{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:20:13Z","timestamp":1729653613585,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/glocom.2017.8254445","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T22:50:54Z","timestamp":1516056654000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient EAP-Based Pre-Authentication Scheme for Handovers in WRANs over TVWS"],"prefix":"10.1109","author":[{"given":"Cong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zenghua","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1002\/wcm.895","article-title":"Secure handover for Proxy Mobile IPv6 in next-generation communications: scenarios and performance","volume":"11","author":"jong-hyouk","year":"2011","journal-title":"Wireless Commun Mobile Comput"},{"key":"ref11","first-page":"1","article-title":"Secure and fast handover scheme based on pre-authentication method for 802.16\/WiMAX infrastructure networks","author":"sun","year":"0","journal-title":"2007 IEEE Region 10th Annual International Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.032712.110659"},{"key":"ref13","first-page":"2531","article-title":"Security considerations for handover schemes in mobile WiMAX networks","author":"junbeom","year":"0","journal-title":"2008 IEEE Wireless Communications and Networking Conference"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"journal-title":"Crypto++ 5 5 Benchmarks","year":"0","key":"ref15"},{"journal-title":"Extensible Authentication Protocol (EAP)","year":"2004","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2011.5951707"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1325894"},{"journal-title":"The EAP-TLS Authentication Protocol","year":"2008","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.394"},{"journal-title":"EAP Extensions for EAP Re-authentication Protocol (ERP)","year":"2008","key":"ref7"},{"journal-title":"FCC08-260","article-title":"Small Entity Compliance Guide: Part 15 TV Band Devices,&#x201D; Second Report and Order and Memorandum Opinion and Order","year":"2008","key":"ref2"},{"journal-title":"Second Memorandum Opinion and Order FCC 10-174","article-title":"Unlicensed Operations in the TV Broadcast Bands","year":"2010","key":"ref1"},{"journal-title":"Extensible Authentication Protocol (EAP) Early Authentication Problem Statement","year":"2010","key":"ref9"}],"event":{"name":"2017 IEEE Global Communications Conference (GLOBECOM 2017)","start":{"date-parts":[[2017,12,4]]},"location":"Singapore","end":{"date-parts":[[2017,12,8]]}},"container-title":["GLOBECOM 2017 - 2017 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8253768\/8253909\/08254445.pdf?arnumber=8254445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T11:09:09Z","timestamp":1570619349000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8254445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/glocom.2017.8254445","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}