{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T22:46:11Z","timestamp":1648680371604},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T00:00:00Z","timestamp":1358985600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s11277-013-1022-2","type":"journal-article","created":{"date-parts":[[2013,1,23]],"date-time":"2013-01-23T06:34:03Z","timestamp":1358922843000},"page":"437-446","source":"Crossref","is-referenced-by-count":2,"title":["Double Delegation-Based Authentication and Key Agreement Protocol for PCSs"],"prefix":"10.1007","volume":"72","author":[{"given":"Hsia-Hung","family":"Ou","sequence":"first","affiliation":[]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,24]]},"reference":[{"issue":"2","key":"1022_CR1","first-page":"285","volume":"6","author":"W-B Lee","year":"2008","unstructured":"Lee, W.-B., & Yeh, C.-K. (2008). A self-concealing mechanism for authentication of portable communication systems. International Journal of Network Security, 6(2), 285\u2013290.","journal-title":"International Journal of Network Security"},{"key":"1022_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2009\/478157","volume":"2009","author":"H-H Ou","year":"2009","unstructured":"Ou, H.-H., Hwang, M.-S., & Jan, J.-K. (2009). The UMTS-AKA protocols for intelligent transportation systems. EURASIP Journal on Wireless Communications and Networking, 2009, 1\u201312.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"1022_CR3","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1007\/s11277-009-9818-9","volume":"55","author":"H-H Ou","year":"2010","unstructured":"Ou, H.-H., Hwang, M.-S., & Jan, J.-K. (2010). A provable billing protocol on the current UMTS. Wireless Personal Communications, 55, 551\u2013556.","journal-title":"Wireless Personal Communications"},{"key":"1022_CR4","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jss.2009.08.019","volume":"83","author":"H-H Ou","year":"2010","unstructured":"Ou, H.-H., Hwang, M.-S., & Jan, J.-K. (2010). A cocktail protocol with the authentication and key agreement on the UMTS. Journal of Systems and Software, 83, 316\u2013325.","journal-title":"Journal of Systems and Software"},{"issue":"3","key":"1022_CR5","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1002\/ett.1460","volume":"22","author":"M-S Hwang","year":"2011","unstructured":"Hwang, M.-S., Chong, S.-K., & Ou, H.-H. (2011). On the security of an enhanced UMTS authentication and key agreement protocol. European Transactions on Telecommunications, 22(3), 99\u2013112.","journal-title":"European Transactions on Telecommunications"},{"issue":"3","key":"1022_CR6","first-page":"227","volume":"9","author":"C-K Yeh","year":"2009","unstructured":"Yeh, C.-K., & Lee, W.-B. (2009). An overall cost-effective authentication technique for the global mobility network. International Journal of Network Security, 9(3), 227\u2013232.","journal-title":"International Journal of Network Security"},{"issue":"2","key":"1022_CR7","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1049\/ip-com:20030290","volume":"150","author":"C-C Lee","year":"2003","unstructured":"Lee, C.-C., Hwang, M.-S., & Yang, W.-P. (2003). Extension of authentication protocol for GSM. IEE Proceedings V Communications, 150(2), 91\u201395.","journal-title":"IEE Proceedings V Communications"},{"key":"1022_CR8","doi-asserted-by":"crossref","unstructured":"Lee, C.-H., Hwang, M.-S., Yang, W.-P. (1999). Enhanced privacy and authentication for the global system of mobile communications. Wireless Networks, 5, 231\u2013243.","DOI":"10.1023\/A:1019103228471"},{"key":"1022_CR9","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/TWC.2004.840220","volume":"4","author":"W-B Lee","year":"2005","unstructured":"Lee, W.-B., & Yeh, C.-K. (2005). A new delegation-based authentication protocol for use in portable communication systems. IEEE Transactions on Wireless Communications, 4, 57\u201364.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"1022_CR10","first-page":"1039","volume":"7","author":"C-C Lee","year":"2011","unstructured":"Lee, C.-C., Lin, T.-C., Tzeng, S.-F., & Hwang, M.-S. (2011). Generalization of proxy signature based on factorization. International Journal of Innovative Computing, Information and Control, 7(3), 1039\u20131054.","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"1022_CR11","doi-asserted-by":"crossref","unstructured":"Lee, T.