{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:43:48Z","timestamp":1755035028462,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T00:00:00Z","timestamp":1634860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,22]]},"DOI":"10.1145\/3501409.3501568","type":"proceedings-article","created":{"date-parts":[[2022,1,2]],"date-time":"2022-01-02T06:18:12Z","timestamp":1641104292000},"page":"882-888","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Formal Analysis and Verification of Embedded SIM Session Key Agreement Protocol"],"prefix":"10.1145","author":[{"given":"Zhonglin","family":"Ding","sequence":"first","affiliation":[{"name":"NARI Group Corporation (State Grid Electric Power Research Institute), Nanjing, China"}]},{"given":"Yang","family":"Hu","sequence":"additional","affiliation":[{"name":"NARI Group Corporation (State Grid Electric Power Research Institute), Nanjing, China"}]},{"given":"Wei","family":"Luo","sequence":"additional","affiliation":[{"name":"NARI Group Corporation (State Grid Electric Power Research Institute), Nanjing, China"}]},{"given":"Zhongming","family":"Huang","sequence":"additional","affiliation":[{"name":"NARI Group Corporation (State Grid Electric Power Research Institute), Nanjing, China"}]},{"given":"Jintao","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]},{"given":"Zhongyuan","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Southeast University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,31]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"170","volume":"202","author":"Cao J.","unstructured":"Cao J., Ma M., Li H., et al. A Survey on Security Aspects for 3GPP 5G Networks. IEEE Communications Surveys & Tutorials. 2020. 22(1): 170--195.","journal-title":"IEEE Communications Surveys & Tutorials."},{"key":"e_1_3_2_1_2_1","unstructured":"GSMA. Embedded SIM Remote Provisioning Architecture Version 4.1 05 June 2020.."},{"key":"e_1_3_2_1_3_1","volume-title":"Research on the security analysis and implementation of eSIM. China Internet","author":"Qiu J.","year":"2016","unstructured":"Qiu J., Kang J., Yan B. Research on the security analysis and implementation of eSIM. China Internet. 2016.."},{"key":"e_1_3_2_1_4_1","first-page":"37","volume":"201","author":"Luo XZ.","unstructured":"Luo XZ. Research on the development of over-the-air writing technology and security of eSIM card [J]. Digital Communication World. 2019. (08): 37--60.","journal-title":"Digital Communication World."},{"key":"e_1_3_2_1_5_1","volume-title":"Ananlysis of Embedded SIM Remote Provisioning Technologies and Security Problems. Telecommunications Network Technology","author":"Dan L.","year":"2016","unstructured":"Dan L., Wu H. Ananlysis of Embedded SIM Remote Provisioning Technologies and Security Problems. Telecommunications Network Technology. 2016.."},{"key":"e_1_3_2_1_6_1","volume-title":"Security Analysis and Implementation of Card Personalization Over the Air. Information Security and Communications Privacy","author":"Zhang-Hui Zhou","year":"2007","unstructured":"Zhang-Hui Zhou, Tong-Yang Wang, Jun-Jun W. U., et al. Security Analysis and Implementation of Card Personalization Over the Air. Information Security and Communications Privacy. 2007.."},{"key":"e_1_3_2_1_7_1","unstructured":"Kont\u0161ek M. Sege\u010d P. Morav\u010d\u00edk M. et al. Approaches and tools for network protocol modeling. Star\u00fd Smokovec:2019. 419--424."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"He L. Liu G. Model Checking CTLK Based on Knowledge-Oriented Petri Nets. Zhangjiajie China:2019. 1139--1146.","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00161"},{"key":"e_1_3_2_1_9_1","first-page":"245","volume":"201","author":"Boukredera Djamila","unstructured":"Boukredera Djamila, Maamri Ramdane, Aknine Samir. Stochastic Petri net-based modeling and formal analysis of fault tolerant Contract Net Protocol. Web Intelligence. 2016. 14(3): 245--271.","journal-title":"Contract Net Protocol. Web Intelligence."},{"key":"e_1_3_2_1_10_1","first-page":"1","volume":"201","author":"Ninet T.","unstructured":"Ninet T., Legay A., Maillard R., et al. Model Checking the IKEv2 Protocol Using Spin.:2019. 1--7.","journal-title":"Model Checking the IKEv2 Protocol Using Spin."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Babenko L. Pisarev I. Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier. Zhengzhou China:2018. 43--435.","DOI":"10.1109\/CyberC.2018.00019"},{"key":"e_1_3_2_1_12_1","first-page":"1404","volume":"202","author":"Xi WANG","unstructured":"Xi-zhong WANG, Mei-hua XIAO, Ke YANG, et al. Formal analysis and verification of MIXCOIN protocol based on SPIN. Journal of Guangxi University (Natural Science Edition). 2020. 45(06): 1404--1412.","journal-title":"Journal of Guangxi University (Natural Science Edition)."}],"event":{"name":"EITCE 2021: 2021 5th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2021","location":"Xiamen China"},"container-title":["Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501409.3501568","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3501409.3501568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:02Z","timestamp":1750193342000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501409.3501568"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,22]]},"references-count":12,"alternative-id":["10.1145\/3501409.3501568","10.1145\/3501409"],"URL":"https:\/\/doi.org\/10.1145\/3501409.3501568","relation":{},"subject":[],"published":{"date-parts":[[2021,10,22]]},"assertion":[{"value":"2021-12-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}