{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:24:42Z","timestamp":1759638282750},"reference-count":24,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[1999,4,1]],"date-time":"1999-04-01T00:00:00Z","timestamp":922924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[1999,4]]},"DOI":"10.1016\/s1389-1286(98)00021-8","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T19:04:40Z","timestamp":1027623880000},"page":"871-884","source":"Crossref","is-referenced-by-count":30,"title":["Untraceable mobility or how to travel incognito"],"prefix":"10.1016","volume":"31","author":[{"given":"Giuseppe","family":"Ateniese","sequence":"first","affiliation":[]},{"given":"Amir","family":"Herzberg","sequence":"additional","affiliation":[]},{"given":"Hugo","family":"Krawczyk","sequence":"additional","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(98)00021-8_BIB1","doi-asserted-by":"crossref","unstructured":"M. Rahnema, Overview of the GSM system and protocol architecture, IEEE Communications Magazine, April 1993.","DOI":"10.1109\/35.210402"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB2","doi-asserted-by":"crossref","unstructured":"W. Diffie, M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, November 1976.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB3","unstructured":"Cellular Digital Packet Data (CDPD) System Specification, Release 1.0, July 19, 1993."},{"key":"10.1016\/S1389-1286(98)00021-8_BIB4","doi-asserted-by":"crossref","unstructured":"R. Molva, D. Samfat, G. Tsudik, Authentication of mobile users, IEEE Network, Special Issue on Mobile Communications, Spring 1994.","DOI":"10.1109\/65.272938"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB5","doi-asserted-by":"crossref","unstructured":"D. Samfat, R. Molva, N. Asokan, Anonymity and untraceability in mobile networks, ACM Int. Conf. on Mobile Computing and Networking, November 1995.","DOI":"10.1145\/215530.215548"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB6","unstructured":"A. Fasbender, D. Kesdogan, O. Kubitz, Analysis of security and privacy in mobile-IP, 4th Int. Conf. on Telecommunication Systems Modeling and Analysis, March 1996."},{"key":"10.1016\/S1389-1286(98)00021-8_BIB7","doi-asserted-by":"crossref","unstructured":"D. Kesdogan, H. Federrath, A. Jerichow, A. Pfitzmann, Location management strategies increasing privacy in mobile communication systems, IFIP SEC'96, Proc. IFIP TC11, Chapman & Hall, London 1996, pp. 39-48.","DOI":"10.1007\/978-1-5041-2919-0_4"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB8","doi-asserted-by":"crossref","unstructured":"M. Beller, L. Chang, Y. Yacobi, Privacy and authentication on a portable communications system, IEEE JSAC, Special Issue on Wireless Personal Communications, August 1993.","DOI":"10.1109\/49.232291"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB9","unstructured":"D. Chaum, A. Fiat, M. Naor, Untraceable electronic cash, Proc. Crypto'88, August 1988."},{"key":"10.1016\/S1389-1286(98)00021-8_BIB10","doi-asserted-by":"crossref","unstructured":"D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM 28 (10) (1985) 1030\u20131044.","DOI":"10.1145\/4372.4373"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB11","doi-asserted-by":"crossref","unstructured":"Y. Frankel, A. Herzberg, P. Karger, H. Krawczyk, C. Kunzinger, M. Yung, Security issues in a CDPD wireless network, IEEE Personal Communications 2 (4) (August 1995) 16\u201327.","DOI":"10.1109\/98.403454"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB12","doi-asserted-by":"crossref","unstructured":"N. Haller, The S\/Key one-time password system, ISOC Symp. on Network and Distributed Systems Security, February 1994.","DOI":"10.17487\/rfc1760"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB13","unstructured":"C. Perkins, D. Johnson, Mobility Support in IPv6, Internet Draft, Work in Progress, draft-ietf-mobileip-ipv6-07.txt, November 1998."},{"key":"10.1016\/S1389-1286(98)00021-8_BIB14","doi-asserted-by":"crossref","unstructured":"S. Low, N. Maxemchuk, S. Paul, Anonymous credit cards, 2nd ACM Conf. on Computer and Communication Security, November 1994.","DOI":"10.1145\/191177.191199"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB15","unstructured":"C. G\u00fclc\u00fc, G. Tsudik, Mixing email with Babel, 1996 Symp. on Network and Distributed Systems Security, February 1996."},{"key":"10.1016\/S1389-1286(98)00021-8_BIB16","unstructured":"FIPS 180-1, Secure Hash Standard, Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce\/N.I.S.T., National Technical Information Service, Springfield, VA, 1994."},{"key":"10.1016\/S1389-1286(98)00021-8_BIB17","unstructured":"FIPS 186, Digital Signature Standard, Federal Information Processing Standards Publication 186, U.S. Department of Commerce\/N.I.S.T., National Technical Information Service, Springfield, VA, 1994."},{"key":"10.1016\/S1389-1286(98)00021-8_BIB18","doi-asserted-by":"crossref","unstructured":"A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996","DOI":"10.1201\/9781439821916"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB19","unstructured":"L. Cottrell, Mixmaster and remailer attacks, http:\/\/obscura.obscura.com\/~loki\/remailer\/remailer-essay.html."},{"key":"10.1016\/S1389-1286(98)00021-8_BIB20","unstructured":"The Anonymizer Web Site, http:\/\/www.anonymizer.com."},{"key":"10.1016\/S1389-1286(98)00021-8_BIB21","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication, Internet RFC 2104, February 1997.","DOI":"10.17487\/rfc2104"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB22","doi-asserted-by":"crossref","unstructured":"A. Herzberg, H. Krawczyk, G. Tsudik, On traveling incognito, 1994 IEEE Workshop on Mobile Computing Systems and Applications.","DOI":"10.1109\/WMCSA.1994.29"},{"key":"10.1016\/S1389-1286(98)00021-8_BIB23","unstructured":"Iridium LLC Web Site, http:\/\/www.iridium.com."},{"key":"10.1016\/S1389-1286(98)00021-8_BIB24","doi-asserted-by":"crossref","unstructured":"M. Reiter, A. Rubin, Anonymity loves company: anonymous web transactions with crowds, Communications of the ACM, February 1999.","DOI":"10.1145\/293411.293778"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128698000218?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128698000218?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T01:04:07Z","timestamp":1579050247000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128698000218"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,4]]},"references-count":24,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1999,4]]}},"alternative-id":["S1389128698000218"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(98)00021-8","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[1999,4]]}}}