{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T12:58:50Z","timestamp":1648990730160},"reference-count":9,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2003,12,1]],"date-time":"2003-12-01T00:00:00Z","timestamp":1070236800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2003,12]]},"DOI":"10.1016\/s1389-1286(03)00318-9","type":"journal-article","created":{"date-parts":[[2003,7,7]],"date-time":"2003-07-07T13:47:57Z","timestamp":1057585677000},"page":"777-785","source":"Crossref","is-referenced-by-count":9,"title":["Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications"],"prefix":"10.1016","volume":"43","author":[{"given":"A.M.","family":"Barbancho","sequence":"first","affiliation":[]},{"given":"A.","family":"Peinado","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(03)00318-9_BIB1","unstructured":"W.D. Lin, J.K. Jan, A wireless-based authentication and anonymous channels for large scale area, in: Proc. Sixth IEEE Symposium on Computers and Communications (ISCC\u201901), 3\u20135 July, Tunisia, 2001, pp. 36\u201341"},{"key":"10.1016\/S1389-1286(03)00318-9_BIB2","unstructured":"N. Asokan, Security issues in mobile computing. Technical Report, Department of Computer Science, University of Waterloo, 1995"},{"key":"10.1016\/S1389-1286(03)00318-9_BIB3","unstructured":"3G TS 21.133, Third Generation Partnership Project; Technical Specification Group (TSG); 3G Security; Security Threats and Requirements"},{"key":"10.1016\/S1389-1286(03)00318-9_BIB4","unstructured":"3G TS 33.102, Third Generation Partnership Project; Technical Specification Group (TSG); 3G Security; Security Architecture"},{"key":"10.1016\/S1389-1286(03)00318-9_BIB5","unstructured":"3G TS 33.120, Third Generation Partnership Project; Technical Specification Group (TSG); 3G Security; Security Principles and Objectives"},{"key":"10.1016\/S1389-1286(03)00318-9_BIB6","doi-asserted-by":"crossref","unstructured":"B. Pfitzmann, Breaking an efficient anonymous channel. Advances in cryptology, in: Proc. EuroCrypt\u201994, Lecture Notes in Computer Science, vol. 950, Springer, Berlin, 1995, pp. 332\u2013340","DOI":"10.1007\/BFb0053448"},{"key":"10.1016\/S1389-1286(03)00318-9_BIB7","doi-asserted-by":"crossref","unstructured":"C. Park, K. Itoh, K. Kurosawa, Efficient anonymous channel and all\/nothing election scheme, advances in cryptology, in: Proc. EuroCrypt\u201993, Lecture Notes in Computer Science, vol. 765, Springer, Berlin, 1993, pp. 248\u2013259","DOI":"10.1007\/3-540-48285-7_21"},{"key":"10.1016\/S1389-1286(03)00318-9_BIB8","doi-asserted-by":"crossref","unstructured":"D. Samfat, R. Molva, N. Asokan, Untraceability in mobile networks, in: Proc. First ACM International Conference on Mobile Computing and Network, November 1995, pp. 26\u201336","DOI":"10.1145\/215530.215548"},{"key":"10.1016\/S1389-1286(03)00318-9_BIB9","unstructured":"GSM 02.09, Digital Cellular Telecommunication System (Phase 2+); Security Aspects"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128603003189?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128603003189?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T17:06:41Z","timestamp":1585069601000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128603003189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,12]]},"references-count":9,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2003,12]]}},"alternative-id":["S1389128603003189"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(03)00318-9","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2003,12]]}}}