{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:32:32Z","timestamp":1759091552987},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T00:00:00Z","timestamp":1403654400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11277-014-1879-8","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T14:50:58Z","timestamp":1403621458000},"page":"661-686","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Design and Implementation to Authentication over a GSM System Using Certificate-Less Public Key Cryptography (CL-PKC)"],"prefix":"10.1007","volume":"79","author":[{"given":"Imran","family":"Memon","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammed Ramadan","family":"Mohammed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rizwan","family":"Akhtar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hina","family":"Memon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad Hammad","family":"Memon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Riaz Ahmed","family":"Shaikh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,6,25]]},"reference":[{"key":"1879_CR1","unstructured":"Bridle, J. S. (1990). Probabilistic interpretation of feedforward classification network outputs, with relationships to statistical pattern recognition. In Neurocomputing (pp. 227\u2013236). Berlin: Springer."},{"issue":"3","key":"1879_CR2","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1137\/0213035","volume":"13","author":"RE Tarjan","year":"1984","unstructured":"Tarjan, R. E., & Yannakakis, M. (1984). Simple linear-time algorithms to test chordality of graphs, test acyclicity of hypergraphs, and selectively reduce acyclic hypergraphs. SIAM Journal on Computing, 13(3), 566\u2013579.","journal-title":"SIAM Journal on Computing"},{"key":"1879_CR3","doi-asserted-by":"crossref","unstructured":"Goswami, S., Laha, S., Chakraborty, S., & Dhar, A. (2012). Enhancement of GSM Security using elliptic curve cryptography algorithm. In Intelligent systems, modelling and simulation (ISMS), 2012 third international conference on (pp. 639\u2013644). IEEE.","DOI":"10.1109\/ISMS.2012.137"},{"issue":"3","key":"1879_CR4","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2535522","volume":"16","author":"B Driessen","year":"2013","unstructured":"Driessen, B., Hund, R., Willems, C., Paar, C., & Holz, T. (2013). An experimental security analysis of two satphone standards. ACM Transactions on Information and System Security (TISSEC), 16(3), 10.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"1879_CR5","doi-asserted-by":"crossref","unstructured":"Forsgren, H., Grahn, K., Karvi, T., & Pulkkis, G. (2010). Security and trust of public key cryptography options for HIP. In Computer and information technology (CIT), 2010 IEEE 10th international conference on (pp. 1079\u20131084). IEEE.","DOI":"10.1109\/CIT.2010.197"},{"key":"1879_CR6","doi-asserted-by":"crossref","unstructured":"Seo, S. H., Won, J., & Bertino, E. (2014). POSTER: A pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. In Proceedings of the 4th ACM conference on data and application security and privacy (pp. 143\u2013146). ACM.","DOI":"10.1145\/2557547.2557582"},{"key":"1879_CR7","doi-asserted-by":"crossref","unstructured":"Islam, S. H., & Biswas, G. (2012). Certificateless strong designated verifier multisignature scheme using bilinear pairings. In Proceedings of the international conference on advances in computing, communications and informatics (pp. 540\u2013546). ACM.","DOI":"10.1145\/2345396.2345485"},{"key":"1879_CR8","unstructured":"Yin, X., & Han, J. (2003). CPAR: Classification based on predictive association rules, Proceedings 2003 SIAM International Conference on Data Mining (SDM\u201903), San Francisco CA, pp. 331\u2013335."},{"key":"1879_CR9","doi-asserted-by":"crossref","unstructured":"Liu, J. K., Au, M. H., & Susilo, W. (2007). Self-generated-certificate public key cryptography and certificateless signature\/encryption scheme in the standard model. In Proceedings of the 2nd ACM symposium on information, computer and communications security, (pp. 273\u2013283). ACM.","DOI":"10.1145\/1229285.1266994"},{"key":"1879_CR10","doi-asserted-by":"crossref","unstructured":"Cho, J.