-F., Chang, S.-H., Hwang, T., & Chong, S.-K. (2009). Enhanced delegation-based authentication protocol for PCSs. IEEE Transactions on Wireless Communications, 8(5), 2166\u20136171.","DOI":"10.1109\/TWC.2009.070032"},{"key":"1022_CR12","doi-asserted-by":"crossref","first-page":"1408","DOI":"10.1109\/TWC.2008.061080","volume":"7","author":"C Tang","year":"2008","unstructured":"Tang, C., & Wu, D. (2008). An efficient mobile authentication scheme for wireless networks. IEEE Transactions on Wireless Communications, 7, 1408\u20131416.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"1022_CR13","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1016\/j.amc.2004.06.034","volume":"164","author":"C-C Lee","year":"2005","unstructured":"Lee, C.-C., Hwang, M.-S., & Yang, W.-P. (2005). A new blind signature based on the discrete logarithm problem for untraceability. Applied Mathematics and Computation, 164, 837\u2013841.","journal-title":"Applied Mathematics and Computation"},{"issue":"2","key":"1022_CR14","first-page":"106","volume":"11","author":"NA Moldovyan","year":"2010","unstructured":"Moldovyan, N. A., & Moldovyan, A. A. (2010). Blind collective signature protocol based on discrete logarithm problem. International Journal of Network Security, 11(2), 106\u2013113.","journal-title":"International Journal of Network Security"},{"issue":"5","key":"1022_CR15","first-page":"665","volume":"8","author":"C-C Lee","year":"2008","unstructured":"Lee, C.-C., Hwang, M.-S., & Liao, I.-E. (2008). A new authentication protocol based on pointer forwarding for mobile communications. Wireless Communications & Mobile Computing, 8(5), 665\u2013672.","journal-title":"Wireless Communications & Mobile Computing"},{"issue":"1","key":"1022_CR16","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s11235-009-9276-4","volume":"46","author":"C-C Lee","year":"2011","unstructured":"Lee, C.-C., Liao, I.-E., & Hwang, M.-S. (2011). An efficient authentication protocol for mobile communications. Telecommunication Systems, 46(1), 31\u201341.","journal-title":"Telecommunication Systems"},{"issue":"4","key":"1022_CR17","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1504\/IJMC.2012.048139","volume":"10","author":"H-H Ou","year":"2012","unstructured":"Ou, H.-H., Lin, I.-C., & Hwang, M.-S. (2012). An effective AKA protocol for UMTS. International Journal of Mobile Communications, 10(4), 427\u2013448.","journal-title":"International Journal of Mobile Communications"},{"issue":"6","key":"1022_CR18","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"1022_CR19","first-page":"264","volume":"9","author":"ML Das","year":"2009","unstructured":"Das, M. L., Saxena, A., & Phatak, D. B. (2009). Algorithms and approaches of proxy signature: A survey. International Journal of Network Security, 9(3), 264\u2013284.","journal-title":"International Journal of Network Security"},{"issue":"1","key":"1022_CR20","first-page":"22","volume":"14","author":"S Mashhadi","year":"2012","unstructured":"Mashhadi, S. (2012). A novel secure self proxy signature scheme. International Journal of Network Security, 14(1), 22\u201326.","journal-title":"International Journal of Network Security"},{"key":"1022_CR21","first-page":"1338","volume":"E79\u2013A","author":"M Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., & Okamoto, E. (1996). Delegation of the power to sign messages. IEEE Transactions on Fundamentals, E79\u2013A, 1338\u20131353.","journal-title":"IEEE Transactions on Fundamentals"},{"issue":"2","key":"1022_CR22","first-page":"114","volume":"11","author":"J Liu","year":"2010","unstructured":"Liu, J., & Li, J. (2010). A better improvement on the integrated Diffie-Hellman-DSA key agreement protocol. International Journal of Network Security, 11(2), 114\u2013117.","journal-title":"International Journal of Network Security"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1022-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-013-1022-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1022-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:08:50Z","timestamp":1559380130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-013-1022-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,24]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["1022"],"URL":"https:\/\/doi.org\/10.1007\/s11277-013-1022-2","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,24]]}}}