{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:37:00Z","timestamp":1755225420967,"version":"3.43.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2001,12,1]],"date-time":"2001-12-01T00:00:00Z","timestamp":1007164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2001,12,1]],"date-time":"2001-12-01T00:00:00Z","timestamp":1007164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2001,12]]},"DOI":"10.1023\/a:1015160717604","type":"journal-article","created":{"date-parts":[[2002,12,28]],"date-time":"2002-12-28T17:32:56Z","timestamp":1041096776000},"page":"235-253","source":"Crossref","is-referenced-by-count":9,"title":["Design and Implementation of a PKI-Based End-to-End Secure Infrastructure for Mobile E-Commerce"],"prefix":"10.1007","volume":"4","author":[{"given":"Samuel T.","family":"Chanson","sequence":"first","affiliation":[]},{"given":"Tin-Wo","family":"Cheung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"404530_CR1","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/98.295357","volume":"1","author":"A. Aziz","year":"1994","unstructured":"A. Aziz and W. Diffie, \u201cPrivacy and authentication for wireless local area networks,\u201d IEEE Personal Commun. 1, 1994, 25-31.","journal-title":"IEEE Personal Commun."},{"key":"404530_CR2","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1109\/49.232291","volume":"11","author":"M. J. Beller","year":"1993","unstructured":"M. J. Beller, L.-F. Chang, and Y. Yacobi, \u201cPrivacy and authentication on a portable communication system,\u201d IEEE J. Selected Areas Commun. 11, August 1993, 821-829.","journal-title":"IEEE J. Selected Areas Commun."},{"key":"404530_CR3","doi-asserted-by":"crossref","unstructured":"S. Blake-Wilson, D. Johnson, and A. Menezes, \u201cKey agreement protocols and their security analysis,\u201d in Sixth IMA Internat. Conf. on Cryptography and Coding, December 1997.","DOI":"10.1007\/BFb0024447"},{"issue":"3","key":"404530_CR4","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/182110.182112","volume":"28","author":"U. Carlsen","year":"1994","unstructured":"U. Carlsen, \u201cOptimal privacy and authentication on a portable communications system,\u201d ACM Operating Systems Rev. 28(3), 1994, 16-23.","journal-title":"ACM Operating Systems Rev."},{"key":"404530_CR5","unstructured":"J. Clark and J. Jacob, \u201cA survey of authentication protocol literature: Version 1.0,\u201d http:\/\/www.cs.york. ac.uk\/jac\/papers\/drareview.ps.gz, 17 November 1997."},{"key":"404530_CR6","doi-asserted-by":"crossref","unstructured":"T. Dierks and C. Allen, \u201cThe TLS protocols version 1.0,\u201d RFC 2246, 1999, ftp:\/\/ftp.isi.edu\/in-notes\/rfc2246.txt.","DOI":"10.17487\/rfc2246"},{"issue":"6","key":"404530_CR7","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, \u201cNew directions in cryptography,\u201d IEEE Trans. Inform. Theory 22(6), 1976, 644-654.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"404530_CR8","unstructured":"\u201cGSM system security study,\u201d RACAL Research, http:\/\/jya.com\/gsm061088.htm, 1998."},{"key":"404530_CR9","unstructured":"Hongkong Post e-Cert, http:\/\/www.hongkongpost.gov.hk."},{"key":"404530_CR10","unstructured":"Java Card API 2.1, Sun Microsystems, http:\/\/java.sun.com\/products\/javacard."},{"key":"404530_CR11","doi-asserted-by":"crossref","unstructured":"K. H. Lee and S. J. Moon, \u201cAKA protocols for mobile communications,\u201d in Proc. of the 5th Australasian Conf. on Information Security and Privacy (ACISP 2000), 2000, pp. 400-411.","DOI":"10.1007\/10718964_33"},{"key":"404530_CR12","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/0020-0190(94)00178-2","volume":"53","author":"C. H. Lim","year":"1995","unstructured":"C. H. Lim and P. J. Lee, \u201cSeveral practical protocols for authentication and key exchange,\u201d Inform. Process. Lett. 53, 1995, 91-96.","journal-title":"Inform. Process. Lett."},{"issue":"8","key":"404530_CR13","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/4234.781006","volume":"3","author":"H.-Y. Lin","year":"1999","unstructured":"H.-Y. Lin and L. Harn, \u201cAuthentication protocols with nonrepudiation services in personal communication systems,\u201d IEEE Commun. Lett. 3(8), 1999, 236-238.","journal-title":"IEEE Commun. Lett."},{"key":"404530_CR14","doi-asserted-by":"crossref","unstructured":"R. Needham and M. Schroeder, \u201cUsing encryption for authentication in large networks of computers,\u201d Commun. ACM 21(12), 1978.","DOI":"10.1145\/359657.359659"},{"key":"404530_CR15","unstructured":"\u201cSecure Socket Layer (SSL) version 3.0,\u201d http:\/\/home.netscape.com\/eng\/ssl3."},{"key":"404530_CR16","unstructured":"\u201cSpecification of the SIM application toolkit for the Subscriber Identity Module \u2014 Mobile Equipment (SIMME) Interface (GSM11.14 version 7.1.0 release 1998),\u201d European Telecommunications Standards Institute."},{"key":"404530_CR17","unstructured":"\u201cSpecification of the SIM application toolkit for the Subscriber Identity Module \u2014 Mobile Equipment (SIMME) interface (3GPP TS 11.14 version 8.5.0),\u201d ETSI, 1999."},{"key":"404530_CR18","unstructured":"\u201cWireless application protocol architecture specification version 30 April 1998,\u201d Wireless Application Protocol Forum, http:\/\/www.wapforum.org."},{"key":"404530_CR19","unstructured":"\u201cWireless transaction protocol specification version 05 November 1999,\u201d Wireless Application Protocol Forum, http:\/\/www.wapforum.org."},{"key":"404530_CR20","unstructured":"\u201cWireless application protocol wireless transport layer security specification version 18 February 2000,\u201d Wireless Application Protocol Forum, http:\/\/www.wapforum.org."},{"key":"404530_CR21","doi-asserted-by":"crossref","unstructured":"Y. Zheng, \u201cAn authentication and security protocol for mobile computing,\u201d in Proc. of IFIP, September 1996, pp. 249-257.","DOI":"10.1007\/978-0-387-34980-0_25"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1015160717604.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1015160717604\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1015160717604.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T11:59:13Z","timestamp":1755086353000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1015160717604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,12]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2001,12]]}},"alternative-id":["404530"],"URL":"https:\/\/doi.org\/10.1023\/a:1015160717604","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2001,12]]}}}