{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:47Z","timestamp":1725558707411},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240150"},{"type":"electronic","value":"9783540318156"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31815-6_2","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:44:24Z","timestamp":1277916264000},"page":"14-26","source":"Crossref","is-referenced-by-count":4,"title":["An Improvement on Privacy and Authentication in GSM"],"prefix":"10.1007","author":[{"given":"Young Jae","family":"Choi","sequence":"first","affiliation":[]},{"given":"Soon Ja","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/A:1019103228471","volume":"5","author":"C.H. Lee","year":"1999","unstructured":"Lee, C.H., Hwang, M.S., Yang, W.P.: Enhanced privacy and authentication for global system for mobile communications. Wireless networks\u00a05, 231\u2013243 (1999)","journal-title":"Wireless networks"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Lee, C.C., Hwang, M.S., Yang, W.P.: Extension of authentication protocol for GSM. IEE Proc.-Commun.\u00a0150(2) (April 2003)","DOI":"10.1049\/ip-com:20030290"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Molva, R., Samfat, D., Tsudik, G.: Authentication of Mobile Users. IEEE Network, 26\u201334 (March\/April 1994)","DOI":"10.1109\/65.272938"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"El-Fishway, N., Nofal, M., Tadros, A.: An effective approach for authentication of Mobile users. In: IEEE VTC 2002, pp. 598\u2013601 (2002)","DOI":"10.1109\/VTC.2002.1002553"},{"key":"2_CR5","first-page":"326","volume-title":"An efficient authentication protocol for GSM Networks","author":"M.S. Hwang","year":"2000","unstructured":"Hwang, M.S., Tang, Y.L., Lee, C.C.: An efficient authentication protocol for GSM Networks, pp. 326\u2013329. IEEE, Los Alamitos (2000)"},{"key":"2_CR6","first-page":"175","volume-title":"An Improvement on secure communication in PCS","author":"N. El-Fishway","year":"2003","unstructured":"El-Fishway, N., Nofal, M., Tadros, A.: An Improvement on secure communication in PCS, pp. 175\u2013182. IEEE, Los Alamitos (2003)"},{"key":"2_CR7","unstructured":"Xu, M., Upadhyaya, S.: Secure Communication in PCS. In: IEEE VTC 2001, pp. 2193\u20132197 (2001)"},{"key":"2_CR8","unstructured":"Shieh, S.P., Lin, C.T., Hsueh, J.T.: Secure communication in Global Systems for Mobile Telecommunications. In: Proc. 1st Workshop on Mobile Computing, ROC, pp. 136\u2013142 (1995)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"ETSI TS 100 929 v8.1.0 (July 2001)","DOI":"10.18352\/ts.146"},{"key":"2_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/0470841745","volume-title":"GSM, switching, Services and Protocols","author":"J. Eberspacher","year":"2001","unstructured":"Eberspacher, J., Vogel, H.-J., Bettstetter, C.: GSM, switching, Services and Protocols, 2nd edn. Wiley, Chichester (2001)","edition":"2"},{"key":"2_CR11","unstructured":"Mehrotra, A.: GSM System Engineering. Artech House Publishers (1997)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Broron, D.: Techniques for privacy and authentication in personal communication systems. IEEE Personal communications, 6\u201310 (August 1995)","DOI":"10.1109\/98.403452"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Willas, J.E.: Privacy and authentication needs of PCS. IEEE personal communications, 11\u201315 (August 1995)","DOI":"10.1109\/98.403453"},{"key":"2_CR14","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons Inc., Chichester (1996)","edition":"2"},{"key":"2_CR15","volume-title":"A new Authentication protocol For Roaming Users in GSM Networks","author":"K. Al-Tawil","year":"1999","unstructured":"Al-Tawil, K., Akrami, A.: A new Authentication protocol For Roaming Users in GSM Networks. IEEE, Los Alamitos (1999)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31815-6_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:27:30Z","timestamp":1605760050000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31815-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540240150","9783540318156"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31815-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}