{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:22:20Z","timestamp":1730272940273,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/iscisc.2017.8488359","type":"proceedings-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T22:31:28Z","timestamp":1539297088000},"page":"125-132","source":"Crossref","is-referenced-by-count":2,"title":["A Novel and Efficient Privacy Preserving TETRA Authentication Protocol"],"prefix":"10.1109","author":[{"given":"Behnam","family":"Zahednejad","sequence":"first","affiliation":[]},{"given":"Mahdi","family":"Azizi","sequence":"additional","affiliation":[]},{"given":"Morteza","family":"Pournaghi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ProVerif Cryptographic protocol verifier in the formal model","year":"2010","author":"blanchet","key":"ref10"},{"journal-title":"The Pi-calculus A Theory of Mobile Processes","year":"2003","author":"sangiorgi","key":"ref11"},{"year":"0","key":"ref12"},{"key":"ref13","article-title":"Towards formal analysis of security protocols","author":"mao","year":"1992","journal-title":"Computer Security Foundations Workshop VI 1993 Proc"},{"key":"ref4","article-title":"Security analysis of the Terrestrial Trunked radio (TETRA) authentication protocol","author":"duan","year":"2013","journal-title":"Norwegian Information Security Conference"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/9781118832585"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-69507-3_34","article-title":"Efficient group key agreement for dynamic TETRA Networks","author":"lee","year":"2007","journal-title":"SOFSEM 2007 Theory and Practice of Computer Science"},{"key":"ref5","article-title":"The vulnerability analysis and improvement of the TETRA authentication protocol","volume":"2","author":"park","year":"2010","journal-title":"International Conference on Advanced Communication Technology (ICACT)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382221"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2994459.2994463"},{"key":"ref2","first-page":"164","article-title":"SCADA system using TETRA communication network","author":"ozimek","year":"2002","journal-title":"Recent Advances in Computers Computing and Communications"},{"key":"ref1","first-page":"40","article-title":"Analysis on Security Architecture for TETRA Digital Trunking Network [J]","volume":"7","author":"hai-chen","year":"2010","journal-title":"Communications Technology"},{"journal-title":"USENIX Security Symposium","article-title":"A Security Analysis of the APCO Project 25 Two-Way Radio System","year":"2011","key":"ref9"}],"event":{"name":"2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","start":{"date-parts":[[2017,9,6]]},"location":"Shiraz","end":{"date-parts":[[2017,9,7]]}},"container-title":["2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8472118\/8488334\/08488359.pdf?arnumber=8488359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:28:36Z","timestamp":1643225316000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8488359\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iscisc.2017.8488359","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}