{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T06:07:00Z","timestamp":1744265220688,"version":"3.40.3"},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2003,12,1]],"date-time":"2003-12-01T00:00:00Z","timestamp":1070236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Wireless Commun."],"published-print":{"date-parts":[[2003,12]]},"DOI":"10.1109\/mwc.2003.1265853","type":"journal-article","created":{"date-parts":[[2004,2,24]],"date-time":"2004-02-24T21:01:05Z","timestamp":1077656465000},"page":"52-61","source":"Crossref","is-referenced-by-count":112,"title":["Efficient authentication and key distribution in wireless IP networks"],"prefix":"10.1109","volume":"10","author":[{"given":"L.","family":"Salgarelli","sequence":"first","affiliation":[]},{"given":"M.","family":"Buddhikot","sequence":"additional","affiliation":[]},{"given":"J.","family":"Garay","sequence":"additional","affiliation":[]},{"given":"S.","family":"Patel","sequence":"additional","affiliation":[]},{"given":"S.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2284"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2865"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2716"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/65.272938"},{"article-title":"EAP SIM Authentication","volume-title":"Internet draft, IETF, June 2003, draft-haverinen-pppext-eap-sim-11.txt; for the latest version","author":"Haverinen","key":"ref5"},{"key":"ref6","article-title":"EAP AKA Authentication","volume-title":"Internet draft, IETF","author":"Arkko","year":"2003"},{"key":"ref7","article-title":"EAP Tunneled TLS Authentication Protocol (EAP-TTLS)","volume-title":"Internet draft, IETF","author":"Funk","year":"2002"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1145\/276698.276854","article-title":"A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols","volume-title":"STOC \u201998","author":"Bellare","year":"1998"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_21"},{"key":"ref10","article-title":"On Formal Models for Secure Key Exchange","volume-title":"Proc. 6th Annual ACM Conf. Comp. and Commun. Security (invited talk)","author":"Shoup","year":"1999"},{"key":"ref11","article-title":"PPP EAP SRP-SHA 1 Authentication Protocol","volume-title":"Internet draft, IETF","author":"Carlson","year":"2001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/49.223869"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1147\/sj.371.0042"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1996.492418"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2409"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2104"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.10004"},{"journal-title":"TS 902, ETSI","article-title":"Formal Analysis of 3G Authentication Protocol","year":"2002","key":"ref20"},{"key":"ref21","article-title":"IP Mobility Support for IPv4","author":"Perkins","year":"2002","journal-title":"IETF RFC 3344"}],"container-title":["IEEE Wireless Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7742\/28311\/01265853.pdf?arnumber=1265853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T17:08:24Z","timestamp":1743440904000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1265853\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,12]]},"references-count":21,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2003,12]]}},"URL":"https:\/\/doi.org\/10.1109\/mwc.2003.1265853","relation":{},"ISSN":["1536-1284"],"issn-type":[{"type":"print","value":"1536-1284"}],"subject":[],"published":{"date-parts":[[2003,12]]}}}