{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T15:29:23Z","timestamp":1773242963868,"version":"3.50.1"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Commun. Netw."],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1109\/jcn.2005.6387867","type":"journal-article","created":{"date-parts":[[2013,8,30]],"date-time":"2013-08-30T16:25:47Z","timestamp":1377879947000},"page":"207-221","source":"Crossref","is-referenced-by-count":15,"title":["Seamless and secure mobility management with location-aware service (LAS) broker for future mobile interworking networks"],"prefix":"10.23919","volume":"7","author":[{"given":"Minsoo","family":"Lee","sequence":"first","affiliation":[{"name":"School of Electrical and Electronics Engineering, Chung-Ang University, 156-756, Seoul, Korea"}]},{"given":"Gwanyeon","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronics Engineering, Chung-Ang University, 156-756, Seoul, Korea"}]},{"given":"Sehyun","family":"Park","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronics Engineering, Chung-Ang University, 156-756, Seoul, Korea"}]}],"member":"263","reference":[{"key":"ref39","year":"2003","journal-title":"Oasis security services security assertion markup language (saml) tc"},{"key":"ref38","article-title":"3GPPF functional stage 2 description of location services (LCS)","year":"2004","journal-title":"Release 6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36199-5_11"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1308935"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1252799"},{"key":"ref30","year":"2003"},{"key":"ref37","article-title":"Air interface for fixed broadband wireless access systems","year":"2001","journal-title":"IEEE Standard for Local and Metropolitan Area Networks Part 16"},{"key":"ref36","article-title":"3GPP system to wireless local area network (WLAN) interworking: System description","year":"2004","journal-title":"Release 6"},{"key":"ref35","article-title":"User mobility prediction in hybrid and ad hoc wireless networks","author":"chellappa-doss","year":"2003","journal-title":"Proc ATNAC 2003"},{"key":"ref34","article-title":"Performance of a framework for seamless integration of cellular and WLANs","author":"shenoy","year":"2004","journal-title":"Proc OPNETWORK 2004"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024413"},{"key":"ref40","author":"dixit","year":"2003","journal-title":"Wireless IP and Building the Mobile Internet"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2003.1241103"},{"key":"ref12","first-page":"66","article-title":"IEEE 802.11 roaming and authentication in wireless LAN\/cellular mobile networks","author":"shi","year":"2004","journal-title":"IEEE Wireless Commun"},{"key":"ref13","first-page":"113","article-title":"A class of mobile motion prediction algorithms for wireless mobile computing and communicatons","volume":"1","author":"liu","year":"1996","journal-title":"ACM\/Baltzer MONET"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"922","DOI":"10.1109\/49.709453","article-title":"Mobility modeling, location tracking, and trajectory prediction in wireless ATM networks","volume":"16","author":"liu","year":"1998","journal-title":"IEEE J Select Areas Commun"},{"key":"ref15","article-title":"Profile-based next-cell prediction in indoor wireless LAN","author":"bhargavan","year":"1997","journal-title":"Proc IEEE SICON'97"},{"key":"ref16","article-title":"Dynamic bandwidth reservation in cellular networks using road topology based mobility predictions","author":"soh","year":"2004","journal-title":"Proc IEEE Infocom 2004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11496618_29"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1273785"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MMW.2003.1266069"},{"key":"ref28","article-title":"PPP EAP-TLS authentication protocol","year":"1999","journal-title":"IETF RFC 2716"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1250896"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1244927"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24693-0_28"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/47.4.405"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20040835(410) 151"},{"key":"ref5","article-title":"Feasibility study on 3GPP system to WLAN interworking (Release 6)","year":"2002","journal-title":"3GPP TR 22 934 v6 2 0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(97)82613-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1308950"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019194325861"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-39653-6_8","article-title":"Context-aware user authentication - supporting proximity-based login in pervasive computing","author":"bardram","year":"2003","journal-title":"Proc Ubicomp 2003"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.1266301"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/MCOM.2004.1299356","article-title":"The auest for personal control over mobile location privacy","volume":"42","author":"he","year":"2004","journal-title":"IEEE Commun Mag"},{"key":"ref45","article-title":"EAP tunneled TLS authentication protocol","year":"2004","journal-title":"IETF Internet Draft"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281242"},{"key":"ref42","year":"0","journal-title":"OpenSSL"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2003.1209596"},{"key":"ref41","year":"0","journal-title":"FreeRADIUS"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"ref44","article-title":"Port-based network access control","year":"2001","journal-title":"IEEE 802 1x"},{"key":"ref26","article-title":"3G Security; wireless local area network (WLAN) interworking security","year":"0","journal-title":"Release 6 work in progress"},{"key":"ref43","year":"0","journal-title":"OpenSAML"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1325888"}],"container-title":["Journal of Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5449605\/6387854\/06387867.pdf?arnumber=6387867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:55:56Z","timestamp":1760982956000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6387867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":45,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jcn.2005.6387867","relation":{},"ISSN":["1976-5541","1229-2370"],"issn-type":[{"value":"1976-5541","type":"electronic"},{"value":"1229-2370","type":"print"}],"subject":[],"published":{"date-parts":[[2005,6]]}}}