{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T14:28:44Z","timestamp":1744900124057},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T00:00:00Z","timestamp":1391731200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s12083-014-0251-9","type":"journal-article","created":{"date-parts":[[2014,2,6]],"date-time":"2014-02-06T08:35:30Z","timestamp":1391675730000},"page":"216-228","source":"Crossref","is-referenced-by-count":12,"title":["EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks"],"prefix":"10.1007","volume":"8","author":[{"given":"Tingting","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chengzhe","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,7]]},"reference":[{"key":"251_CR1","unstructured":"Sharda (2011) What is a group of ships called? http:\/\/www.marineinsight.com\/marine\/marine-piracy-marine\/10-maritime-piracy-affected-areas-around-the-world\/"},{"key":"251_CR2","unstructured":"Yang T, Liang H, Cheng N, Shen X (2013) Towards video packets store-carry-and-forward scheduling in maritime wideband communication. accepted by IEEE GLOBECOM\u201913"},{"issue":"3","key":"251_CR3","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1504\/IJMC.2005.006582","volume":"3","author":"I Maglogiannis","year":"2005","unstructured":"Maglogiannis I, Hadjiefthymiades S, Panagiotarakis N, Hartigan P (2005) Next generation maritime communication systems. Int J Mob Commun 3(3):231\u2013248","journal-title":"Int J Mob Commun"},{"key":"251_CR4","unstructured":"Mitropoulos E (2007) E-navigation: a global resource. seaways. In: The international journal of the nautical institute"},{"issue":"2","key":"251_CR5","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1016\/j.jnca.2010.12.018","volume":"35","author":"M-T Zhou","year":"2012","unstructured":"Zhou M-T, Harada H (2012) Cognitive maritime wireless mesh\/ad hoc networks. J Netw Comput Appl 35(2):518\u2013526","journal-title":"J Netw Comput Appl"},{"key":"251_CR6","unstructured":"Cellular-news (2008) Maritime WiMAX network launched in Singapore. http:\/\/www.cellular-news.com\/story\/29749.php"},{"key":"251_CR7","doi-asserted-by":"crossref","unstructured":"Hoang VD, Ma M, Miura R, Fujise M (2007) A novel way for handover in maritime WiMAX mesh network. In: Proceedings of IEEE ITST, pp 1\u20134","DOI":"10.1109\/ITST.2007.4295918"},{"key":"251_CR8","doi-asserted-by":"crossref","unstructured":"Funk P, Blake-Wilson S (2008) Extensible authentication protocol tunneled transport layer security authenticated protocol version 0 (EAP-TTLSv0). In: RFC5281","DOI":"10.17487\/rfc5281"},{"key":"251_CR9","unstructured":"Palekar A, Simon D, Zorn G, Josefsson S (2004) Protected EAP protocol (PEAP). In: Work in Progress"},{"key":"251_CR10","first-page":"34","volume":"10","author":"G Yuan","year":"2006","unstructured":"Yuan G, ZHU K, FANG N-s, WU G-x (2006) Research and application of 802.1 x\/EAP-PEAP. Comput Eng Des 10:34","journal-title":"Comput Eng Des"},{"issue":"3","key":"251_CR11","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1016\/j.csi.2006.04.001","volume":"29","author":"R Dantu","year":"2007","unstructured":"Dantu R, Clothier G, Atri A (2007) EAP methods for wireless networks. Comput Stand Interfaces 29(3):289\u2013301","journal-title":"Comput Stand Interfaces"},{"issue":"14","key":"251_CR12","doi-asserted-by":"crossref","first-page":"1682","DOI":"10.1016\/j.comcom.2010.02.021","volume":"33","author":"F Pereniguez","year":"2010","unstructured":"Pereniguez F, Kambourakis G, Marin-Lopez R, Gritzalis S, Gomez A (2010) Privacy-enhanced fast re-authentication for EAP-based next generation network. Comput Commun 33(14):1682\u20131694","journal-title":"Comput Commun"},{"issue":"15","key":"251_CR13","doi-asserted-by":"crossref","first-page":"2651","DOI":"10.1016\/j.comnet.2010.04.014","volume":"54","author":"R Marin-Lopez","year":"2010","unstructured":"Marin-Lopez R, Pereniguez F, Bernal F, Gomez A (2010) Secure three-party key distribution protocol for fast network access in EAP-based wireless networks. Comput Netw 54(15):2651\u20132673","journal-title":"Comput