{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:57:29Z","timestamp":1729663049360,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/cts.2011.5898962","type":"proceedings-article","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T12:01:29Z","timestamp":1308657689000},"page":"422-427","source":"Crossref","is-referenced-by-count":0,"title":["User dependent cryptography for security in future mobile telecommunication systems"],"prefix":"10.1109","author":[{"given":"Ahmad","family":"Sabouri","sequence":"first","affiliation":[]},{"given":"Nikos","family":"Komninos","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1207\/S15327744JOCE1004_07"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1109\/TMC.2002.1038348","article-title":"Potential fraudulent usage in mobile telecommunications networks","volume":"1","author":"lin","year":"2002","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1476","DOI":"10.1006\/jpdc.2002.1857","article-title":"Behavior-based intrusion detection in mobile phone systems","volume":"62","author":"boukerche","year":"2002","journal-title":"J Parallel Distrib Comput"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjdc.4.9"},{"article-title":"Method and apparatus for determining behavioral profile of a computer user","year":"0","author":"gerace","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(01)00106-3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PGEC.1964.263724"},{"journal-title":"AES proposal Rijndael","year":"1998","author":"daemen","key":"ref17"},{"journal-title":"Federal Information Processing Standards Publication 197","article-title":"Announcing the ADVANCED ENCRYPTION STANDARD (AES)","year":"2001","key":"ref18"},{"year":"2009","key":"ref4","article-title":"3GPP TS 35.201 V9.0.0, Third Generation Partnership Project; Technical Specification Group; 3G Security; specification of the 3GPP confidentiality and integrity algorithms; document 1: f8 and f9 specification"},{"journal-title":"ETSI TS 100 929 V8 0 0 Digital Cellular Telecommunications System (phase 2+)(GSM) Security related network functions","article-title":"ETSI Technical Specification","year":"2000","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1049\/ecej:20020502","article-title":"umts security","volume":"14","author":"boman","year":"2002","journal-title":"Electronics & Communication Engineering Journal"},{"year":"2009","key":"ref5","article-title":"3GPP TS 35.202 V9.0.0, Third Generation Partnership Project; Technical Specification Group; 3G Security; specification of the 3GPP confidentiality and integrity algorithms; document 2: Kasumi algorithm specification"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.03.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2004.1368846"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2006.874579"},{"journal-title":"Technical Report Security Architecture in UMTS Third Generation Cellular Networks","year":"2004","key":"ref1"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1007\/978-3-540-71629-7_48","article-title":"Keystroke dynamics for biometrics identification","author":"choras","year":"2007","journal-title":"Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms Part II"}],"event":{"name":"2011 18th International Conference on Telecommunications (ICT)","start":{"date-parts":[[2011,5,8]]},"location":"Ayia Napa, Cyprus","end":{"date-parts":[[2011,5,11]]}},"container-title":["2011 18th International Conference on Telecommunications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5875053\/5898895\/05898962.pdf?arnumber=5898962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T21:53:46Z","timestamp":1497909226000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5898962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cts.2011.5898962","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}