{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:40:41Z","timestamp":1729636841581,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icics.2013.6782847","type":"proceedings-article","created":{"date-parts":[[2014,4,16]],"date-time":"2014-04-16T21:22:05Z","timestamp":1397683325000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Provably secure mutual authentication and key agreement scheme with user anonymity"],"prefix":"10.1109","author":[{"given":"Tzonelih","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Provably-secure enhancement on 3GPP authentication and key agreement protocol Verizon Commun","author":"zhang","year":"2003","journal-title":"Proceedings of the Cryptology EPrint Archive Rep 2003\/092"},{"journal-title":"TR 33 902 Formal Analysis of the 3G Authentication Protocol Third Generation Partnership Project-Authentication and Key Agreement (AKA)","year":"2000","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-006-9202-y"},{"journal-title":"TS 33 102 Security Architecture Version 4 2 0 Released 4","year":"2001","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2008.080283"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2006.881998"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1277867"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2004.842941"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.06020042"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.090488"},{"key":"11","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/TWC.2004.840220","article-title":"A new delegation-based authentication protocol for use in portable communication systems","volume":"4","author":"lee","year":"2005","journal-title":"IEEE Trans Wireless Communication"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.032"}],"event":{"name":"2013 9th International Conference on Information, Communications & Signal Processing (ICICS)","start":{"date-parts":[[2013,12,10]]},"location":"Tainan, Taiwan","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 9th International Conference on Information, Communications &amp; Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6777690\/6782769\/06782847.pdf?arnumber=6782847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T11:43:21Z","timestamp":1498131801000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6782847\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icics.2013.6782847","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}