{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:08:34Z","timestamp":1761401314124,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wimob.2005.1512853","type":"proceedings-article","created":{"date-parts":[[2006,10,4]],"date-time":"2006-10-04T10:35:47Z","timestamp":1159958147000},"page":"72-77","source":"Crossref","is-referenced-by-count":8,"title":["Perfect identity concealment in UMTS over radio access links"],"prefix":"10.1109","volume":"2","author":[{"given":"M.","family":"Barbeau","sequence":"first","affiliation":[]},{"given":"J.-M.","family":"Robert","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"3GPP TS 33 107 V6 3 0","article-title":"Lawful interception architecture and functions (release 6)","year":"2004","key":"15"},{"journal-title":"3GPP TS 33 105 V6 0 0","article-title":"Cryptographic algorithm requirements (release 6)","year":"2004","key":"13"},{"key":"14","article-title":"Enhancing intrusion detection in wireless networks using radio frequency fingerprinting","author":"hall","year":"2004","journal-title":"Proc of Communication Internet and Information Technology (CUT"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"journal-title":"3GPP TS 33 102 V6 2 0","article-title":"Security architecture (release 6)","year":"2004","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2004.824826"},{"journal-title":"3GPP TS 33 102 v5 5 0","article-title":"Technical specification group services and system aspects, 3G security, security architecture (release 5)","year":"2004","key":"2"},{"journal-title":"UMTS Security","year":"2003","author":"niemi","key":"1"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2004","author":"hankerson","key":"10"},{"journal-title":"3GPP TS 23 101 v5 0 1","article-title":"Technical specification group services and systems aspects: General UMTS architecture, release 5","year":"2003","key":"7"},{"journal-title":"3GPP TS 23 002 v6 5 0","article-title":"Technical specification group services and systems aspects: Network architecture, release 6","year":"2004","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"4","article-title":"SIPANON: A SIP anonymizer","volume":"cs w3998","author":"castleman","year":"2001","journal-title":"Course Report"},{"journal-title":"3GPP TS 23 008 v6 3 0","article-title":"Technical specification group services and systems aspects: Organization of subscriber data, release 6","year":"2004","key":"9"},{"journal-title":"3GPP TS 23 003 v6 4 0","article-title":"Technical specification group services and systems aspects: Numbering, addressing and identification, release 6","year":"2004","key":"8"}],"event":{"name":"WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005.","location":"Montreal, Canada"},"container-title":["WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10102\/32399\/01512853.pdf?arnumber=1512853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T05:51:02Z","timestamp":1497678662000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1512853\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wimob.2005.1512853","relation":{},"subject":[]}}