructured":"Lee, C.-C., Hwang, M.-S., & Yang, W.-P. (2003). Extension of authentication protocol for GSM. IEE Proceedings. Communications, 150(2), 91\u201395.","journal-title":"IEE Proceedings. Communications"},{"issue":"1","key":"9276_CR22","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3923\/itj.2010.61.66","volume":"38","author":"C.-C. Lee","year":"2009","unstructured":"Lee, C.-C., Liao, I.-E., & Hwang, M.-S. (2009). An extended certificate-based authentication and security protocol for mobile networks. Information Technology and Control, 38(1), 61\u201366.","journal-title":"Information Technology and Control"},{"issue":"3","key":"9276_CR23","first-page":"291","volume":"6","author":"J. Li","year":"2008","unstructured":"Li, J., Zhang, P., & Sampalli, S. (2008). Improved security mechanism for mobile IPv6. International Journal of Network Security, 6(3), 291\u2013300.","journal-title":"International Journal of Network Security"},{"key":"9276_CR24","unstructured":"Lo, C.-C., & Chen, Y.-J. (1999). A secure communication architecture for GSM networks. In IEEE Pacific Rim conference on communications, computers and signal processing (pp.\u00a0221\u2013224)."},{"issue":"4","key":"9276_CR25","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1109\/30.809184","volume":"45","author":"C.-C. Lo","year":"1999","unstructured":"Lo, C.-C., & Chen, Y.-J. (1999). Secure communication mechanisms for GSM networks. IEEE Transactions on Consumer Electronics, 45(4), 1074\u20131080.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"9276_CR26","unstructured":"Mallinder, B. (1988). An overview of the GSM system. In Proc. third Nordic seminar on digital land mobile radio commun. (pp.\u00a012\u201315), Copenhagen, Denmark, Sep. 1988."},{"issue":"2","key":"9276_CR27","first-page":"93","volume":"10","author":"A. Mitrokotsa","year":"2010","unstructured":"Mitrokotsa, A., Komninos, N., & Douligeris, C. (2010). Protection of an intrusion detection engine with watermarking in ad hoc networks. International Journal of Network Security, 10(2), 93\u2013106.","journal-title":"International Journal of Network Security"},{"issue":"2","key":"9276_CR28","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/65.272938","volume":"8","author":"R. Molva","year":"1994","unstructured":"Molva, R., Samfat, D., & Tsudik, G. (1994). Authentication of mobile users. IEEE Network, 8(2), 26\u201334.","journal-title":"IEEE Network"},{"issue":"2","key":"9276_CR29","first-page":"131","volume":"2","author":"A. Patcha","year":"2006","unstructured":"Patcha, A., & Park, J.-M. (2006). A game theoretic formulation for intrusion detection in mobile ad hoc networks. International Journal of Network Security, 2(2), 131\u2013137.","journal-title":"International Journal of Network Security"},{"key":"9276_CR30","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/35.210402","volume":"31","author":"M. Rahnema","year":"1993","unstructured":"Rahnema, M. (1993). Overview of the GSM system and protocol architecture. IEEE Communication Magazine, 31, 92\u2013100.","journal-title":"IEEE Communication Magazine"},{"issue":"2","key":"9276_CR31","first-page":"227","volume":"4","author":"W. Ren","year":"2007","unstructured":"Ren, W. (2007). Pulsing RoQ DDoS attacking and defense scheme in mobile ad hoc networks. International Journal of Network Security, 4(2), 227\u2013234.","journal-title":"International Journal of Network Security"},{"key":"9276_CR32","first-page":"26","volume":"8","author":"D. Samfat","year":"1994","unstructured":"Samfat, D., Molva, R., & Tsudik, G. (1994). Authentication of mobile users. IEEE Network, 8, 26\u201334.","journal-title":"IEEE Network"},{"key":"9276_CR33","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/S0140-3664(99)00010-9","volume":"22","author":"J. F. Stach","year":"1999","unstructured":"Stach, J. F., Park, E. K., & Makki, K. (1999). Performance of an enhanced GSM protocol supporting non-repudiation of service. Computer Communications, 22, 675\u2013680.","journal-title":"Computer Communications"},{"key":"9276_CR34","volume-title":"Cryptography and network security: principles and practice","author":"W. Stallings","year":"1999","unstructured":"Stallings, W. (1999). Cryptography and network security: principles and practice (2nd\u00a0edn.). New York: Prentice Hall.","edition":"2"},{"issue":"2","key":"9276_CR35","first-page":"158","volume":"6","author":"C. Xenakis","year":"2008","unstructured":"Xenakis, C. (2008). Security measures and weaknesses of the GPRS security architecture. International Journal of Network Security, 6(2), 158\u2013169.","journal-title":"International Journal of Network Security"},{"issue":"1","key":"9276_CR36","first-page":"38","volume":"1","author":"C.-Y. Yang","year":"2005","unstructured":"Yang, C.-Y., & Shiu, C.-Y. (2005). A secure mobile IP registration protocol. International Journal of Network Security, 1(1), 38\u201345.","journal-title":"International Journal of Network Security"},{"issue":"2","key":"9276_CR37","first-page":"201","volume":"4","author":"A. Zwierko","year":"2007","unstructured":"Zwierko, A., & Kotulski, Z. (2007). Integrity of mobile agents: a new approach. International Journal of Network Security, 4(2), 201\u2013211.","journal-title":"International Journal of Network Security"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-009-9276-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-009-9276-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-009-9276-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T09:17:43Z","timestamp":1634721463000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-009-9276-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,15]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["9276"],"URL":"https:\/\/doi.org\/10.1007\/s11235-009-9276-4","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,15]]}}}