{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:38Z","timestamp":1750307678836,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,10]],"date-time":"2009-03-10T00:00:00Z","timestamp":1236643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,10]]},"DOI":"10.1145\/1533057.1533072","type":"proceedings-article","created":{"date-parts":[[2009,4,28]],"date-time":"2009-04-28T14:57:19Z","timestamp":1240930639000},"page":"92-103","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Authenticated wireless roaming via tunnels"],"prefix":"10.1145","author":[{"given":"Mark","family":"Manulis","sequence":"first","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Damien","family":"Leroy","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Francois","family":"Koeune","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Olivier","family":"Bonaventure","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]},{"given":"Jean-Jacques","family":"Quisquater","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Louvain-la-Neuve, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2009,3,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"802\n   .1X-2004 IEEE Standard for Local and Metropolitan Area Networks --- Port-Based Network Access Control. IEEE 2004. 802.1X-2004 IEEE Standard for Local and Metropolitan Area Networks --- Port-Based Network Access Control . IEEE 2004."},{"key":"e_1_3_2_1_2_1","volume-title":"Technical report","author":"3GPP. Group Core Network and Terminals; Handover Procedures (Release 7).","year":"2007","unstructured":"3GPP. Group Core Network and Terminals; Handover Procedures (Release 7). Technical report , 2007 . 3GPP. Group Core Network and Terminals; Handover Procedures (Release 7). Technical report, 2007."},{"key":"e_1_3_2_1_3_1","first-page":"143","volume-title":"LNCS 2020","author":"Abdalla M.","year":"2001","unstructured":"M. Abdalla , M. Bellare , and P. Rogaway . The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In CT-RSA'01 , LNCS 2020 , pp. 143 -- 158 . Springer , 2001 . M. Abdalla, M. Bellare, and P. Rogaway. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES. In CT-RSA'01, LNCS 2020, pp. 143--158. Springer, 2001."},{"key":"e_1_3_2_1_4_1","volume-title":"IETF","author":"Aboba B.","year":"2004","unstructured":"B. Aboba , L. Blunk , J. Vollbrecht , J. Carlson , and H. Levkowetz . Extensible Authentication Protocol (EAP). RFC 3748 , IETF , 2004 . B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz. Extensible Authentication Protocol (EAP). RFC 3748, IETF, 2004."},{"key":"e_1_3_2_1_5_1","volume-title":"Wi-Fi Alliance - Wireless ISP Roaming (WISPr)","author":"Anton B.","year":"2003","unstructured":"B. Anton , B. Bullock , and J. Short . Best Current Practices for Wireless Internet Service Provider (WISP) Roaming . Wi-Fi Alliance - Wireless ISP Roaming (WISPr) , Feb. 2003 . B. Anton, B. Bullock, and J. Short. Best Current Practices for Wireless Internet Service Provider (WISP) Roaming. Wi-Fi Alliance - Wireless ISP Roaming (WISPr), Feb. 2003."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:WIRE.0000047067.12167.67"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_36"},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"CRYPTO '96, LNCS 1109","author":"Bellare M.","year":"1996","unstructured":"M. Bellare , R. Canetti , and H. Krawczyk . Keying Hash Functions for Message Authentication . In CRYPTO '96, LNCS 1109 , pp. 1 -- 15 . Springer , 1996 . M. Bellare, R. Canetti, and H. Krawczyk. Keying Hash Functions for Message Authentication. In CRYPTO '96, LNCS 1109, pp. 1--15. Springer, 1996."},{"key":"e_1_3_2_1_9_1","first-page":"531","volume-title":"ASIACRYPT'00","author":"Bellare M.","year":"1976","unstructured":"M. Bellare and C. Namprempre . Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm . In ASIACRYPT'00 , LNCS 1976 , pp. 531 -- 545 . Springer , 2000. M. Bellare and C. Namprempre. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. In ASIACRYPT'00, LNCS 1976, pp. 531--545. Springer, 2000."},{"key":"e_1_3_2_1_10_1","first-page":"232","volume-title":"CRYPTO '93, LNCS 773","author":"Bellare M.","year":"1993","unstructured":"M. Bellare and P. Rogaway . Entity Authentication and Key Distribution . In CRYPTO '93, LNCS 773 , pp. 232 -- 249 . Springer , 1993 . M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In CRYPTO '93, LNCS 773, pp. 232--249. Springer, 1993."},{"key":"e_1_3_2_1_11_1","first-page":"92","volume-title":"EUROCRYPT'94, LNCS 950","author":"Bellare M.","year":"1994","unstructured":"M. Bellare and P. Rogaway . Optimal Asymmetric Encryption --- How to Encrypt with RSA . In EUROCRYPT'94, LNCS 950 , pp. 92 -- 111 . Springer , 1994 . M. Bellare and P. Rogaway. Optimal Asymmetric Encryption --- How to Encrypt with RSA. In EUROCRYPT'94, LNCS 950, pp. 92--111. Springer, 1994."},{"key":"e_1_3_2_1_12_1","first-page":"399","volume-title":"EUROCRYPT'96, LNCS 1070","author":"Bellare M.","year":"1996","unstructured":"M. Bellare and P. Rogaway . The Exact Security of Digital Signatures - How to Sign with RSA and Rabin . In EUROCRYPT'96, LNCS 1070 , pp. 399 -- 416 . Springer , 1996 . M. Bellare and P. Rogaway. The Exact Security of Digital Signatures - How to Sign with RSA and Rabin. In EUROCRYPT'96, LNCS 1070, pp. 399--416. Springer, 1996."},{"key":"e_1_3_2_1_13_1","first-page":"48","volume-title":"ANTS-III, LNCS 1423","author":"Boneh D.","year":"1998","unstructured":"D. Boneh . The Decision Diffie-Hellman Problem . In ANTS-III, LNCS 1423 , pp. 48 -- 63 . Springer , 1998 . D. Boneh. The Decision Diffie-Hellman Problem. In ANTS-III, LNCS 1423, pp. 48--63. Springer, 1998."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_15"},{"key":"e_1_3_2_1_15_1","first-page":"325","volume-title":"SAC'02, LNCS 2595","author":"Bresson E.","year":"2002","unstructured":"E. Bresson , O. Chevassut , and D. Pointcheval . The Group Diffie-Hellman Problems . In SAC'02, LNCS 2595 , pp. 325 -- 338 . Springer , 2002 . E. Bresson, O. Chevassut, and D. Pointcheval. The Group Diffie-Hellman Problems. In SAC'02, LNCS 2595, pp. 325--338. Springer, 2002."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502018"},{"key":"e_1_3_2_1_17_1","volume-title":"IETF","author":"Kaufman C.","year":"2005","unstructured":"C. Kaufman , Ed. Internet Key Exchange (IKEv2) Protocol. RFC 4306 , IETF , 2005 . C. Kaufman, Ed. Internet Key Exchange (IKEv2) Protocol. RFC 4306, IETF, 2005."},{"key":"e_1_3_2_1_18_1","first-page":"453","volume-title":"Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In EUROCRYPT'01","author":"Canetti R.","year":"2045","unstructured":"R. Canetti and H. Krawczyk . Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In EUROCRYPT'01 , LNCS 2045 , pp. 453 -- 474 . Springer , 2001. R. Canetti and H. Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In EUROCRYPT'01, LNCS 2045, pp. 453--474. Springer, 2001."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_32"},{"key":"e_1_3_2_1_20_1","first-page":"226","volume-title":"CRYPTO'02, LNCS 2442","author":"Coron J.-S.","year":"2002","unstructured":"J.-S. Coron , M. Joye , D. Naccache , and P. Paillier . Universal Padding Schemes for RSA . In CRYPTO'02, LNCS 2442 , pp. 226 -- 241 . Springer , 2002 . J.-S. Coron, M. Joye, D. Naccache, and P. Paillier. Universal Padding Schemes for RSA. In CRYPTO'02, LNCS 2442, pp. 226--241. Springer, 2002."},{"key":"e_1_3_2_1_21_1","first-page":"13","volume-title":"CRYPTO'98, LNCS 1462","author":"Cramer R.","year":"1998","unstructured":"R. Cramer and V. Shoup . A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack . In CRYPTO'98, LNCS 1462 , pp. 13 -- 25 . Springer , 1998 . R. Cramer and V. Shoup. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. In CRYPTO'98, LNCS 1462, pp. 13--25. Springer, 1998."