-H., Chan, K. S., & Chen, I.-R. (2013). Composite trust-based public key management in mobile ad hoc networks. In Proceedings of the 28th annual ACM symposium on applied computing, (pp. 1949\u20131956). ACM.","DOI":"10.1145\/2480362.2480725"},{"key":"1879_CR11","doi-asserted-by":"crossref","unstructured":"Meyer, U., & Wetzel, S. (2004). A man-in-the-middle attack on UMTS. In Proceedings of the 3rd ACM workshop on wireless security (pp. 90\u201397). ACM.","DOI":"10.1145\/1023646.1023662"},{"issue":"1","key":"1879_CR12","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/JCN.2012.6184555","volume":"14","author":"J Teng","year":"2012","unstructured":"Teng, J., & Wu, C. (2012). A provable authenticated certificateless group key agreement with constant rounds. Journal of Communications and Networks, 14(1), 104\u2013110.","journal-title":"Journal of Communications and Networks"},{"key":"1879_CR13","doi-asserted-by":"crossref","unstructured":"Hableel, E., Byon, Y.-J., & Beak, J. (2013). Public key infrastructure for UAE: A case study. In Proceedings of the 6th international conference on security of information and networks (pp. 336\u2013340). ACM.","DOI":"10.1145\/2523514.2527099"},{"key":"1879_CR14","doi-asserted-by":"crossref","unstructured":"Ray, S., & Biswas, G. (2012). An ECC based public key infrastructure usable for mobile applications. In Proceedings of the second international conference on computational science, engineering and information technology (pp. 562\u2013568). ACM.","DOI":"10.1145\/2393216.2393310"},{"key":"1879_CR15","doi-asserted-by":"crossref","unstructured":"Praveen, I., & Sethumadhavan, M. (2012). A more efficient and faster pairing computation with cryptographic security. In Proceedings of the first international conference on security of internet of things (pp. 145\u2013149). ACM.","DOI":"10.1145\/2490428.2490448"},{"key":"1879_CR16","doi-asserted-by":"crossref","unstructured":"Nicanfar, H., TalebiFard, P., Hosseininezhad, S., Leung, V., & Damm, M. (2013). Security and privacy of electric vehicles in the smart grid context: problem and solution. In Proceedings of the third ACM international symposium on design and analysis of intelligent vehicular networks and applications (pp. 45\u201354). ACM.","DOI":"10.1145\/2512921.2512926"},{"issue":"1","key":"1879_CR17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2108242.2108247","volume":"59","author":"M Otto","year":"2012","unstructured":"Otto, M. (2012). Highly acyclic groups, hypergraph covers, and the guarded fragment. Journal of the ACM (JACM), 59(1), 5.","journal-title":"Journal of the ACM (JACM)"},{"key":"1879_CR18","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S., & Paterson, K. (2003) Certificateless public key cryptography. In Advances in Cryptology-Asiacrypt\u20192003, Lecture Notes in Computer Science (vol. 2894, pp. 452\u2013473, Springer).","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"1879_CR19","doi-asserted-by":"crossref","unstructured":"Hanaoka, G. (2013). On the properties of public key encryption from group signatures. In Proceedings of the first ACM workshop on Asia public-key cryptography (pp. 1\u20132). ACM.","DOI":"10.1145\/2484389.2484391"},{"key":"1879_CR20","doi-asserted-by":"crossref","unstructured":"Li, J., Huang, X., Mu, Y., Susilo, W., & Wu, Q. (2007). Certificate-based signature: Security model and efficient construction. In Public key infrastructure (pp. 110\u2013125). Springer.","DOI":"10.1007\/978-3-540-73408-6_8"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1879-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-014-1879-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-1879-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T14:51:29Z","timestamp":1689346289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-014-1879-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,25]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["1879"],"URL":"https:\/\/doi.org\/10.1007\/s11277-014-1879-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,25]]}}}