{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,7,23]],"date-time":"2022-07-23T19:40:58Z","timestamp":1658605258969},"reference-count":9,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T00:00:00Z","timestamp":1535673600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004085","name":"Ministry of Education, Science and Technology","doi-asserted-by":"publisher","award":["2017R1A2B4006086"],"id":[{"id":"10.13039\/501100004085","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002648","name":"Catholic University of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002648","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["ICT Express"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1016\/j.icte.2018.08.002","type":"journal-article","created":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T18:56:56Z","timestamp":1536173816000},"page":"124-130","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["Proposing packet-key based end-to-end security architecture for the post-LTE networks"],"prefix":"10.1016","volume":"5","author":[{"given":"Akanksha","family":"Saini","sequence":"first","affiliation":[]},{"given":"Enrique","family":"Festijo","sequence":"additional","affiliation":[]},{"given":"Younchan","family":"Jung","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.icte.2018.08.002_b1","doi-asserted-by":"crossref","unstructured":"K.A. Alezabi, F. Hashim, S.J. Hashim, B.M. Ali, An efficient authentication and key agreement protocol for 4g (LTE) networks, in: 2014 IEEE Region 10 Symp. 2014, pp.502\u2013507.","DOI":"10.1109\/TENCONSpring.2014.6863085"},{"issue":"4","key":"10.1016\/j.icte.2018.08.002_b2","first-page":"769","article-title":"User-to-user mutual authentication and key agreement scheme for LTE cellular system","volume":"18","author":"Ramadan","year":"2016","journal-title":"I. J. Netw. Security"},{"key":"10.1016\/j.icte.2018.08.002_b3","doi-asserted-by":"crossref","unstructured":"L. Zhu, H. Qin, H. Mao, Z. Hu, Research on 3GPP LTE security architecture, in: 8th Int. Conf. on Wireless Commun. Networking and Mobile Computing (WiCOM), 2012, pp. 1\u20134.","DOI":"10.1109\/WiCOM.2012.6478647"},{"issue":"1","key":"10.1016\/j.icte.2018.08.002_b4","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1109\/SURV.2013.041513.00174","article-title":"A survey on security aspects for LTE and LTE-A networks","volume":"16","author":"Cao","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.icte.2018.08.002_b5","doi-asserted-by":"crossref","unstructured":"J. Arkko, E. Carrara, F. Lindholm, M. Naslund, K. Norrman, Mikey: Multimedia internet keying, RFC 3830, available from http:\/\/tools.ietf.org\/html\/rfc3830, http:\/\/www.rfc-editor.org\/rfc\/rfc3830.txt, 2004.","DOI":"10.17487\/rfc3830"},{"key":"10.1016\/j.icte.2018.08.002_b6","doi-asserted-by":"crossref","unstructured":"X. Chang, Y. Qin, Z. Chen, B. Xing, ZRTP-based trusted transmission of VoIP traffic and formal verification, in :2012 Fourth Int. Conf. on Multimedia Information Networking and Security (MINES), 2012, pp. 560\u2013563.","DOI":"10.1109\/MINES.2012.250"},{"key":"10.1016\/j.icte.2018.08.002_b7","doi-asserted-by":"crossref","first-page":"726","DOI":"10.4218\/etrij.13.0212.0549","article-title":"Securing RTP packets using per-packet key exchange for real-time multimedia","volume":"35","author":"Jung","year":"2013","journal-title":"ETRI J."},{"key":"10.1016\/j.icte.2018.08.002_b8","doi-asserted-by":"crossref","first-page":"1584","DOI":"10.1016\/j.jcss.2014.04.023","article-title":"One-time packet key exchange scheme for secure real-time multimedia applications","volume":"80","author":"Jung","year":"2014","journal-title":"J. Comput. System Sci."},{"key":"10.1016\/j.icte.2018.08.002_b9","series-title":"Proc. of Int. Conf. on Internet of Things and Cloud Computing, 2016","article-title":"An open horizontal model for group management and end-to-end security management suitable for group-based private systems","author":"Festijo","year":"2016"}],"container-title":["ICT Express"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2405959518302017?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2405959518302017?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,7,23]],"date-time":"2022-07-23T19:20:15Z","timestamp":1658604015000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2405959518302017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":9,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["S2405959518302017"],"URL":"https:\/\/doi.org\/10.1016\/j.icte.2018.08.002","relation":{},"ISSN":["2405-9595"],"issn-type":[{"value":"2405-9595","type":"print"}],"subject":[],"published":{"date-parts":[[2019,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Proposing packet-key based end-to-end security architecture for the post-LTE networks","name":"articletitle","label":"Article Title"},{"value":"ICT Express","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.icte.2018.08.002","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 The Korean Institute of Communications and Information Sciences (KICS). Publishing Services by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}