{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T12:10:16Z","timestamp":1673352616838},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2006,1]]},"DOI":"10.1007\/s11277-006-8864-9","type":"journal-article","created":{"date-parts":[[2005,12,19]],"date-time":"2005-12-19T09:24:57Z","timestamp":1134984297000},"page":"163-194","source":"Crossref","is-referenced-by-count":2,"title":["Alternative Schemes for Dynamic Secure VPN Deployment in UMTS"],"prefix":"10.1007","volume":"36","author":[{"given":"Christos","family":"Xenakis","sequence":"first","affiliation":[]},{"given":"Lazaros","family":"Merakos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8864_CR1","unstructured":"3GPP TS 23.002 (v3.6.0), \u201cNetwork Architecture\u201d, Release '99, Sept. 2002."},{"key":"8864_CR2","doi-asserted-by":"crossref","unstructured":"B. Gleeson, A. Lin, J. Heinanen, G. Armitage, and A. Malis, \u201cA Framework for IP Based Virtual Private Networks\u201d, RFC 2764, Feb. 2000.","DOI":"10.17487\/rfc2764"},{"key":"8864_CR3","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson, \u201cSecurity Architecture for the Internet Protocol\u201d, RFC 2401, Nov. 1998.","DOI":"10.17487\/rfc2401"},{"key":"8864_CR4","doi-asserted-by":"crossref","unstructured":"D. Harkins and D. Carrel, \u201cThe Internet Key Exchange (IKE)\u201d, RFC 2409, Nov. 1998.","DOI":"10.17487\/rfc2409"},{"key":"8864_CR5","doi-asserted-by":"crossref","unstructured":"B. Aboda and W. Dixon, \u201cIPsec-Network Address Translation (NAT) Compatibility Requirements\u201d, RFC 3715, March 2004.","DOI":"10.17487\/rfc3715"},{"key":"8864_CR6","unstructured":"GSM 03.60, \u201cGPRS Service Description\u201d, Stage 2, 1998."},{"key":"8864_CR7","unstructured":"3GPP TS 23.060 (v3.16.0), \u201cGPRS Tunneling Protocol (GTP) Across the Gn and Gp Interface\u201d, Release '99, March 2003."},{"key":"8864_CR8","doi-asserted-by":"crossref","unstructured":"A. Huttunen et al., \u201cUDP Encapsulation of IPsec Packets\u201d, draft-ietf-ipsec-udp-encaps-09.txt, Internet Draft, May 2004.","DOI":"10.17487\/rfc3948"},{"key":"8864_CR9","unstructured":"3GPP TS 24.008 (v3.15.0), \u201cMobile Radio Interface Layer 3 Specification; Core Network Protocols \u2013 Stage 3\u201d, Release '99, March 2003."},{"key":"8864_CR10","unstructured":"C. Xenakis, E. Gazis, and L. Merakos, \u201cSecure VPN Deployment in GPRS Mobile Network\u201d, in Proc. European Wireless 2002, Florence Italy, pp. 293\u2013300, Feb. 2002."},{"key":"8864_CR11","doi-asserted-by":"crossref","unstructured":"C. Xenakis and L. Merakos, \u201cDynamic Network-Based Secure VPN Deployment in GPRS\u201d, in Proc. PIMRC 2002, Lisboa, Portugal, pp. 1260\u20131266, Sept. 2002.","DOI":"10.1109\/PIMRC.2002.1045231"},{"issue":"6","key":"8864_CR12","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MNET.2002.1081763","volume":"16","author":"C. Xenakis","year":"Nov\/Dec. 2002","unstructured":"C. Xenakis and L. Merakos, \u201cOn Demand Network-Wide VPN Deployment in GPRS\u201d, IEEE Network, Vol. 16, No. 6, pp. 28\u201337, Nov\/Dec. 2002.","journal-title":"IEEE Network"},{"key":"8864_CR13","unstructured":"3GPP TS 25.331 (v3.14.0), \u201cRadio Resource Control (RRC) Protocol Specification\u201d, Release '99, March 2003."},{"key":"8864_CR14","unstructured":"3GPP TS 25.321 (v3.15.0), \u201cMedium Access Control (MAC) Protocol Specification\u201d, Release '99, March 2003."},{"key":"8864_CR15","doi-asserted-by":"crossref","unstructured":"T. Kivinen et al., \u201cNegotiation of NAT-Traversal in the IKE\u201d, draft-ietf-ipsec-t-ike-08.txt, Internet Draft, Feb. 2004.","DOI":"10.17487\/rfc3947"},{"key":"8864_CR16","unstructured":"3GPP TS 25.323 (v3.10.0), \u201cPacket Data Convergence Protocol (PDCP) Specification\u201d, Release '99, Sept. 2002."},{"key":"8864_CR17","unstructured":"3GPP TS 25.322 (v3.15.0), \u201cRadio Link Control (RLC) Protocol Specification\u201d, Release '99, Dec. 2002."},{"key":"8864_CR18","unstructured":"3GPP TS 25.301 (v3.11.0), \u201cRadio Interface Protocol Architecture\u201d, Release '99, Sept. 2002."