{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:12:48Z","timestamp":1758845568662},"reference-count":4,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,3,1]]},"DOI":"10.1587\/transinf.2019edl8190","type":"journal-article","created":{"date-parts":[[2020,2,29]],"date-time":"2020-02-29T22:10:39Z","timestamp":1583014239000},"page":"711-713","source":"Crossref","is-referenced-by-count":10,"title":["A Security Enhanced 5G Authentication Scheme for Insecure Channel"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Xinxin","family":"HU","sequence":"first","affiliation":[{"name":"Information Engineering University"}]},{"given":"Caixia","family":"LIU","sequence":"additional","affiliation":[{"name":"Information Engineering University"}]},{"given":"Shuxin","family":"LIU","sequence":"additional","affiliation":[{"name":"Information Engineering University"}]},{"given":"Xiaotao","family":"CHENG","sequence":"additional","affiliation":[{"name":"Information Engineering University"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] 3GPP TS33.501, \u201cSecurity architecture and procedures for 5G system,\u201d 2019."},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] D. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse, and V. Stettler, \u201cA formal analysis of 5G authentication,\u201d Proc. 2018 ACM SIGSAC Conference on Computer and Communications Security, pp.1383-1396, 2018. doi: 10.1145\/3243734.3243846. 10.1145\/3243734.3243846","DOI":"10.1145\/3243734.3243846"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] R. Borgaonkar, L. Hirschi, S. Park, and A. Shaik, \u201cNew privacy threat on 3G, 4G, and upcoming 5G AKA protocols,\u201d Proc. Privacy Enhancing Technologies, vol.2019, no.3, pp.108-127, Stockholm, Sweden, 2019. doi: 10.2478\/popets-2019-0039. 10.2478\/popets-2019-0039","DOI":"10.2478\/popets-2019-0039"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] T. F\u00e1brega, F. Javier, J.C. Herzog, and J.D. Guttman, \u201cStrand spaces: Proving security protocols correct,\u201d Journal of Computer Security, vol.7, no.2-3, pp.191-230, 1999. doi: 10.3233\/JCS-1999-72-304. 10.3233\/JCS-1999-72-304","DOI":"10.3233\/JCS-1999-72-304"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/3\/E103.D_2019EDL8190\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T03:26:27Z","timestamp":1583551587000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/3\/E103.D_2019EDL8190\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,1]]},"references-count":4,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019edl8190","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,1]]}}}