{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T07:32:35Z","timestamp":1722929555117},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wcnc.2003.1200715","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"2126-2131","source":"Crossref","is-referenced-by-count":0,"title":["A light weight authentication scheme for mobile wireless Internet applications"],"prefix":"10.1109","volume":"3","author":[{"family":"Minghui Shi","sequence":"first","affiliation":[]},{"family":"Xeumin Shen","sequence":"additional","affiliation":[]},{"given":"J.W.","family":"Mark","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ASSET.1998.688246"},{"journal-title":"A Secured Registration Protocol for Mobile IP","year":"0","author":"zhang","key":"2"},{"key":"10","first-page":"532","article-title":"Preserving privacy in mobile communications: A hybrid method","author":"varadharajan","year":"1997","journal-title":"Proceedings of IEEE International Conference on Personal Wireless Communications"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAN.1999.778965"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/182110.182112"},{"journal-title":"Introduction to SSL","year":"0","key":"6"},{"journal-title":"SSH Communications Security","year":"0","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/4234.781006"},{"key":"9","first-page":"324","article-title":"Key distribution protocol for digital mobile communication systems","author":"tatebayashi","year":"1989","journal-title":"Advances in Cryptology ? CRYPTO? 89 Proceedings"},{"key":"8","first-page":"461","article-title":"On key distribution and authentication in mobile radio networks","author":"park","year":"1993","journal-title":"Advances in Cryptology-EUROCRYPT'93"},{"key":"11","first-page":"14a","article-title":"An authentication scheme for wireless internet applications","author":"shi","year":"2002","journal-title":"Proc China Wireless Congr"}],"event":{"name":"WCNC 2003 - IEEE Wireless Communications and Networking Conference","acronym":"WCNC-03","location":"New Orleans, LA, USA"},"container-title":["2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8546\/27030\/01200715.pdf?arnumber=1200715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T17:58:27Z","timestamp":1489427907000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1200715\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2003.1200715","relation":{},"subject":[]}}