{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:11Z","timestamp":1750306271498,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3018945","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Group access authentication of machine to machine communications in LTE networks"],"prefix":"10.1145","author":[{"given":"Mariya","family":"Ouaissa","sequence":"first","affiliation":[{"name":"Moulay-Ismail University, Meknes, Morocco"}]},{"given":"A.","family":"Rhattoy","sequence":"additional","affiliation":[{"name":"Moulay-Ismail University, Meknes, Morocco"}]},{"given":"M.","family":"Lahmer","sequence":"additional","affiliation":[{"name":"Moulay-Ismail University, Meknes, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100713.00203"},{"key":"e_1_3_2_1_2_1","unstructured":"A. Kunz L. Kim H. Kim Syed S. Husain. Machine Type Communications in 3GPP: From Release 10 to Release 12.  A. Kunz L. Kim H. Kim Syed S. Husain. Machine Type Communications in 3GPP: From Release 10 to Release 12."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6163599"},{"volume-title":"Ericsson","year":"2012","author":"Fritze SAE","key":"e_1_3_2_1_4_1"},{"volume-title":"Performance Analysis of AKA Protocols for LTE Networks. Fourth International Workshop on RFID and Adaptive Wireless Sensor Networks (RAWSN'16)","author":"Mariya OUAISSA, A","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Netmanias Technical Document. LTE Security I: LTE Security Concept and LTE Authentication. July 2013.  Netmanias Technical Document. LTE Security I: LTE Security Concept and LTE Authentication. July 2013."},{"key":"e_1_3_2_1_7_1","unstructured":"3GPP TS 35.206 V11.0.0 (2012-09) Technical Specification; 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1 f1* f2 f3 f4 f5 and f5*; Document 2: Algorithm Specification (Release 11).  3GPP TS 35.206 V11.0.0 (2012-09) Technical Specification; 3G Security; Specification of the MILENAGE Algorithm Set: An example algorithm set for the 3GPP authentication and key generation functions f1 f1* f2 f3 f4 f5 and f5*; Document 2: Algorithm Specification (Release 11)."},{"key":"e_1_3_2_1_8_1","unstructured":"Chengzhe Lai Hui Li Yueyu Zhang and Jin Cao. Security Issues on Machine to Machine Communications. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 6 NO. 2 Feb 2012.  Chengzhe Lai Hui Li Yueyu Zhang and Jin Cao. Security Issues on Machine to Machine Communications. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 6 NO. 2 Feb 2012."},{"key":"e_1_3_2_1_9_1","unstructured":"Yu-Wen Chen Jui-Tang Wang Kuang-Hui Chi Chien-Chao Tseng. Group-Based Authentication and Key Agreement.  Yu-Wen Chen Jui-Tang Wang Kuang-Hui Chi Chien-Chao Tseng. Group-Based Authentication and Key Agreement."},{"key":"e_1_3_2_1_10_1","unstructured":"Chengzhe Lai Hui Li Rongxing Lu Xuemin (Sherman) Shen. SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks.  Chengzhe Lai Hui Li Rongxing Lu Xuemin (Sherman) Shen. SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks."},{"key":"e_1_3_2_1_11_1","unstructured":"3GPP TS 21.133 V4.1.0.3G security; Security threats and requirements. 2001.  3GPP TS 21.133 V4.1.0.3G security; Security threats and requirements. 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2005.124"},{"key":"e_1_3_2_1_13_1","unstructured":"3GPP TS 33.401 V11.1.0. 3GPP System Architecture Evolution (SAE); Security architecture. Sep.2011.  3GPP TS 33.401 V11.1.0. 3GPP System Architecture Evolution (SAE); Security architecture. Sep.2011."},{"key":"e_1_3_2_1_14_1","unstructured":"AVISPA Project: http:\/\/www.avispa-project.org\/  AVISPA Project: http:\/\/www.avispa-project.org\/"}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3018945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:40Z","timestamp":1750221520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":14,"alternative-id":["10.1145\/3018896.3018945","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3018945","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}