{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:37:59Z","timestamp":1729661879085,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/lcn.2011.6115502","type":"proceedings-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T14:30:31Z","timestamp":1325860231000},"page":"424-431","source":"Crossref","is-referenced-by-count":0,"title":["Security and privacy for WLAN roaming with per-connection tariff negotiation"],"prefix":"10.1109","author":[{"given":"Johannes","family":"Barnickel","sequence":"first","affiliation":[]},{"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533072"},{"key":"17","article-title":"Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications","volume":"2727","author":"gu","year":"2003","journal-title":"LNCS"},{"key":"18","article-title":"Towards Certificate-Based Authentication for Future Mobile Communications","volume":"29","author":"giessler","year":"2004","journal-title":"Wireless Personal Communications"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2007.12"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2003.1265853"},{"year":"0","key":"13"},{"journal-title":"3GPP TS 32 240 (Release 9) Telecommunication Management Charging Management Charging Architecture and Principles","year":"0","key":"14"},{"journal-title":"Extensible Authentication Protocol (EAP) Key Management Framework","year":"2008","author":"aboda","key":"11"},{"journal-title":"IEEE 802 16-2009 Standard for Local and Metropolitan Area Networks Part 16 Air Interface for Broadband Wireless Access Systems","year":"0","key":"12"},{"key":"21","article-title":"An approach to enhance interprovider roaming through secret sharing and its application to WLANs","author":"meyer","year":"0","journal-title":"The ACM Workshop on Wireless Mobile Applications and Services on WLAN Hotspots 2005"},{"key":"20","article-title":"Accountable anonymous Service Usage in mobile communication systems","author":"buttyn","year":"1999","journal-title":"EPFL SSC Technical Report No SSC\/1999\/016"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359535"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/98.813822"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.06.003"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73547-2_50"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-8148-z"},{"key":"27","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45126-6_2","article-title":"A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks","author":"jakobsson","year":"2003","journal-title":"Financial Cryptography"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352544"},{"journal-title":"ISO\/IEC 11770-3 Information Technology - Security Techniques - Key Management - Part 3 Mechanisms Using Asymmetric Techniques","year":"0","key":"29"},{"journal-title":"Unitymedia Hotspots","year":"0","key":"3"},{"journal-title":"AT&T Hotspots","year":"0","key":"2"},{"key":"10","doi-asserted-by":"crossref","first-page":"183","DOI":"10.3233\/JCS-2000-82-306","article-title":"Authentication and payment in future mobile systems","volume":"8","author":"horn","year":"1999","journal-title":"Journal of Computer Security"},{"year":"0","key":"1"},{"key":"30","article-title":"Electronic Payments of Small Amounts","author":"pedersen","year":"0","journal-title":"1997 Security Protocols Workshop"},{"key":"7","first-page":"4","article-title":"Hotel Network Security: A Study of Computer Networks in US Hotels","volume":"8","author":"ogle","year":"2008","journal-title":"Cornell Hospitality Report 2008"},{"year":"0","key":"6"},{"journal-title":"About Wifi Foundation","year":"0","key":"5"},{"journal-title":"Starbucks Wireless Internet","year":"0","key":"4"},{"key":"9","article-title":"Authenticated Diffie- Hellman Key Agreement Protocols","volume":"1556","author":"blake-wilson","year":"1998","journal-title":"LNCS"},{"journal-title":"T-Mobile Germany Hotspot Tariffs","year":"0","key":"8"}],"event":{"name":"2011 IEEE 36th Conference on Local Computer Networks (LCN 2011)","start":{"date-parts":[[2011,10,4]]},"location":"Bonn, Germany","end":{"date-parts":[[2011,10,7]]}},"container-title":["2011 IEEE 36th Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6105664\/6114410\/06115502.pdf?arnumber=6115502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T01:34:09Z","timestamp":1561167249000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6115502\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/lcn.2011.6115502","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}