{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:29Z","timestamp":1750308149182,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,9,2]],"date-time":"2005-09-02T00:00:00Z","timestamp":1125619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,9,2]]},"DOI":"10.1145\/1080793.1080804","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"57-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Privacy enhanced cellular access security"],"prefix":"10.1145","author":[{"given":"Geir M.","family":"K\u00f8ien","sequence":"first","affiliation":[{"name":"Telenor R&amp;D, Fornebu, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2005,9,2]]},"reference":[{"volume-title":"Sophia Antipolis","year":"2005","author":"G TS","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269712"},{"volume-title":"Wiley","year":"2003","author":"Nyberg K.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","first-page":"65","volume-title":"Proceedings of NORDSEC 2004","author":"K\u00f8ien G. M.","year":"2004"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/215530.215548"},{"volume-title":"Proc. of SCIS 2001","year":"2001","author":"Go J.","key":"e_1_3_2_1_6_1"},{"volume-title":"Sophia Antipolis","year":"2005","author":"G TS","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. IETF RFC 2401 November 1998.   S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. IETF RFC 2401 November 1998.","DOI":"10.17487\/rfc2401"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"D. Dolev and A. Yao. On the Security of Public-Key Protocols. IEEE Trans. on Inf. Theory 1983 2 29","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_10_1","unstructured":"AVISPA project. Deliverable D2.1: The High Level Protocol Specification Language IST-2001-39252 2004.  AVISPA project. Deliverable D2.1: The High Level Protocol Specification Language IST-2001-39252 2004."},{"key":"e_1_3_2_1_11_1","first-page":"47","volume-title":"Proc. CRYPTO 1984","author":"Shamir A.","year":"1984"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"volume-title":"CRC Press","year":"2001","author":"Menezes A.J.","key":"e_1_3_2_1_13_1"},{"volume-title":"Proc. ANTS-IV","year":"2000","author":"Joux A.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","first-page":"2760","volume-title":"IEEE PIMRC 2003","author":"K\u00f8ien G.M.","year":"2003"},{"key":"e_1_3_2_1_17_1","first-page":"161","volume-title":"Proceedings of NORDSEC 2003","author":"K\u00f8ien G.M.","year":"2003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269719"},{"volume-title":"Location Management Strategies Increasing Privacy in Mobile Communication. IFIP SEC 1996","year":"1996","author":"Kesdogan D.","key":"e_1_3_2_1_21_1"},{"volume-title":"Proc. First Intern. Workshop on Information Hiding","year":"1996","author":"Federrath H.","key":"e_1_3_2_1_22_1"},{"volume-title":"Workshop on Mobile Computing Systems and Applications","year":"1994","author":"Asokan N.","key":"e_1_3_2_1_23_1"},{"issue":"8","key":"e_1_3_2_1_24_1","first-page":"785","volume":"31","author":"Ateniese G.","year":"1999","journal-title":"Untraceable Mobility or How to Travel Incognito. Computer Networks journal"}],"event":{"name":"WiSE05: 2005 ACM Workshop on Wireless Security ( co-located with Mobicom 2005 Conference )","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Cologne Germany","acronym":"WiSE05"},"container-title":["Proceedings of the 4th ACM workshop on Wireless security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080793.1080804","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1080793.1080804","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:42Z","timestamp":1750263522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1080793.1080804"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,2]]},"references-count":23,"alternative-id":["10.1145\/1080793.1080804","10.1145\/1080793"],"URL":"https:\/\/doi.org\/10.1145\/1080793.1080804","relation":{},"subject":[],"published":{"date-parts":[[2005,9,2]]},"assertion":[{"value":"2005-09-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}