},{"issue":"2","key":"8864_CR19","first-page":"15","volume":"4","author":"E. Danielyan","year":"June 2001","unstructured":"E. Danielyan, \u201cGoodbye DES, Welcome AES\u201d, Cisco The Internet Protocol Journal, Vol. 4, No. 2, pp 15\u201321, June 2001.","journal-title":"Cisco The Internet Protocol Journal"},{"key":"8864_CR20","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"Nov 1976","unstructured":"W. Diffie and M.E. Hellman, \u201cNew Directions in Cryptography\u201d, IEEE Trans. Info. Theory, Vol. 22, pp. 644\u2013654, Nov 1976.","journal-title":"IEEE Trans. Info. Theory"},{"issue":"12","key":"8864_CR21","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/35.968814","volume":"39","author":"V. Gupta","year":"Dec. 2001","unstructured":"V. Gupta and S. Gupta, \u201cSecuring the Wireless Internet\u201d, IEEE Communications Magazine, Vol. 39, No. 12, pp. 68\u201374, Dec. 2001.","journal-title":"IEEE Communications Magazine"},{"issue":"18","key":"8864_CR22","doi-asserted-by":"crossref","first-page":"2052","DOI":"10.1016\/S0140-3664(03)00188-9","volume":"26","author":"K. Lam","year":"Dec. 2003","unstructured":"K. Lam et al., \u201cLightweight Security for Mobile Commerce Transactions\u201d, Computer Communications, Vol. 26, No. 18, pp. 2052\u20132060, Dec. 2003.","journal-title":"Computer Communications"},{"issue":"7","key":"8864_CR23","doi-asserted-by":"crossref","first-page":"638","DOI":"10.1016\/j.comcom.2003.12.004","volume":"27","author":"C. Xenakis","year":"May 2004","unstructured":"C. Xenakis and L. Merakos, \u201cSecurity in Third Generation Mobile Networks\u201d, Computer Communications, Vol. 27, No. 7, pp. 638\u2013650, May 2004.","journal-title":"Computer Communications"},{"key":"8864_CR24","unstructured":"ETSI, Universal Mobile Telecommunication System (UMTS); Selection Procedures for the Choice of Radio Transmission Technologies of the UMTS, Technical Report TR 101 112 v3.2.0, 1998."},{"key":"8864_CR25","unstructured":"Wireless Application Forum (WAP), WAP specifications, URL: http:\/\/www.wapforum.org\/what\/technical.htm."},{"key":"8864_CR26","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"Feb. 1978","unstructured":"R. Rivest, A. Shamir, and L.M. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems\u201d, Commun. ACM, Vol. 21, pp. 120\u2013126, Feb. 1978.","journal-title":"Commun. ACM"},{"issue":"18","key":"8864_CR27","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1016\/j.comcom.2004.07.001","volume":"27","author":"W. Itani","year":"Dec. 2004","unstructured":"W. Itani and A. Kayssi, \u201cSPECSA: A Scalable, Policy-Driven, Extensible, and Customizable Security Architecture for Wireless Enterprise Applications\u201d, Computer Communications, Vol. 27, No. 18, pp. 1825\u20131839, Dec. 2004.","journal-title":"Computer Communications"},{"issue":"2","key":"8864_CR28","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MWC.2002.998526","volume":"9","author":"J. Al-Muhtadi","year":"April 2002","unstructured":"J. Al-Muhtadi, D. Mickunas, and R. Campbell, \u201cA Lightweight Reconfigurable Security Mechanism for 3G\/4G Mobile Devices\u201d, IEEE Wireless Communications, Vol. 9, No. 2, pp. 60\u201365, April 2002.","journal-title":"IEEE Wireless Communications"},{"key":"8864_CR29","doi-asserted-by":"crossref","unstructured":"W. Itani and A. Kayssi, \u201cJ2ME End-to-End Security for M-commerce\u201d, in Proc. IEEE Wireless Communications and Networking Conference 2003.","DOI":"10.1109\/WCNC.2003.1200696"},{"key":"8864_CR30","doi-asserted-by":"crossref","unstructured":"P.M. Feder, N.Y. Lee, and S. Martin-Leon, \u201cA Seamless Mobile VPN Data Solution For UMTS and WLAN Users\u201d, in Proc. 4th International Conference on 3G Mobile Communication Technologies, pp. 217\u2013221, June 2003.","DOI":"10.1049\/cp:20030366"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-006-8864-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-006-8864-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-006-8864-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T17:06:02Z","timestamp":1586624762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-006-8864-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,1]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["8864"],"URL":"https:\/\/doi.org\/10.1007\/s11277-006-8864-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,1]]}}}