{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:35Z","timestamp":1750308155064,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,9,2]],"date-time":"2005-09-02T00:00:00Z","timestamp":1125619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,9,2]]},"DOI":"10.1145\/1080730.1080732","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["An approach to enhance inter-provider roaming through secret sharing and its application to WLANs"],"prefix":"10.1145","author":[{"given":"Ulrike","family":"Meyer","sequence":"first","affiliation":[{"name":"Darmstadt University of Technology, Germany"}]},{"given":"Jared","family":"Cordasco","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ"}]},{"given":"Susanne","family":"Wetzel","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ"}]}],"member":"320","published-online":{"date-parts":[[2005,9,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Personal Communication with L. Butty\u00e1n May 2005.]]  Personal Communication with L. Butty\u00e1n May 2005.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"PPP EAP TLS Authentication protocol. RFC","author":"Aboba B.","year":"1999","unstructured":"B. Aboba and D. Simon . PPP EAP TLS Authentication protocol. RFC 2716, October 1999 .]] B. Aboba and D. Simon. PPP EAP TLS Authentication protocol. RFC 2716, October 1999.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COEC.2003.1210226"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/647214.720383"},{"key":"e_1_3_2_1_5_1","volume-title":"Wi-Fi Alliance - Wireless ISP Roaming (WISPr)","author":"Anton B.","year":"2003","unstructured":"B. Anton , B. Bullock , and J. Short . Best current practice for wireless internet service provider (WISP) roaming . Wi-Fi Alliance - Wireless ISP Roaming (WISPr) , February 2003 .]] B. Anton, B. Bullock, and J. Short. Best current practice for wireless internet service provider (WISP) roaming. Wi-Fi Alliance - Wireless ISP Roaming (WISPr), February 2003.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.751456"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.612244"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.937274"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/941326.941328"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:WIRE.0000047067.12167.67"},{"key":"e_1_3_2_1_11_1","volume-title":"PPP Extensible Authentication Protocol (EAP). RFC","author":"Blunk L.","year":"1998","unstructured":"L. Blunk and J. Vollbrecht . PPP Extensible Authentication Protocol (EAP). RFC 2284, March 1998 .]] L. Blunk and J. Vollbrecht. PPP Extensible Authentication Protocol (EAP). RFC 2284, March 1998.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/967030.967033"},{"key":"e_1_3_2_1_13_1","volume-title":"Conference on Cryptography and Coding","author":"Boyd C.","year":"1986","unstructured":"C. Boyd . Digitial multisignatures . In Conference on Cryptography and Coding , 1986 .]] C. Boyd. Digitial multisignatures. In Conference on Cryptography and Coding, 1986.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/829524.831016"},{"key":"e_1_3_2_1_15_1","volume-title":"EAP Password Authenticated Exchange (EAP-PAX)","author":"Clancy T.","year":"2005","unstructured":"T. Clancy and W. Arbaugh . EAP Password Authenticated Exchange (EAP-PAX) . Internet Society draft-clancy-eap-pax-03, April 2005 .]] T. Clancy and W. Arbaugh. EAP Password Authenticated Exchange (EAP-PAX). Internet Society draft-clancy-eap-pax-03, April 2005.]]"},{"key":"e_1_3_2_1_16_1","volume-title":"The TLS protocol version 1.0. RFC","author":"Dierks T.","year":"1999","unstructured":"T. Dierks and C. Allen . The TLS protocol version 1.0. RFC 2246, January 1999 .]] T. Dierks and C. Allen. The TLS protocol version 1.0. RFC 2246, January 1999.]]"},{"key":"e_1_3_2_1_17_1","volume-title":"LNCS","author":"Frankel Y.","year":"1989","unstructured":"Y. Frankel . A practical protocol for large group oriented networks. In Advances in Cryptology - EUROCRYPT'89 , LNCS , 1989 .]] Y. Frankel. A practical protocol for large group oriented networks. In Advances in Cryptology - EUROCRYPT'89, LNCS, 1989.]]"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the USENIX Workshop on Electronic Commerce","author":"Gabber E.","year":"1996","unstructured":"E. Gabber and A. Silberschatz . Agora: A minimal distributed protocol for electronic commerce . In Proceedings of the USENIX Workshop on Electronic Commerce , 1996 .]] E. Gabber and A. Silberschatz. Agora: A minimal distributed protocol for electronic commerce. In Proceedings of the USENIX Workshop on Electronic Commerce, 1996.]]"},{"key":"e_1_3_2_1_19_1","series-title":"LNCS","volume-title":"Proceedings of FC'02","author":"Geer D.","year":"2002","unstructured":"D. Geer and M. Yung . Split-and-delegate: Threshold cryptography for the masses . In Proceedings of FC'02 , volume 2357 of LNCS , 2002 .]] D. Geer and M. Yung. Split-and-delegate: Threshold cryptography for the masses. In Proceedings of FC'02, volume 2357 of LNCS, 2002.]]"