Netw"},{"issue":"5","key":"251_CR14","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1016\/j.csi.2009.10.001","volume":"32","author":"R Marin-Lopez","year":"2010","unstructured":"Marin-Lopez R, Ohba Y, Pereniguez F, Gomez AF (2010) Analysis of handover key management schemes under IETF perspective. Comput Stand Interfaces 32(5):266\u2013273","journal-title":"Comput Stand Interfaces"},{"issue":"5","key":"251_CR15","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1109\/TDSC.2010.39","volume":"8","author":"AA Al Shidhani","year":"2011","unstructured":"Al Shidhani AA, Leung VC (2011) Fast and secure reauthentications for 3GPP subscribers during WiMAX-WLAN handovers. IEEE Trans Dependable Secure Comput 8(5):699\u2013713","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"8","key":"251_CR16","doi-asserted-by":"crossref","first-page":"2042","DOI":"10.3837\/tiis.2013.08.017","volume":"7","author":"R Jiang","year":"2013","unstructured":"Jiang R, Luo J, Wang X (2013) HRKT: a hierarchical route key tree based group key management for wireless sensor networks. KSII Trans Internet Inf Syst (TIIS) 7(8):2042\u20132060","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"issue":"1","key":"251_CR17","doi-asserted-by":"crossref","first-page":"82","DOI":"10.4156\/jcit.vol5.issue1.10","volume":"5","author":"HH Ngo","year":"2010","unstructured":"Ngo HH, Wu X, Le PD, Srinivasan B (2010) An individual and group authentication model for wireless network services. J Converg Inf Technol 5(1):82\u201394","journal-title":"J Converg Inf Technol"},{"issue":"4","key":"251_CR18","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1007\/s11277-010-0104-7","volume":"62","author":"Y-W Chen","year":"2012","unstructured":"Chen Y-W, Wang J-T, Chi K-H, Tseng C-C (2012) Group-based authentication and key agreement. Wirel Pers Commun 62(4):965\u2013979","journal-title":"Wirel Pers Commun"},{"key":"251_CR19","doi-asserted-by":"crossref","unstructured":"Aboudagga N, Quisquater J-J, Eltoweissy M (2007) Group authentication protocol for mobile networks. In: Proceeding of IEEE WiMOB, pp 28\u201328","DOI":"10.1109\/WIMOB.2007.4390822"},{"key":"251_CR20","doi-asserted-by":"crossref","unstructured":"Lai C, Li H, Li X, Cao J (2013) A novel group access authentication and key agreement protocol for machine-type communication. In: Transactions on emerging telecommunications technologies","DOI":"10.1002\/ett.2635"},{"key":"251_CR21","doi-asserted-by":"crossref","unstructured":"Jiang R, Lai C, Luo J, Wang X, Wang H (2013) EAP-based group authentication and key agreement protocol for machine-type communications. Int J Distrib Sensor Net 2013(2013):1\u201314","DOI":"10.1155\/2013\/304601"},{"issue":"17","key":"251_CR22","doi-asserted-by":"crossref","first-page":"3492","DOI":"10.1016\/j.comnet.2013.08.003","volume":"57","author":"C Lai","year":"2013","unstructured":"Lai C, Li H, Lu R, Shen XS (2013) SE-AKA: a secure and efficient group authentication and key agreement protocol for lte networks. Comput Netw 57(17):3492\u20133510","journal-title":"Comput Netw"},{"key":"251_CR23","unstructured":"Lai C, Li H, Lu R, Jiang R, Shen XS (2013) LGTH: a lightweight group authentication protocol for machine-type communication in LTE networks. In: Proceedings of IEEE Globecom"},{"issue":"9","key":"251_CR24","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","volume":"23","author":"R Lu","year":"2012","unstructured":"Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621\u20131631","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"251_CR25","unstructured":"Avispaautomated validation of internet security protocols. http:\/\/www.avispa-project.org"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0251-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-014-0251-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0251-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T10:56:48Z","timestamp":1565175408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-014-0251-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,7]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["251"],"URL":"https:\/\/doi.org\/10.1007\/s12083-014-0251-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,7]]}}}