{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:10:50Z","timestamp":1758845450941,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/rait.2018.8389062","type":"proceedings-article","created":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T19:25:44Z","timestamp":1529954744000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["SEACE: Security enhanced and computationally efficient AKA protocol for UMTS networks"],"prefix":"10.1109","author":[{"given":"Balu L.","family":"Parne","sequence":"first","affiliation":[]},{"given":"Shubham","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Narendra S.","family":"Chaudhari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/CAST.2016.7914960"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/AINA.2005.124"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TWC.2004.842941"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1155\/WCN\/2006\/98107"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/LCOMM.2010.04.092279"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/s11277-014-1821-0"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/s11277-015-2551-7"},{"key":"ref17","article-title":"Di-ameter base protocol","author":"fajardo","year":"2012","journal-title":"Tech Rep"},{"year":"2003","journal-title":"AVISPA Automated Validation of Internet Security Protocols and Applications","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/SSIRI.2009.62"},{"key":"ref3","first-page":"278282","article-title":"UMTS security: Enhancement of identification, authentication and key agreement protocols","author":"caragata","year":"2011","journal-title":"International Conference for Internet Technology and Secured Transactions (ICITST)"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.jss.2009.08.019"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TVT.2011.2168247"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.14257\/ijsia.2014.8.1.04"},{"key":"ref7","first-page":"220","article-title":"NS-AKA: An improved and efficient AKA protocol for 3G (UMTS) networks","author":"saxena","year":"2014","journal-title":"International conference on advances in computer science and electronics engineering (CSEE14)"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1023646.1023662"},{"key":"ref1","first-page":"1","article-title":"Security mechanisms in UMTS","volume":"25","author":"putz","year":"2001","journal-title":"Datenschutz und Datensicherheit"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s11277-011-0486-1"}],"event":{"name":"2018 4th International Conference on Recent Advances in Information Technology (RAIT)","start":{"date-parts":[[2018,3,15]]},"location":"Dhanbad","end":{"date-parts":[[2018,3,17]]}},"container-title":["2018 4th International Conference on Recent Advances in Information Technology (RAIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8376941\/8388962\/08389062.pdf?arnumber=8389062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:10:49Z","timestamp":1643202649000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8389062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/rait.2018.8389062","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}