{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:51:21Z","timestamp":1730224281267,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/glocomw.2012.6477719","type":"proceedings-article","created":{"date-parts":[[2013,3,20]],"date-time":"2013-03-20T17:31:21Z","timestamp":1363800681000},"page":"1032-1036","source":"Crossref","is-referenced-by-count":12,"title":["Improving security level of LTE authentication and key agreement procedure"],"prefix":"10.1109","author":[{"given":"Fang-Yie","family":"Leu","sequence":"first","affiliation":[]},{"given":"Ilsun","family":"You","sequence":"additional","affiliation":[]},{"given":"Yi-Li","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]},{"given":"Cheng-Ru","family":"Dai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/WIRLES.2005.1549408"},{"key":"14","first-page":"96","article-title":"Constructing a secure point-to-point wireless environment by integrating diffie-hellman PKDS RSA and stream ciphering for users known to each other","volume":"2","author":"huang","year":"2011","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"year":"0","key":"11"},{"key":"12","first-page":"891","article-title":"Improving security levels of IEEE802.16e authentication by involving diffie-hellman PKDS","volume":"17","author":"huang","year":"2011","journal-title":"Journal of Universal Computer Science"},{"key":"3","first-page":"69","article-title":"Enhanced authentication and key agreement procedure of next generation 3GPP mobile networks","volume":"2","author":"purkhiabani","year":"2012","journal-title":"International Journal of Electrical and Information Engineering"},{"key":"2","first-page":"22","article-title":"Interworking techniques and architectures for heterogeneous wireless networks","volume":"2","author":"andersson","year":"2012","journal-title":"Journal of Internet Services and Information Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2009.5355157"},{"key":"1","first-page":"67","article-title":"RAMS: A protocol extension to PMIPv6 for improving handover performance of multicast traffic","volume":"2","author":"contreras","year":"2011","journal-title":"Journal of Wireless Mobile Networks Ubiquitous Computing and Dependable Applications"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4907407"},{"journal-title":"LTE the UMTS Long Term Evolution From Theory to Practice","year":"0","author":"sesia","key":"6"},{"year":"0","key":"5"},{"year":"0","key":"4"},{"year":"0","key":"9"},{"journal-title":"The Mobile Broadband Standard","year":"0","key":"8"}],"event":{"name":"2012 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2012,12,3]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2012,12,7]]}},"container-title":["2012 IEEE Globecom Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6470041\/6477486\/06477719.pdf?arnumber=6477719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T19:32:48Z","timestamp":1490211168000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6477719\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2012.6477719","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}