{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:28:09Z","timestamp":1729636089407,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1109\/iihmsp.2007.4457537","type":"proceedings-article","created":{"date-parts":[[2008,2,29]],"date-time":"2008-02-29T13:45:57Z","timestamp":1204292757000},"page":"249-252","source":"Crossref","is-referenced-by-count":0,"title":["Improving the Security of the Chien-Jan Protocol for Large Mobile Networks"],"prefix":"10.1109","author":[{"given":"Chao-Wen","family":"Chan","sequence":"first","affiliation":[]},{"given":"Rong-Yuan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1995.390639"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/236387.236439"},{"key":"ref10","first-page":"9\/1","article-title":"novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems","author":"samarakoon","year":"1999","journal-title":"IEE Colloquium Novel DSP Algorithms and Architectures for Radio Systems"},{"key":"ref6","article-title":"The Kerberos network authenticationservice (v5)","volume":"1510","author":"kohl","year":"1993","journal-title":"Internet Request for Comments"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/206826.206832"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1997.579231"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1016\/j.jss.2005.04.022","article-title":"Cryptanalysis of a hybrid authentication protocol for large mobile network","volume":"79","author":"qiang","year":"2006","journal-title":"Journal of Systems and Software"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2004.10.073"},{"key":"ref9","first-page":"505","article-title":"An efficient protocol for mobile networks","volume":"15","author":"shieh","year":"1999","journal-title":"Journal of Information Science and Engineering"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00093-6"}],"event":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing","start":{"date-parts":[[2007,11,26]]},"location":"Kaohsiung, Taiwan","end":{"date-parts":[[2007,11,28]]}},"container-title":["Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4457470\/4457471\/04457537.pdf?arnumber=4457537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T01:00:33Z","timestamp":1497747633000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4457537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/iihmsp.2007.4457537","relation":{},"subject":[],"published":{"date-parts":[[2007,11]]}}}