{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:20Z","timestamp":1750306880537,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,1,17]],"date-time":"2013-01-17T00:00:00Z","timestamp":1358380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004085","name":"Ministry of Education, Science and Technology","doi-asserted-by":"publisher","award":["2012R1A1A2006002"],"award-info":[{"award-number":["2012R1A1A2006002"]}],"id":[{"id":"10.13039\/501100004085","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,17]]},"DOI":"10.1145\/2448556.2448662","type":"proceedings-article","created":{"date-parts":[[2013,3,19]],"date-time":"2013-03-19T13:34:53Z","timestamp":1363700093000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An enhanced mechanism with cryptographic computation cost reduction in AAA-mobile IP architecture"],"prefix":"10.1145","author":[{"given":"Pham Ngoc","family":"Thanh","sequence":"first","affiliation":[{"name":"Konkuk University, Seoul, South Korea"}]},{"given":"Keecheon","family":"Kim","sequence":"additional","affiliation":[{"name":"Konkuk University, Seoul, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2013,1,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"J. Vollbrecht P. Calhoun S. Farrell L. Gommans G. Gross B. de Bruijn C. de Laat M. Holdrege D. Spence AAA Authorization Application Examples RFC 2905 August 2000.   J. Vollbrecht P. Calhoun S. Farrell L. Gommans G. Gross B. de Bruijn C. de Laat M. Holdrege D. Spence AAA Authorization Application Examples RFC 2905 August 2000.","DOI":"10.17487\/rfc2905"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"K. El Malki Ed. Low-Latency Handoffs in Mobile IPv4 RFC 4881 June 2007.  K. El Malki Ed. Low-Latency Handoffs in Mobile IPv4 RFC 4881 June 2007.","DOI":"10.17487\/rfc4881"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Madjid Nakhjiri Mahsa Nakhjiri. AAA and Network Security for Mobile Access: Radius Diameter EAP PKI and IP Mobility October 31st 2005.   Madjid Nakhjiri Mahsa Nakhjiri. AAA and Network Security for Mobile Access: Radius Diameter EAP PKI and IP Mobility October 31st 2005.","DOI":"10.1002\/0470017465"},{"key":"e_1_3_2_1_4_1","volume-title":"ICCSA 2003","volume":"2003","author":"Kim Hyun Gon","year":"2003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"E. Fogelstroem A. Jonsson C. Perkins Mobile IPv4 Regional Registration RFC 4857 June 2007.  E. Fogelstroem A. Jonsson C. Perkins Mobile IPv4 Regional Registration RFC 4857 June 2007.","DOI":"10.17487\/rfc4857"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2006.288727"},{"key":"e_1_3_2_1_7_1","unstructured":"Wei Dai Crypto++ 5.6.0 Benchmarks http:\/\/www.cryptopp.com\/benchmarks.html  Wei Dai Crypto ++ 5.6.0 Benchmarks http:\/\/www.cryptopp.com\/benchmarks.html"},{"key":"e_1_3_2_1_8_1","unstructured":"Advanced Encryption Standard Wikipedia. Advanced Encryption Standard Wikipedia."}],"event":{"name":"ICUIMC '13: The 7th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Kota Kinabalu Malaysia","acronym":"ICUIMC '13"},"container-title":["Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2448556.2448662","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2448556.2448662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:32Z","timestamp":1750234712000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2448556.2448662"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,17]]},"references-count":8,"alternative-id":["10.1145\/2448556.2448662","10.1145\/2448556"],"URL":"https:\/\/doi.org\/10.1145\/2448556.2448662","relation":{},"subject":[],"published":{"date-parts":[[2013,1,17]]},"assertion":[{"value":"2013-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}