{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:11:21Z","timestamp":1770225081506,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338500.3360337","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:43:22Z","timestamp":1573155802000},"page":"45-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy Preserving AKMA in 5G"],"prefix":"10.1145","author":[{"given":"Mohsin","family":"Khan","sequence":"first","affiliation":[{"name":"University of Helsinki, Helsinki, Finland"}]},{"given":"Philip","family":"Ginzboorg","sequence":"additional","affiliation":[{"name":"Huawei Technologies &amp; Aalto University, Helsinki, Finland"}]},{"given":"Valtteri","family":"Niemi","sequence":"additional","affiliation":[{"name":"University of Helsinki, Helsinki, Finland"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1\n  ]  3GPP. 2018. Study on authentication and key management for applications based on 3GPP credential in 5G (Work Item Description). https:\/\/portal.3gpp. org\/ngppapp\/CreateTdoc.aspx?mode=view&contributionUid=SP-180443.  1] 3GPP. 2018. Study on authentication and key management for applications based on 3GPP credential in 5G (Work Item Description). https:\/\/portal.3gpp. org\/ngppapp\/CreateTdoc.aspx?mode=view&contributionUid=SP-180443."},{"key":"e_1_3_2_1_2_1","unstructured":"3GPP. 2018. TS 23.501 System Architecture for the 5G System. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails. aspx'specificationId=3144.  3GPP. 2018. TS 23.501 System Architecture for the 5G System. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails. aspx'specificationId=3144."},{"key":"e_1_3_2_1_3_1","unstructured":"3GPP. 2018. TS 33.102 V 15.1.0 Security architecture (Release 14). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails. aspx'specificationId=2262.  3GPP. 2018. TS 33.102 V 15.1.0 Security architecture (Release 14). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails. aspx'specificationId=2262."},{"key":"e_1_3_2_1_4_1","unstructured":"3GPP. 2018. TS 33.220 V15.4.0 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA). https:\/\/portal.3gpp.org\/ desktopmodules\/Specifications\/SpecificationDetails.aspx'specificationId=2280.  3GPP. 2018. TS 33.220 V15.4.0 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA). https:\/\/portal.3gpp.org\/ desktopmodules\/Specifications\/SpecificationDetails.aspx'specificationId=2280."},{"key":"e_1_3_2_1_5_1","unstructured":"3GPP. 2018. TS 33.223 V15.0.0 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function. https:\/\/portal.3gpp.org\/ desktopmodules\/Specifications\/SpecificationDetails.aspx'specificationId=2283.  3GPP. 2018. TS 33.223 V15.0.0 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function. https:\/\/portal.3gpp.org\/ desktopmodules\/Specifications\/SpecificationDetails.aspx'specificationId=2283."},{"key":"e_1_3_2_1_6_1","unstructured":"3GPP. 2019. 3GPP TR 33.835 Study on authentication and key management for applications; based on 3GPP credential in 5G V0.5.0. https:\/\/portal.3gpp.org\/ desktopmodules\/Specifications\/SpecificationDetails.aspx'specificationId=3483  3GPP. 2019. 3GPP TR 33.835 Study on authentication and key management for applications; based on 3GPP credential in 5G V0.5.0. https:\/\/portal.3gpp.org\/ desktopmodules\/Specifications\/SpecificationDetails.aspx'specificationId=3483"},{"key":"e_1_3_2_1_7_1","unstructured":"3GPP. 2019. TS 22.261 V 16.8.0 Service requirements for next generation new services and markets. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/ SpecificationDetails.aspx'specificationId=3107.  3GPP. 2019. TS 22.261 V 16.8.0 Service requirements for next generation new services and markets. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/ SpecificationDetails.aspx'specificationId=3107."},{"key":"e_1_3_2_1_8_1","unstructured":"3GPP. 2019. TS 33.163 V16.1.0 Battery Efficient Security for very low throughput Machine Type Communication (MTC) devices (BEST). https:\/\/portal.3gpp.org\/ desktopmodules\/Specifications\/SpecificationDetails.aspx'specificationId=3128.  3GPP. 2019. TS 33.163 V16.1.0 Battery Efficient Security for very low throughput Machine Type Communication (MTC) devices (BEST). https:\/\/portal.3gpp.org\/ desktopmodules\/Specifications\/SpecificationDetails.aspx'specificationId=3128."},{"key":"e_1_3_2_1_9_1","unstructured":"3GPP. 2019. TS 33.401 V 15.8.0 Security architecture (Release 15). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails. aspx'specificationId=2296.  3GPP. 2019. TS 33.401 V 15.8.0 Security architecture (Release 15). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails. aspx'specificationId=2296."},{"key":"e_1_3_2_1_10_1","unstructured":"3GPP. 2019. TS 33.501 Security architecture and procedures for 5G System. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails. aspx'specificationId=3169.  3GPP. 2019. TS 33.501 Security architecture and procedures for 5G System. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails. aspx'specificationId=3169."},{"key":"e_1_3_2_1_11_1","volume-title":"Retrieved","author":"Whitepaper G","year":"2018"},{"key":"e_1_3_2_1_12_1","volume-title":"Retrieved","author":"Authors Tripwire Guest","year":"2017"},{"key":"e_1_3_2_1_13_1","first-page":"514","article-title":"Short signatures from theWeil pairing","volume":"01","author":"Boneh Dan","year":"2001","journal-title":"Advances in Cryptology - ASIACRYPT"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"Freeman David","year":"2005"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Silke Holtmanns Valtteri Niemi Philip Ginzboorg Pekka Laitinen and N. Asokan. 2008. Cellular Authentication for Mobile and Internet Services. Wiley.  Silke Holtmanns Valtteri Niemi Philip Ginzboorg Pekka Laitinen and N. Asokan. 2008. Cellular Authentication for Mobile and Internet Services. Wiley.","DOI":"10.1002\/9780470771013"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Koblitz Neal","year":"2007"},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"Lindsey Nicole","year":"2018"},{"key":"e_1_3_2_1_18_1","unstructured":"David McCourt. 2019. The UK's porn block is going to be a privacy disaster. Retrieved July 2 2019 from https:\/\/www.androidpit.com\/uk-porn-block-privacydisaster  David McCourt. 2019. The UK's porn block is going to be a privacy disaster. Retrieved July 2 2019 from https:\/\/www.androidpit.com\/uk-porn-block-privacydisaster"},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved","year":"2019"},{"key":"e_1_3_2_1_20_1","unstructured":"OpenID Review [n. d.]. OpenID Review. Retrieved June 24 2019 from https: \/\/sites.google.com\/site\/openidreview\/issues  OpenID Review [n. d.]. OpenID Review. Retrieved June 24 2019 from https: \/\/sites.google.com\/site\/openidreview\/issues"},{"key":"e_1_3_2_1_21_1","volume-title":"Retrieved","author":"Data Protection Privacy","year":"2014"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2015.7356545"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2561019"},{"key":"e_1_3_2_1_24_1","volume-title":"Retrieved","year":"2019"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338500.3360337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338500.3360337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338500.3360337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":24,"alternative-id":["10.1145\/3338500.3360337","10.1145\/3338500"],"URL":"https:\/\/doi.org\/10.1145\/3338500.3360337","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}