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298313"},{"key":"e_1_3_2_1_24_1","first-page":"494","volume-title":"CRYPTO'04, LNCS 3152","author":"Dodis Y.","year":"2004","unstructured":"Y. Dodis , R. Gennaro , J. H\u00e5stad , H. Krawczyk , and T. Rabin . Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes . In CRYPTO'04, LNCS 3152 , pp. 494 -- 510 . Springer , 2004 . Y. Dodis, R. Gennaro, J. H\u00e5stad, H. Krawczyk, and T. Rabin. Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In CRYPTO'04, LNCS 3152, pp. 494--510. Springer, 2004."},{"key":"e_1_3_2_1_25_1","unstructured":"eduroam. http:\/\/www.eduroam.org.  eduroam. http:\/\/www.eduroam.org."},{"key":"e_1_3_2_1_26_1","first-page":"929","article-title":"Digital Cellular Telecommunications System (Phase 2+);","volume":"100","author":"Technical Specification ETSI","year":"2008","unstructured":"ETSI Technical Specification . Digital Cellular Telecommunications System (Phase 2+); Security Related Network Function. TS 100 929 , ETSI, 2008 . ETSI Technical Specification. Digital Cellular Telecommunications System (Phase 2+); Security Related Network Function. TS 100 929, ETSI, 2008.","journal-title":"Security Related Network Function. TS"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0204-y"},{"key":"e_1_3_2_1_28_1","volume-title":"IETF","author":"Funk P.","year":"2008","unstructured":"P. Funk and S. Blake-Wilson . Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0). RFC 5281 , IETF , 2008 . P. Funk and S. Blake-Wilson. Extensible Authentication Protocol Tunneled Transport Layer Security Authenticated Protocol Version 0 (EAP-TTLSv0). RFC 5281, IETF, 2008."},{"key":"e_1_3_2_1_29_1","first-page":"180","volume-title":"ACISP'03, LNCS 2727","author":"Gu J.","year":"2003","unstructured":"J. Gu , S. Park , O. Song , J. Lee , J. Nah , and S. W. Sohn . Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications . In ACISP'03, LNCS 2727 , pp. 180 -- 191 . Springer , 2003 . J. Gu, S. Park, O. Song, J. Lee, J. Nah, and S. W. Sohn. Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications. In ACISP'03, LNCS 2727, pp. 180--191. Springer, 2003."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_1"},{"key":"e_1_3_2_1_31_1","volume-title":"One-Way Transmission Time. G. 114","author":"T.","year":"2003","unstructured":"ITU- T. One-Way Transmission Time. G. 114 , 2003 . ITU-T. One-Way Transmission Time. G. 114, 2003."},{"key":"e_1_3_2_1_32_1","volume-title":"IETF","author":"Kent S.","year":"2005","unstructured":"S. Kent and K. Seo . Security Architecture for the Internet Protocol. RFC 4301 , IETF , 2005 . S. Kent and K. Seo. Security Architecture for the Internet Protocol. RFC 4301, IETF, 2005."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2003.1182107"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948212"},{"key":"e_1_3_2_1_35_1","first-page":"1","volume-title":"ProvSec'07, LNCS 4789","author":"LaMacchia B. A.","year":"2007","unstructured":"B. A. LaMacchia , K. Lauter , and A. Mityagin . Stronger Security of Authenticated Key Exchange . In ProvSec'07, LNCS 4789 , pp. 1 -- 16 . Springer , 2007 . B. A. LaMacchia, K. Lauter, and A. Mityagin. Stronger Security of Authenticated Key Exchange. In ProvSec'07, LNCS 4789, pp. 1--16. Springer, 2007."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20040661"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-6428-y"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080730.1080732"},{"key":"e_1_3_2_1_40_1","first-page":"26","volume":"8","author":"Molva R.","year":"1994","unstructured":"R. Molva , D. Samfat , and G. Tsudik . Authentication of Mobile Users. IEEE Network , 8 : 26 -- 34 , 1994 . R. Molva, D. Samfat, and G. Tsudik. Authentication of Mobile Users. IEEE Network, 8:26--34, 1994.","journal-title":"Authentication of Mobile Users. IEEE Network"},{"key":"e_1_3_2_1_41_1","unstructured":"NIST. Digital Signature Standard (DSS). FIPS PUB 186--2 2000.  