{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T15:40:40Z","timestamp":1725378040907},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. T\u00e9l\u00e9commun."],"published-print":{"date-parts":[[2004,1]]},"DOI":"10.1007\/bf03179678","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:33:22Z","timestamp":1625639602000},"page":"130-148","source":"Crossref","is-referenced-by-count":0,"title":["Authentication in wireless networks: state of the art and integration with smart card","Authentification dans les r\u00e9seaux radio\u00e9lectriques : \u00e9tat de l\u2019art et int\u00e9gration avec la carte \u00e0 puce"],"prefix":"10.1007","volume":"59","author":[{"given":"Marc","family":"Loutrel","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Urien","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"Ga\u00efti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03179678_CR1","unstructured":"International Organization for Standardization (iso) \u201cIdentification cards \u2014 Integrated circuit(s) card with contact\u201diso\/iec 7816"},{"key":"BF03179678_CR2","unstructured":"SchlumbergerSema, e-gate."},{"key":"BF03179678_CR3","doi-asserted-by":"crossref","unstructured":"Dhem (J.-F.),Feyt (N.), \u201cHardware and software symbiosis helps smart card evolution\u201d,ieeeMicro p14\u201325, November\/December 2001.","DOI":"10.1109\/40.977754"},{"key":"BF03179678_CR4","unstructured":"Information Technology Security Evaluation Criteria (itsec), Harmonised Criteria of France, Germany, the Netherlands, United Kingdom, V1.2, European Commission Luxembourg, June 2001."},{"key":"BF03179678_CR5","unstructured":"fips 140-1 andfips 140-2 Cryptographic Modules, http:\/\/csrc.nist.gov\/cryptval\/140-1\/1401val2002.htm"},{"key":"BF03179678_CR6","doi-asserted-by":"crossref","unstructured":"Sakamura (K.),Koshizuka (N.), \u201cTheetron wide-area distributed architecture for e-commerce\u201d,ieeeMicro p. 7\u201312, November\/December 2001.","DOI":"10.1109\/40.977753"},{"key":"BF03179678_CR7","unstructured":"The communicating Mobile Objects Project, \u201cLaboratoire Informatique Fondamentale de Lille\u201d (lifl) and Gemplus."},{"key":"BF03179678_CR8","unstructured":"Urien (P.), \u201cLa puce Internet, ou l\u2019ultime objet mobile communiquant\u201d,soc\u20192001, October 2001."},{"key":"BF03179678_CR9","doi-asserted-by":"crossref","unstructured":"Marvie (R.),Pellegrini (M.-C.),Potonni\u00e9e (O.), \u201cSmart cards: A system support for service accessibility from heterogeneous devices\u201d,In 9thacm sigopsEuropean Workshop, September 2000, Kolding, Denmark.","DOI":"10.1145\/566726.566770"},{"key":"BF03179678_CR10","doi-asserted-by":"crossref","unstructured":"Urien (P.),Saleh (H.),Tizraoui (A.), \u201cxml Smartcards\u201d,ieeInternational Conference on Networking,icn\u201901, July 11\u201313, 2001 \u2014cref, Colmar, France.","DOI":"10.1007\/3-540-47728-4_80"},{"key":"BF03179678_CR11","unstructured":"\u201clan man Standards of theieee Computer Society. Wirelesslan medium access control (mac) and physical layer (phy) specification\u201d,ieee Standard 802.11,ieee Press, 1997."},{"key":"BF03179678_CR12","unstructured":"Walker (J.), \u201cUnsafe at any key size: An analysis of thewep encapsulation\u201d,ieee 802.11-00\/362,ieeePress, 2000."},{"key":"BF03179678_CR13","doi-asserted-by":"crossref","unstructured":"Borisov (N.),Goldberg (I.),Wagner (D.). \u201cIntercepting Mobile Communications: The Insecurity of 802.11\u201d, 7th InternationalConference on Mobile Computing and Networking, July 2001 in Rome Italy.","DOI":"10.1145\/381677.381695"},{"key":"BF03179678_CR14","doi-asserted-by":"crossref","unstructured":"Fluhrer (S.),Mantin (I.),Shamir (A.), \u201cWeaknesses in the key scheduling ofrc4\u201d, Proc. 8th Ann. Workshop Selected Areas in Cryptography,Springer, 2001, pp. 1\u201324.","DOI":"10.1007\/3-540-45537-X_1"},{"key":"BF03179678_CR15","unstructured":"Stubblefield (A.),Ioannidis (J.),Rubin (A.D.), \u201cUsing the Fluhrer, Mantin, and Shamir attack to breakwep\u201d, Proc.Network and Distributed System Security Symposium (ndss), Internet Society, 2002."