{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T11:31:43Z","timestamp":1757590303810,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/wmnc.2017.8248853","type":"proceedings-article","created":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T17:43:55Z","timestamp":1515433435000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Secure algorithms for SAKA protocol in the GSM network"],"prefix":"10.1109","author":[{"given":"Neetesh","family":"Saxena","sequence":"first","affiliation":[]},{"given":"Narendra S.","family":"Chaudhari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"GSM Cloning","year":"1998","author":"goldberg","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004360"},{"key":"ref12","article-title":"A Pedagogical implementation of the A5\/1","author":"briceno","year":"1999","journal-title":"The Smartcard Developer Association (SDA)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.806129"},{"key":"ref14","first-page":"600","article-title":"Instant cipher text only cryptanalysis of GSM encrypted communication","author":"barkan","year":"2003","journal-title":"Proceedings of CRYPTO LNCS 2729"},{"journal-title":"A pedagogical implementation of the GSM A5\/1 and A5\/2 voice privacy encryption algorithms","year":"1999","author":"briceno","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44495-5_5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-013-0030-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019103228471"},{"key":"ref19","article-title":"GSM cloning","author":"wagner","year":"2009","journal-title":"Smartcard Developer Association and ISAAC security research group"},{"key":"ref28","first-page":"380","article-title":"Reducing the collision probability of alleged COMPI28","author":"handschuh","year":"2000","journal-title":"LNCS-1820 Smart Card Research and Application"},{"year":"2015","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_19"},{"journal-title":"Report GSMA announces new global research that highlights significant growth opportunity for the mobile industry","year":"2012","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2551-7"},{"key":"ref29","first-page":"98","article-title":"Attack on COMP 128","author":"walker","year":"1998","journal-title":"ETSI SMG26 Tdoc SMG"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1821-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983134"},{"key":"ref7","first-page":"33","article-title":"Let me answer that for you: exploiting broadcast information in cellular networks","author":"golde","year":"2013","journal-title":"Proc USENIX Security07"},{"key":"ref2","first-page":"136","article-title":"Enhancing security system of short message service for m-commerce in GSM","volume":"2","author":"saxena","year":"2011","journal-title":"IJCSE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2016.7581461"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1109\/30.809184","article-title":"Secure communication mechanisms for GSM networks","volume":"45","author":"lo","year":"1999","journal-title":"IEEE Transaction on Consumer Electronics"},{"key":"ref20","first-page":"i","article-title":"A3\/A8 and COMP128","author":"brumley","year":"2004","journal-title":"T-79 514 Special Course on Cryptology"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.80"},{"key":"ref21","article-title":"Real time: cryptanalysis of A5\/1 on a PC","author":"shamir","year":"2000","journal-title":"Weizmann Inst Rohovot Isreal"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ETNCC.2011.5958486"},{"key":"ref23","first-page":"93","article-title":"Research and implementation of a high-speed reconfigurable A5 algorithm","author":"longmei","year":"2008","journal-title":"Computational Intelligence and Industrial Application"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2013.055045"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_35"}],"event":{"name":"2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)","start":{"date-parts":[[2017,9,25]]},"location":"Valencia","end":{"date-parts":[[2017,9,27]]}},"container-title":["2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8233082\/8248836\/08248853.pdf?arnumber=8248853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T00:12:58Z","timestamp":1570579978000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8248853\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/wmnc.2017.8248853","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}