NIST. Digital Signature Standard (DSS). FIPS PUB 186--2 2000."},{"key":"e_1_3_2_1_42_1","first-page":"433","volume-title":"CRYPTO'91, LNCS 576","author":"Rackoff C.","year":"1991","unstructured":"C. Rackoff and D. R. Simon . Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack . In CRYPTO'91, LNCS 576 , pp. 433 -- 444 . Springer , 1991 . C. Rackoff and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In CRYPTO'91, LNCS 576, pp. 433--444. Springer, 1991."},{"key":"e_1_3_2_1_43_1","volume-title":"TERENA Networking Conf.","author":"Ribeiro C.","year":"2004","unstructured":"C. Ribeiro , F. Silva , and A. Z\u00faquete . A Roaming Authentication Solution for Wifi using IPsec VPNs with Client Certificates . In TERENA Networking Conf. , 2004 . C. Ribeiro, F. Silva, and A. Z\u00faquete. A Roaming Authentication Solution for Wifi using IPsec VPNs with Client Certificates. In TERENA Networking Conf., 2004."},{"key":"e_1_3_2_1_44_1","volume-title":"IETF","author":"Rigney C.","year":"2000","unstructured":"C. Rigney , S. Willens , A. Rubens , and W. Simpson . Remote Authentication Dial In User Service (RADIUS). RFC 2865 , IETF , 2000 . C. Rigney, S. Willens, A. Rubens, and W. Simpson. Remote Authentication Dial In User Service (RADIUS). RFC 2865, IETF, 2000."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1093\/ijlit\/ean016"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269713"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2003.1265853"},{"key":"e_1_3_2_1_48_1","volume-title":"HotNets-VI, 2007","author":"Sastry N.","year":"2007","unstructured":"N. Sastry , K. Sollins , and J. Crowcroft . Architecting Citywide Ubiquitous Wi-Fi Access . In HotNets-VI, 2007 . available at http:\/\/conferences.sigcomm.org\/ hotnets\/ 2007 \/papers\/hotnets6-final88.pdf. N. Sastry, K. Sollins, and J. Crowcroft. Architecting Citywide Ubiquitous Wi-Fi Access. In HotNets-VI, 2007. available at http:\/\/conferences.sigcomm.org\/ hotnets\/2007\/papers\/hotnets6-final88.pdf."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_50_1","volume-title":"IETF","author":"Simon D.","year":"2008","unstructured":"D. Simon , B. Aboba , and R. Hurst . The EAP-TLS Authentication Protocol. RFC 5216 , IETF , 2008 . D. Simon, B. Aboba, and R. Hurst. The EAP-TLS Authentication Protocol. RFC 5216, IETF, 2008."},{"key":"e_1_3_2_1_51_1","first-page":"495","volume-title":"ICICS'07, LNCS 4861","author":"Stamm S.","year":"2007","unstructured":"S. Stamm , Z. Ramzan , and M. Jakobsson . Drive-By Pharming . In ICICS'07, LNCS 4861 , pp. 495 -- 506 . Springer , 2007 . S. Stamm, Z. Ramzan, and M. Jakobsson. Drive-By Pharming. In ICICS'07, LNCS 4861, pp. 495--506. Springer, 2007."},{"key":"e_1_3_2_1_52_1","volume-title":"IETF","author":"Townsley W.","year":"1999","unstructured":"W. Townsley , A. Valencia , A. Rubens , G. Pall , G. Zorn , and B. Palter . Layer Two Tunneling Protocol L2TP. RFC 2661 , IETF , 1999 . W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter. Layer Two Tunneling Protocol L2TP. RFC 2661, IETF, 1999."}],"event":{"name":"Asia CCS 09: Asia CCS 2009 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Sydney Australia","acronym":"Asia CCS 09"},"container-title":["Proceedings of the 4th International Symposium on Information, Computer, and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1533057.1533072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1533057.1533072"}},"subtitle":["making mobile guests feel at home"],"short-title":[],"issued":{"date-parts":[[2009,3,10]]},"references-count":51,"alternative-id":["10.1145\/1533057.1533072","10.1145\/1533057"],"URL":"https:\/\/doi.org\/10.1145\/1533057.1533072","relation":{},"subject":[],"published":{"date-parts":[[2009,3,10]]},"assertion":[{"value":"2009-03-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}