{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:25:46Z","timestamp":1725672346164},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/wcnc.2018.8377349","type":"proceedings-article","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T19:24:55Z","timestamp":1528745095000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["On the security verification of a short message service protocol"],"prefix":"10.1109","author":[{"given":"Anca","family":"Delia Jurcut","sequence":"first","affiliation":[]},{"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[]},{"given":"Jinyong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Cornelia","family":"Gyorodi","sequence":"additional","affiliation":[]},{"given":"Jingsha","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.cose.2014.05.010"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1049\/ip-cdt:19970838"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/S1389-1286(03)00292-5"},{"year":"2017","journal-title":"Crytpographic-procotol Development and Verification Tools","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/MILCOM.1999.822653"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/MILCOM.1995.483634"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/MILCOM.1994.473919"},{"year":"2018","journal-title":"Technical Specifications for SMSs","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-319-29742-2_5"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/MINES.2009.83"},{"key":"ref5","first-page":"19","article-title":"GSM Security Issues and Challenges","author":"siddique","year":"2006","journal-title":"7th ACIS International Conference on Software Engineering Artificial Intelligence Networking and Parallel\/Distributed Computing SNPD"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TDSC.2017.2725831"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1085126.1085128"},{"key":"ref2","first-page":"1329","article-title":"Aspects of Mobility in E-Marketing from the Perspective of a Customer","author":"witold chmielarz","year":"2016","journal-title":"2016 Federated Conference on Computer Science and Information Systems (FedCSIS)"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1108\/IJBM-09-2015-0145"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.12720\/jcm.8.11.795-805"}],"event":{"name":"2018 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2018,4,15]]},"location":"Barcelona","end":{"date-parts":[[2018,4,18]]}},"container-title":["2018 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8370761\/8376943\/08377349.pdf?arnumber=8377349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T21:17:12Z","timestamp":1530566232000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8377349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2018.8377349","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}