{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:04:05Z","timestamp":1725674645987},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,5]]},"DOI":"10.1109\/cts.2007.4621736","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T16:23:49Z","timestamp":1221582229000},"page":"37-45","source":"Crossref","is-referenced-by-count":2,"title":["Designing smartcards for collaboration with the WiMAX security sublayer"],"prefix":"10.1109","author":[{"given":"Pascal","family":"Urien","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"RFC 2716 PPP EAP TLS Authentication Protocol","year":"1999","key":"19"},{"journal-title":"Extensible Authentication Protocol","article-title":"rfc 3748","year":"2004","key":"17"},{"journal-title":"RFC 4306 Internet Key Exchange (IKEv2) Protocol","year":"2005","key":"18"},{"year":"0","key":"15"},{"year":"0","key":"16","article-title":"nectar smartcard.net 1.1"},{"year":"0","key":"13"},{"key":"14","article-title":"smart cards: the developer's toolkit","author":"jurgensen","year":"2002","journal-title":"Prentice Hall PTR"},{"journal-title":"RFC 2104 HMAC Keyed-Hashing for Message Authentication","year":"1997","key":"11"},{"journal-title":"RFC 4493 The AES-CMAC Algorithm","year":"2006","key":"12"},{"journal-title":"RFC 4187 Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)","year":"2006","key":"21"},{"journal-title":"Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM)","article-title":"rfc 4186","year":"2006","key":"20"},{"journal-title":"EAP-Support in Smartcard","article-title":"internet draft","year":"2007","key":"22"},{"key":"23","article-title":"eap-tls smartcards, from dream to reality","author":"urien","year":"2004","journal-title":"4th Workshop on Applications and Services in Wireless Networks ASWN"},{"year":"0","key":"24"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.1007\/11733447_12","article-title":"designing smartcards for emerging wireless networks","author":"urien","year":"2006","journal-title":"Seventh Smart Card Research and Advanced Application IFIP Conference CARDIS"},{"key":"26","article-title":"introducing trusted eap module for security enhancement in wlans and vpns","author":"urien","year":"0","journal-title":"IASTED International Conference on Communication Network and Information Security CNIS 2006 October 9-11 2006 MIT Faculty Club"},{"year":"0","key":"27"},{"journal-title":"Web site","year":"0","key":"28"},{"year":"0","key":"3"},{"journal-title":"Web site","article-title":"the cable television laboratories, inc","year":"0","key":"2"},{"year":"0","key":"10"},{"year":"0","key":"1"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2007 International Symposium on Collaborative Technologies and Systems (CTS)","start":{"date-parts":[[2007,5,25]]},"location":"Orlando, FL","end":{"date-parts":[[2007,5,25]]}},"container-title":["2007 International Symposium on Collaborative Technologies and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4607773\/4621707\/04621736.pdf?arnumber=4621736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T07:46:42Z","timestamp":1497772002000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4621736\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,5]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cts.2007.4621736","relation":{},"subject":[],"published":{"date-parts":[[2007,5]]}}}