{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T15:49:43Z","timestamp":1722872983657},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,12,22]],"date-time":"2011-12-22T00:00:00Z","timestamp":1324512000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1007\/s11277-011-0486-1","type":"journal-article","created":{"date-parts":[[2011,12,21]],"date-time":"2011-12-21T19:44:05Z","timestamp":1324496645000},"page":"861-872","source":"Crossref","is-referenced-by-count":14,"title":["Extension of an Efficient 3GPP Authentication and Key Agreement Protocol"],"prefix":"10.1007","volume":"68","author":[{"given":"Cheng-Chi","family":"Lee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chin-Ling","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hsia-Hung","family":"Ou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lung Albert","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2011,12,22]]},"reference":[{"key":"486_CR1","unstructured":"3rd Generation Partnership Project. (2004). Technical specification group services and system aspects, 3G security, cryptographic algorithm requirements (Release 6). 3GPP TS 33.105 V6.0.0."},{"key":"486_CR2","unstructured":"3rd Generation Partnership Project. (2000). Technical specification group services and system aspects, 3G security, report on the evaluation of 3GPP standard confidentiality and integrity algorithm (Release 1999). 3GPP TS 33.909V1.0.0."},{"key":"486_CR3","unstructured":"3rd Generation Partnership Project. (2004). Technical specification group services and system aspects, 3G security, security architecture (Release 5). 3GPP TS 33.102 V5.5.0."},{"issue":"1","key":"486_CR4","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows M., Abadi M., Needham R. (1990) A logic of authentication. ACM Transactions on Computer Systems 8(1): 18\u201336","journal-title":"ACM Transactions on Computer Systems"},{"key":"486_CR5","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1016\/j.comcom.2005.01.015","volume":"28","author":"C. C. Chang","year":"2005","unstructured":"Chang C. C., Lee J. S., Chang Y. F. (2005) Efficient authentication protocols of GSM. Computer Communications 28: 921\u2013928","journal-title":"Computer Communications"},{"key":"486_CR6","unstructured":"Choi, Y., & Kim, S. (2004). An improvement on privacy and authentication in GSM. In Proceedings of workshop on information security applications (WISA 2004), pp. 14\u201316."},{"issue":"3","key":"486_CR7","first-page":"279","volume":"3","author":"A. P. Dominguez","year":"2006","unstructured":"Dominguez A. P. (2006) Cryptanalysis of Park\u2019s authentication protocol in wireless mobile communication systems. International Journal of Network Security 3(3): 279\u2013282","journal-title":"International Journal of Network Security"},{"key":"486_CR8","unstructured":"Huang, C. M., & Li, J. W. (2005). Authentication and key agreement protocol for UMTS with low bandwidth consumption. In 19th international conference on information networking and applications (AINA 2005) (pp. 392\u2013397)."},{"key":"486_CR9","doi-asserted-by":"crossref","unstructured":"Juang, W. S., & Wu, J. L. (2007). Efficient 3GPP authentication and key agreement with robust user privacy protection. In IEEE communications and networking conference (WCNC2007) (pp. 2720\u20132725).","DOI":"10.1109\/WCNC.2007.505"},{"issue":"5","key":"486_CR10","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C.-C. Lee","year":"2006","unstructured":"Lee C.-C., Hwang M.-S., Liao I. E. (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics 53(5): 1683\u20131687","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"486_CR11","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1002\/wcm.495","volume":"8","author":"C.-C. Lee","year":"2008","unstructured":"Lee C.-C., Hwang M.-S., Liao I. E. (2008) A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communication and Mobile Computing 8: 661\u2013672","journal-title":"Wireless Communication and Mobile Computing"},{"key":"486_CR12","doi-asserted-by":"crossref","unstructured":"Lee, C.-C., Hwang, M.-S., & Yang, W.-P. (2003). Extension of authentication protocol for GSM. IEE Proceedings-Communications, 150(2), 91\u201395.","DOI":"10.1049\/ip-com:20030290"},{"issue":"2","key":"486_CR13","first-page":"118","volume":"1","author":"J. J. Shen","year":"2005","unstructured":"Shen J. J., Lin C. Y., Yang H. W. (2005) Cryptanalysis of a new efficient mAKEP for wireless communications. International Journal of Network Security 1(2): 118\u2013121","journal-title":"International Journal of Network Security"},{"issue":"1","key":"486_CR14","first-page":"1","volume":"2","author":"C. C. Yang","year":"2006","unstructured":"Yang C. C., Chu K. H., Yang Y. W. (2006) 3G and WLAN interworking security: current status and key. International Journal of Network Security 2(1): 1\u201313","journal-title":"International Journal of Network Security"},{"issue":"2","key":"486_CR15","doi-asserted-by":"crossref","first-page":"734","DOI":"10.1109\/TWC.2004.842941","volume":"4","author":"M. Zhang","year":"2005","unstructured":"Zhang M., Fang Y. (2005) Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications 4(2): 734\u2013742","journal-title":"IEEE Transactions on Wireless Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-011-0486-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-011-0486-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-011-0486-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:08:41Z","timestamp":1559394521000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-011-0486-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,22]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["486"],"URL":"https:\/\/doi.org\/10.1007\/s11277-011-0486-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,12,22]]}}}