{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T14:07:14Z","timestamp":1648649234748},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,8,4]],"date-time":"2009-08-04T00:00:00Z","timestamp":1249344000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1007\/s11277-009-9788-y","type":"journal-article","created":{"date-parts":[[2009,8,3]],"date-time":"2009-08-03T09:05:07Z","timestamp":1249290307000},"page":"91-103","source":"Crossref","is-referenced-by-count":5,"title":["Authentication and ID-Based Key Management Protocol in Pervasive Environment"],"prefix":"10.1007","volume":"55","author":[{"given":"Jong Sik","family":"Moon","sequence":"first","affiliation":[]},{"given":"Jong Hyuk","family":"Park","sequence":"additional","affiliation":[]},{"given":"Deok Gyu","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Im-Yeong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,4]]},"reference":[{"key":"9788_CR1","unstructured":"Kim, B. J. (2001). The Technological Trend of Next Generation Authentication Protocol DIAMETER AAA, Telecommunication Technology Association Technology Standards Issue."},{"key":"9788_CR2","doi-asserted-by":"crossref","unstructured":"Lloyd, B. (1992). William Allen Simpson, PPP Authentication Protocols, RFC 1334.","DOI":"10.17487\/rfc1334"},{"issue":"5","key":"9788_CR3","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MWC.2004.1351680","volume":"11","author":"D. H. Yang","year":"2004","unstructured":"Yang D. H., Kim S. C., Nam C. G., Moon J. S. (2004) Fixed and mobile service convergence and reconfiguration of telecommunications value chains. IEEE Wireless Communications 11(5): 42\u201347","journal-title":"IEEE Wireless Communications"},{"issue":"1","key":"9788_CR4","first-page":"123","volume":"20","author":"H. G. Kim","year":"2005","unstructured":"Kim H. G., Lee B. G., Choi D. H., Yoo S. K., Kim M. H., Lee H. D., Yoo H. J. (2005) On the International Standardization of AAA Technology. Etri Trend 20(1): 123\u2013129","journal-title":"Etri Trend"},{"issue":"7","key":"9788_CR5","first-page":"50","volume":"43","author":"H. S. Park","year":"2006","unstructured":"Park H. S., Lee H. W., Lee D. H. (2006) Integrated authentication and key management method among heterogeneous wireless mobile networks. IEEK 43(7): 50\u201359","journal-title":"IEEK"},{"key":"9788_CR6","doi-asserted-by":"crossref","unstructured":"Vollbrecht, J., Calhoun, P., Farrell, S., Gommans, L., Gross, G. de Bruihjn, B., et\u00a0al. (2000). AAA Authorization Framework, RFC 2904.","DOI":"10.17487\/rfc2904"},{"key":"9788_CR7","unstructured":"Shamir, A. (1984). Identity-based cryptosystems and signature schemes, CRYPTO\u201984, pp. 47\u201353."},{"key":"9788_CR8","unstructured":"Wang, H., Yao, G., & Jiang, Q. (2008). An identity-based group key agreement protocol from pairing, The 2008 Third International Conference on Availability, Reliability, Security (ARES), pp. 532\u2013537."},{"issue":"3","key":"9788_CR9","first-page":"307","volume":"179","author":"S. Wang","year":"2009","unstructured":"Wang S., Cao Z., Choo K.-K. R., Wang L. (2009) An improved identity-based key agreement protocol and its security proof. ISCI 179(3): 307\u2013318","journal-title":"ISCI"},{"issue":"5","key":"9788_CR10","first-page":"561","volume":"32","author":"H. J. Lee","year":"2005","unstructured":"Lee H. J., Song Y. K., Rhee M. S., Kim C. K. (2005) A scalable authentication framework for fast remote roaming with hierarchical caching. Korean Institute of Information Scientists and Engineers 32(5): 561\u2013573","journal-title":"Korean Institute of Information Scientists and Engineers"},{"key":"9788_CR11","unstructured":"Kim, G. Y., Lee, C. U., Park, S. H., Song, O. Y., & Jung, B. H. (2002). A Study on Mobile Commerce AAA Mechanism for Wireless LAN, HSI 2003, pp. 719\u2013724."},{"key":"9788_CR12","doi-asserted-by":"crossref","unstructured":"Jiang, J., He, C., & Jiang, L.-G. (2005). On the Design of Provably Secure Identity-Based Authentication and Key Exchange Protocol for Heterogeneous Wireless Access. ICCNMC, pp. 972\u2013981.","DOI":"10.1007\/11534310_102"},{"key":"9788_CR13","unstructured":"IEEE P802.21\/D7.1, (2007). Draft Standard for Local and Metropolitan Area Networks: Media Independent Handover Services."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-009-9788-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-009-9788-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-009-9788-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:05:20Z","timestamp":1559394320000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-009-9788-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8,4]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,9]]}},"alternative-id":["9788"],"URL":"https:\/\/doi.org\/10.1007\/s11277-009-9788-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,8,4]]}}}