{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T06:41:46Z","timestamp":1777099306295,"version":"3.51.4"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/wincom.2018.8629767","type":"proceedings-article","created":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:30:54Z","timestamp":1548981054000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["New Security Level of Authentication and Key Agreement Protocol for the IoT on LTE Mobile Networks"],"prefix":"10.1109","author":[{"given":"Mariya","family":"Ouaissa","sequence":"first","affiliation":[]},{"given":"Abdallah","family":"Rhattoy","sequence":"additional","affiliation":[]},{"given":"Idriss","family":"Chana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.133"},{"key":"ref11","article-title":"3GPP System Architecture Evolution (SAE); Security architecture","year":"2012"},{"key":"ref12","article-title":"Rationale and track of security decisions in Long Term Evolution (LTE) RAN\/3GPP System Architecture Evolution (SAE)","year":"0"},{"key":"ref13","year":"0","journal-title":"Technical Specification 3G Security Specification of the MILENAGE Algorithm Set An example algorithm set for the 3GPP authentication and key generation functions f1 f1* f2 f3 f4 f5 and f5* Document 2 Algorithm Specification (Release 11)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2551-7"},{"key":"ref15","year":"0"},{"key":"ref16","article-title":"Analysis of Authentication and Key Agreement (AKA) Protocols in Long-Term Evolution (LTE) Access Network","author":"ouaissa","year":"2016","journal-title":"Advances in Electronics Communication and Computing ETAEERE"},{"key":"ref17","author":"dai","year":"2009","journal-title":"Crypto++ 5 6 0 Benchmarks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2981547"},{"key":"ref3","article-title":"LTE et les r&#x00E9;seaux 4G","author":"bouguen","year":"2012","journal-title":"Eyrolles"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/wicom.2011.6040169"},{"key":"ref5","first-page":"23","article-title":"Internet of Things New security and privacy challenges. computer law & security review","author":"weber","year":"2010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RELABIRA.2012.6235098"},{"key":"ref7","year":"2013","journal-title":"LTE Security Concept and LTE Authentication Netmanias Technical Document"},{"key":"ref2","article-title":"SAE: The Core Network for LTE","author":"fritze","year":"2008","journal-title":"Ericsson white paper"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAT.2013.6521993"}],"event":{"name":"2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM)","location":"Marrakesh, Morocco","start":{"date-parts":[[2018,10,16]]},"end":{"date-parts":[[2018,10,19]]}},"container-title":["2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8622653\/8629585\/08629767.pdf?arnumber=8629767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T22:03:21Z","timestamp":1643234601000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8629767\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/wincom.2018.8629767","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}