{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T05:00:32Z","timestamp":1768539632662,"version":"3.49.0"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T00:00:00Z","timestamp":1188604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/twc.2007.06020042","type":"journal-article","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T15:59:18Z","timestamp":1193155158000},"page":"3461-3472","source":"Crossref","is-referenced-by-count":39,"title":["Anonymous and Authenticated Key Exchange for Roaming Networks"],"prefix":"10.1109","volume":"6","author":[{"given":"Guomin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Duncan","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Xiaotie","family":"Deng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","author":"boyd","year":"2003","journal-title":"Protocols for Authentication and Key Establishment"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.70"},{"key":"ref12","first-page":"417","article-title":"Deposit-case attack against secure roaming","volume":"3574","author":"yang","year":"2005","journal-title":"Proc Inf Security and Privacy 10th Australasian Conf ACISP 2005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/26.837039"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2003.809452"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/el:19980686"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"ref17","year":"2001","journal-title":"Announcing the Advanced Encryption Standard (AES)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_21"},{"key":"ref19","year":"2004","journal-title":"Standard Specifications for Password-Based Public-Key Cryptographic Techniques"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00021-8"},{"key":"ref27","year":"0"},{"key":"ref3","year":"2003","journal-title":"3rd Generation Partnership Project 3GPP 3G Security Security Architecture"},{"key":"ref6","first-page":"159","article-title":"Wireless authentication protocol preserving user anonymity","author":"go","year":"2001","journal-title":"Proc of the 2001 Symposium on Cryptography and Information Security (SCIS 2001)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/215530.215548"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref7","first-page":"532","article-title":"Preserving privacy in mobile communications: A hybrid method","author":"varadharajan","year":"0","journal-title":"Proc Personal Wireless Commun 1997 IEEE Conf"},{"key":"ref2","year":"1999","journal-title":"Mobile Station-Base Station Compatibility Standard for Wideband Spread Spectrum Cellular Systems"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","article-title":"An efficient system for nontransferable anonymous credentials with optional anonymity revocations","volume":"2045","author":"camenisch","year":"2001","journal-title":"Proc Eurocrypt 2001"},{"key":"ref1","author":"mouly","year":"1992","journal-title":"The GSM System for Mobile Communications"},{"key":"ref20","author":"shoup","year":"1999","journal-title":"On formal models for secure key exchange"},{"key":"ref22","first-page":"277","article-title":"Authentication and payment in future mobile systems","author":"horn","year":"0","journal-title":"Proc ESORICS?98"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2246"},{"key":"ref24","first-page":"347","article-title":"Anonymous signature schemes","volume":"3958","author":"yang","year":"2006","journal-title":"Proc 9th International Workshop on Practice and Theory in Public Key Cryptography PKC 2006"},{"key":"ref23","first-page":"47","article-title":"Public key protocols for wireless communications","author":"boyd","year":"0","journal-title":"Proc 1st International Conference on Information Secuirty and Cryptology (ICISC?98)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_35"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7693\/4362468\/04362510.pdf?arnumber=4362510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T15:56:20Z","timestamp":1638201380000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":28,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/twc.2007.06020042","relation":{},"ISSN":["1536-1276"],"issn-type":[{"value":"1536-1276","type":"print"}],"subject":[],"published":{"date-parts":[[2007,9]]}}}