},{"key":"e_1_3_2_1_20_1","series-title":"LNCS","volume-title":"Advances in Cryptology - EUROCRYPT'96","author":"Gennaro R.","year":"1996","unstructured":"R. Gennaro , S. Jarecki , H. Krawczyk , and T. Rabin . Robust threshold DSS signatures . In Advances in Cryptology - EUROCRYPT'96 , volume 1070 of LNCS , 1996 .]] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold DSS signatures. In Advances in Cryptology - EUROCRYPT'96, volume 1070 of LNCS, 1996.]]"},{"key":"e_1_3_2_1_21_1","series-title":"LNCS","volume-title":"Proceedings of ACISP'03","author":"Gu J.","year":"2003","unstructured":"J. Gu , S. Park , O. Song , L. J., J. Nah , and S. Sohn . Mobile PKI: A PKI-based authentication framework for the next generation mobile communications . In Proceedings of ACISP'03 , volume 2727 of LNCS , 2003 .]] J. Gu, S. Park, O. Song, L. J., J. Nah, and S. Sohn. Mobile PKI: A PKI-based authentication framework for the next generation mobile communications. In Proceedings of ACISP'03, volume 2727 of LNCS, 2003.]]"},{"key":"e_1_3_2_1_22_1","volume-title":"Extensible Authentication Protocol method for GSM Subscriber Identity Modules (EAP-SIM)","author":"Haverinen H.","year":"2004","unstructured":"H. Haverinen and J. Salowey . Extensible Authentication Protocol method for GSM Subscriber Identity Modules (EAP-SIM) . Internet Society , draft-haverinen-pppext-eap-sim-16.txt, December 2004 .]] H. Haverinen and J. Salowey. Extensible Authentication Protocol method for GSM Subscriber Identity Modules (EAP-SIM). Internet Society, draft-haverinen-pppext-eap-sim-16.txt, December 2004.]]"},{"key":"e_1_3_2_1_23_1","series-title":"LNCS","volume-title":"Proceedings of ESORICS'98","author":"Horn G.","year":"1998","unstructured":"G. Horn and B. Preneel . Authentication and payment in future mobile systems . In Proceedings of ESORICS'98 , volume 1485 of LNCS , 1998 .]] G. Horn and B. Preneel. Authentication and payment in future mobile systems. In Proceedings of ESORICS'98, volume 1485 of LNCS, 1998.]]"},{"key":"e_1_3_2_1_24_1","unstructured":"IEEE. IEEE 802.1X - Port-based network access control June 2001.]]  IEEE. IEEE 802.1X - Port-based network access control June 2001.]]"},{"key":"e_1_3_2_1_25_1","unstructured":"IEEE. IEEE 802.11i - Specification for enhanced security July 2004.]]  IEEE. IEEE 802.11i - Specification for enhanced security July 2004.]]"},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","volume-title":"Proceedings of FC'03","author":"Jakobsson M.","year":"2003","unstructured":"M. Jakobsson , J.-P. Hubaux , and L. Butty\u00e1n . A micro-payment scheme encouraging collaboration in multi-hop cellular networks . In Proceedings of FC'03 , volume 2742 of LNCS , 2003 .]] M. Jakobsson, J.-P. Hubaux, and L. Butty\u00e1n. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In Proceedings of FC'03, volume 2742 of LNCS, 2003.]]"},{"key":"e_1_3_2_1_27_1","series-title":"LNCS","volume-title":"Proceedings of FC'97","author":"Jarecki S.","year":"1997","unstructured":"S. Jarecki and A. Odlyzko . An efficient micropayment system based on probabilistic polling . In Proceedings of FC'97 , volume 1318 of LNCS , 1997 .]] S. Jarecki and A. Odlyzko. An efficient micropayment system based on probabilistic polling. In Proceedings of FC'97, volume 1318 of LNCS, 1997.]]"},{"key":"e_1_3_2_1_28_1","series-title":"LNCS","volume-title":"Advances in Cryptology - CRYPTO'95","author":"Langford S. K.","year":"1995","unstructured":"S. K. Langford . Threshold DSS signatures without a trusted party . In Advances in Cryptology - CRYPTO'95 , volume 963 of LNCS , 1995 .]] S. K. Langford. Threshold DSS signatures without a trusted party. In Advances in Cryptology - CRYPTO'95, volume 963 of LNCS, 1995.]]"},{"key":"e_1_3_2_1_29_1","series-title":"LNCS","volume-title":"Proceedings of FC'98","author":"Lipton R. J.","year":"1998","unstructured":"R. J. Lipton and R. Ostrovsky . Micropayments via efficient coin-flipping . In Proceedings of FC'98 , volume 1465 of LNCS , 1998 .]] R. J. Lipton and R. Ostrovsky. Micropayments via efficient coin-flipping. In Proceedings of FC'98, volume 1465 of LNCS, 1998.]]"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884440"},{"key":"e_1_3_2_1_31_1","series-title":"LNCS","volume-title":"Advances in Cryptology - CRYPTO'01","author":"MacKenzie P.","year":"2001","unstructured":"P. MacKenzie and M. K. Reiter . Two-party generation of DSA signatures . In Advances in Cryptology - CRYPTO'01 , volume 2139 of LNCS , 2001 .]] P. MacKenzie and M. K. Reiter. Two-party generation of DSA signatures. In Advances in Cryptology - CRYPTO'01, volume 2139 of LNCS, 2001.]]"