},{"key":"BF03179678_CR16","doi-asserted-by":"crossref","unstructured":"Arbaugh (W. A.),Shankar (N.), (Y. C. J.)wan, \u201cYour 802.11 Wireless Network has No Clothes\u201d, Inieee International Conference on Wirelesslans and Home Networks, Singapore, Dec 2001","DOI":"10.1142\/9789812799562_0013"},{"key":"BF03179678_CR17","doi-asserted-by":"crossref","unstructured":"Petroni Jr. (N. L.),Arbaugh (W. A.), \u201cThe dangers of mitigating security design flaws: a wireless case study\u201d,ieeeSecurity and Privacy p. 28\u201336, January 2003.","DOI":"10.1109\/MSECP.2003.1176993"},{"key":"BF03179678_CR18","unstructured":"Wi-Fi Alliance, Wi-Fi Protected Access (wpa), http:\/\/www.weca.net"},{"key":"BF03179678_CR19","unstructured":"ieee 802.1X specification (ieee Standard), http:\/\/standards.ieee.org\/reading\/ieee\/std\/lanman\/802.1X-2001.pdf."},{"key":"BF03179678_CR20","unstructured":"Arbaugh (W. A.),Mishra (A.), \u201cAn Initial Security analysis of the 802.1X standard\u201d, www.cs.umd.edu\/\u223cwaa\/lx.pdf."},{"key":"BF03179678_CR21","unstructured":"Wu (T.), \u201cA real-world analysis of Kerberos password security\u201d,Network and Distributed System Security Symp., Internet Soc., 1999, pp. 13\u201322."},{"key":"BF03179678_CR22","unstructured":"Itoi (N.),Honeyman (P.), \u201cSmartcard Integration with Kerberos V5\u201d,usenixWorkshop on Smartcard Technology, 1999."},{"key":"BF03179678_CR23","unstructured":"ieeeDraft P802.1li\/D3, \u201cSpecification for Enhanced Security\u201d, November 2002."},{"key":"BF03179678_CR24","unstructured":"3gpp Technical Specification, 3gpp ts 33.102 V3.7.0, December 2000."},{"key":"BF03179678_CR25","unstructured":"rfc 2284, \u201cppp Extensible Authentication Protocol (eap)\u201d, March 1998."},{"key":"BF03179678_CR26","doi-asserted-by":"crossref","unstructured":"Urien (P.),Tizraoui (A.),Loutrel (M.), \u201cIntegratingeap insim-ip smartcards\u201d, to be published ataswn the secondieeeworkshop on Applications and Services in Wireless networks, July 2002, Paris.","DOI":"10.1007\/3-540-47728-4_80"},{"key":"BF03179678_CR27","unstructured":"rfc 2716, \u201cppp eap tls Authentication Protocol\u201d, October 1999."},{"key":"BF03179678_CR28","unstructured":"rfc 2246, \u201cThetls Protocol\u201d, 1999."},{"key":"BF03179678_CR29","unstructured":"Raak Technologies, http:\/\/www.raaktechnologies.com\/"},{"key":"BF03179678_CR30","unstructured":"etsi-gsm 11.11 \u201cDigital cellular telecommunications system (Phase2+); Specification of the Subscriber Interface Identity Module \u2014 Mobile Equipment (sim_me) interface\u201d."},{"key":"BF03179678_CR31","unstructured":"\u201ceap sim Authentication\u201d, draft-haverinen-pppext-eap-sim-09.txt, January 2003."},{"key":"BF03179678_CR32","unstructured":"pc\/sc (1996) \u201cInteroperability Specification foriccs and Personal Computer Systems\u201d, \u00a9 1996cp8 Transac,hp, Microsoft, Schlumberger, Siemens Nixdorf."},{"key":"BF03179678_CR33","unstructured":"\u00aeeap aka Authentication\u201d, draft-arkko-pppext-eap-aka-01.txt, November 2001."},{"key":"BF03179678_CR34","unstructured":"\u201ceap Tunneledtls Authentication Protocol\u201d, draft-ietf-pppext-eap-ttls-02.txt, November 2002"},{"key":"BF03179678_CR35","unstructured":"\u201cMicrosoft\u2019speap version 0 (Implementation in Windowsxp sp1)\u201d, draft-kamath-pppext-peapv0-00.txt, October 2002."},{"key":"BF03179678_CR36","unstructured":"\u201ceap support in smartcards\u201d, draft-urien-eap-smartcard-01.txt, March 2003."},{"key":"BF03179678_CR37","unstructured":"JavaCard Forum, http:\/\/www.javacardforum.org"},{"key":"BF03179678_CR38","unstructured":"rfc 2486, \u201cThe Network Access Identifier\u201d, 1999."},{"key":"BF03179678_CR39","unstructured":"Urien (P.),Saleh (H.),Tizraoui (A.), \u201cssl dans une carte \u00e0 puce\u201d,Journ\u00e9es Doctorales Informatique et R\u00e9seaux,jdir\u20192000, Minist\u00e8re de la Recherches, Paris, 6\u20138 novembre 2000."},{"key":"BF03179678_CR40","unstructured":"Saleh (H.), \u201cAn innovative security architecture based on Internet smart card\u201d, PhD\u2019s thesis, Universit\u00e9 de Versailles Saint-Quentin-en-Yvelines, Juin 2002."},{"key":"BF03179678_CR41","unstructured":"wlan Smartcard Consortium, http:\/\/www.wlansmartcard.org."}],"container-title":["Annales des T\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03179678.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03179678\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03179678.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T14:34:12Z","timestamp":1725374052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03179678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,1]]},"references-count":41,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2004,1]]}},"alternative-id":["BF03179678"],"URL":"https:\/\/doi.org\/10.1007\/bf03179678","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2004,1]]}}}