{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T22:58:10Z","timestamp":1648853890930},"reference-count":24,"publisher":"Elsevier BV","issue":"18","license":[{"start":{"date-parts":[[2000,12,1]],"date-time":"2000-12-01T00:00:00Z","timestamp":975628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2000,12]]},"DOI":"10.1016\/s0140-3664(00)00347-9","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T20:56:47Z","timestamp":1027630607000},"page":"1777-1788","source":"Crossref","is-referenced-by-count":5,"title":["MNPA: a mobile network privacy architecture"],"prefix":"10.1016","volume":"23","author":[{"given":"B","family":"Askwith","sequence":"first","affiliation":[]},{"given":"M","family":"Merabti","sequence":"additional","affiliation":[]},{"given":"Q","family":"Shi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(00)00347-9_BIB1","unstructured":"NUA Ltd, How Many Online?, http:\/\/www.nua.ie\/, 1999."},{"key":"10.1016\/S0140-3664(00)00347-9_BIB2","doi-asserted-by":"crossref","unstructured":"J. Riley, A brave new mobile world, Computer Weekly, London, 17 June 1999, p. 14.","DOI":"10.7748\/ns1999.10.14.4.43.c2693"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB3","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/98.468359","article-title":"Current evolution of the GSM systems","volume":"2","author":"Mouly","year":"1995","journal-title":"IEEE Personal Communications"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB4","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/35.592101","article-title":"Mobile IP","volume":"35","author":"Perkins","year":"1997","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB5","doi-asserted-by":"crossref","unstructured":"L.F. Cranor, J. Reagle, M.S. Ackerman, Beyond Concern: Understanding Net Users\u2019 Attitudes About Online Privacy, AT&T Research Technical Report TR 99.4.3, 14 April 1999.","DOI":"10.1145\/336992.336995"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB6","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/65.283931","article-title":"Network intrusion detection","volume":"8","author":"Mukherjee","year":"1994","journal-title":"IEEE Network"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB7","unstructured":"D. Gregory, Q. Shi, M. Merabti, An intrusion detection system based upon autonomous mobile agents, in IFIP TC 11 14th International Conference in Information Security (SEC 98), Vienna, Austria and Budapest, Hungary, 1998."},{"key":"10.1016\/S0140-3664(00)00347-9_BIB8","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1145\/4372.4373","article-title":"Security without identification: transaction systems to make big brother obsolete","volume":"28","author":"Chaum","year":"1985","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB9","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB10","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB11","doi-asserted-by":"crossref","unstructured":"C. Gulcu, G. Tsudik, Mixing e-mail with BABEL, in SNDSS, San Diego, CA, 1996.","DOI":"10.1109\/NDSS.1996.492350"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB12","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1109\/49.668973","article-title":"Real-time mixes: a bandwidth-efficient anonymity protocol","volume":"16","author":"Jerichow","year":"1998","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB13","doi-asserted-by":"crossref","DOI":"10.1109\/49.668972","article-title":"Anonymous connections and onion routing","volume":"16","author":"Reed","year":"1998","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB14","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/32.502223","article-title":"The design and implementation of a secure auction service","volume":"22","author":"Franklin","year":"1996","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB15","unstructured":"D. Chaum, A. Fiat, M. Naor, Untraceable electronic cash, in CRYPTO \u201988, 1988."},{"key":"10.1016\/S0140-3664(00)00347-9_BIB16","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/65.272938","article-title":"Authentication of mobile users","volume":"8","author":"Molva","year":"1994","journal-title":"IEEE Network"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB17","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1109\/49.232291","article-title":"Privacy and authentication on a portable communications system","volume":"11","author":"Beller","year":"1993","journal-title":"IEEE Journal on Selected Areas In Communications"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB18","doi-asserted-by":"crossref","unstructured":"A. Herzberg, H. Krawczyk, G. Tsudik, On travelling incognito, in IEEE Workshop on Mobile Systems and Applications, 1994.","DOI":"10.1109\/WMCSA.1994.29"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB19","doi-asserted-by":"crossref","unstructured":"D. Samfat, R. Molva, N. Asokan, Untraceability in mobile networks, in MobiCom \u201995, Berkeley, CA, 1995.","DOI":"10.1145\/215530.215548"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB20","doi-asserted-by":"crossref","unstructured":"S. Hoff, K. Jakobs, D. Kesdogan, Anonymous mobility management for third generation mobile networks, in IFIP\/TC6 and TC11 Communications and Multimedia Security, Essen, Germany, 1996.","DOI":"10.1007\/978-0-387-35083-7_7"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB21","doi-asserted-by":"crossref","unstructured":"B. Askwith, M. Merabti, Q. Shi, K. Whiteley, Achieving user privacy in mobile networks, in Computer Security Applications Conference, San Diego, CA, 1997.","DOI":"10.1109\/CSAC.1997.646180"},{"key":"10.1016\/S0140-3664(00)00347-9_BIB22","unstructured":"B. Askwith, M. Merabti, Q. Shi, Accountable anonymity in mobile communications, in MoMuC \u201998, Berlin, Germany, 1998."},{"key":"10.1016\/S0140-3664(00)00347-9_BIB23","unstructured":"B. Askwith, Privacy and Security in Mobile Networks, Liverpool John Moores University, Liverpool, UK, Technical, 26 February 1998."},{"key":"10.1016\/S0140-3664(00)00347-9_BIB24","unstructured":"D.A. Cooper, A closer look at revocation and key compromise in public key infrastructures, in NISSC \u201998, Crystal City, VA, 1998."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400003479?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400003479?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T06:21:46Z","timestamp":1579242106000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366400003479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,12]]},"references-count":24,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2000,12]]}},"alternative-id":["S0140366400003479"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(00)00347-9","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2000,12]]}}}