},{"key":"e_1_3_2_1_32_1","volume":"30","author":"Martinez-Moro E.","year":"2004","unstructured":"E. Martinez-Moro , J. Mozo-Fernandez , and C. Munuera . Compounding secret sharing schemes. Australian Journal of Combinatorics , 30 , September 2004 .]] E. Martinez-Moro, J. Mozo-Fernandez, and C. Munuera. Compounding secret sharing schemes. Australian Journal of Combinatorics, 30, September 2004.]]","journal-title":"Compounding secret sharing schemes. Australian Journal of Combinatorics"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/941326.941343"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/548089"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/646140.680934"},{"key":"e_1_3_2_1_36_1","unstructured":"Microsoft passport network. http:\/\/www.passport.com.]]  Microsoft passport network. http:\/\/www.passport.com.]]"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054135"},{"key":"e_1_3_2_1_38_1","series-title":"LNCS","volume-title":"Advances in Cryptology, EUROCRYPT'99","author":"Paillier P.","year":"1999","unstructured":"P. Paillier . Public-key cryptosystems based on composite degree residuosity classes . In Advances in Cryptology, EUROCRYPT'99 , volume 1592 of LNCS , 1999 .]] P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology, EUROCRYPT'99, volume 1592 of LNCS, 1999.]]"},{"key":"e_1_3_2_1_39_1","series-title":"LNCS","volume-title":"Security Protocols","author":"Pedersen T. P.","year":"1996","unstructured":"T. P. Pedersen . Electronic payments of small amounts . In Security Protocols , volume 1180 of LNCS , 1996 .]] T. P. Pedersen. Electronic payments of small amounts. In Security Protocols, volume 1180 of LNCS, 1996.]]"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","DOI":"10.17487\/rfc2865","volume-title":"Remote Authentication Dial in User Services (RADIUS). RFC","author":"Rigney C.","year":"2000","unstructured":"C. Rigney , S. Willens , A. Rubens , and W. Simpson . Remote Authentication Dial in User Services (RADIUS). RFC 2865, June 2000 .]] C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial in User Services (RADIUS). RFC 2865, June 2000.]]"},{"key":"e_1_3_2_1_41_1","series-title":"LNCS","volume-title":"Proceedings of FC'97","author":"Rivest R. L.","year":"1997","unstructured":"R. L. Rivest . Electronic lottery tickets as micropayments . In Proceedings of FC'97 , volume 1318 of LNCS , 1997 .]] R. L. Rivest. Electronic lottery tickets as micropayments. In Proceedings of FC'97, volume 1318 of LNCS, 1997.]]"},{"key":"e_1_3_2_1_42_1","series-title":"LNCS","volume-title":"Proceedings of FC'04","author":"Rivest R. L.","year":"2004","unstructured":"R. L. Rivest . Peppercoin micropayments . In Proceedings of FC'04 , volume 3110 of LNCS , 2004 .]] R. L. Rivest. Peppercoin micropayments. In Proceedings of FC'04, volume 3110 of LNCS, 2004.]]"},{"key":"e_1_3_2_1_43_1","series-title":"LNCS","volume-title":"Security Protocols","author":"Rivest R. L.","year":"1996","unstructured":"R. L. Rivest and A. Shamir . PayWord and MicroMint: Two simple micropayment schemes . In Security Protocols , volume 1180 of LNCS , 1996 .]] R. L. Rivest and A. Shamir. PayWord and MicroMint: Two simple micropayment schemes. In Security Protocols, volume 1180 of LNCS, 1996.]]"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024733.1024738"},{"key":"e_1_3_2_1_45_1","author":"Salgarelli L.","year":"2003","unstructured":"L. Salgarelli , M. Buddhikot , J. Garay , S. Patel , and S. Miller . Efficient authentication and key distribution in wireless IP networks. IEEE Wireless Communications Magazine , 2003 .]] L. Salgarelli, M. Buddhikot, J. Garay, S. Patel, and S. Miller. Efficient authentication and key distribution in wireless IP networks. IEEE Wireless Communications Magazine, 2003.]]","journal-title":"IEEE Wireless Communications Magazine"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2004.1391371"}],"event":{"name":"WMASH05: The Second ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots ( co-located with Mobicom 2005 Conference )","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Cologne Germany","acronym":"WMASH05"},"container-title":["Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080730.1080732","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1080730.1080732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:52Z","timestamp":1750263532000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080730.1080732"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,2]]},"references-count":46,"alternative-id":["10.1145\/1080730.1080732","10.1145\/1080730"],"URL":"https:\/\/doi.org\/10.1145\/1080730.1080732","relation":{},"subject":[],"published":{"date-parts":[[2005,9,2]]},"assertion":[{"value":"2005-09-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}