{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:59:19Z","timestamp":1730199559978,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/bds\/hpsc\/ids18.2018.00038","type":"proceedings-article","created":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T19:08:58Z","timestamp":1543518538000},"page":"133-138","source":"Crossref","is-referenced-by-count":7,"title":["An Approach for End-to-End (E2E) Security of 5G Applications"],"prefix":"10.1109","author":[{"given":"K. Anitha","family":"Kumari","sequence":"first","affiliation":[]},{"given":"G. Sudha","family":"Sadasivam","sequence":"additional","affiliation":[]},{"given":"S. Shymala","family":"Gowri","sequence":"additional","affiliation":[]},{"given":"Sebastin Arockia","family":"Akash","sequence":"additional","affiliation":[]},{"given":"E.G.","family":"Radhika","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2981547"},{"key":"ref11","first-page":"769","article-title":"User-to-User Mutual Authentication and Key Agreement Scheme for LTE Cellular System","volume":"18","author":"ramadan","year":"2016","journal-title":"IJ Network Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.09.009"},{"journal-title":"5G-Ensure","year":"0","key":"ref13"},{"journal-title":"5G NORMA","year":"0","key":"ref14"},{"journal-title":"SENDATE","year":"0","key":"ref15"},{"journal-title":"3GPP SA3 Security","year":"0","key":"ref16"},{"key":"ref17","first-page":"1","article-title":"Intelligent Cryptographyapproachforsecuredistributedbigdatastorageincloud Computing","author":"yibin","year":"2016","journal-title":"Information Sciences"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1109\/TSG.2017.2664043","article-title":"Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks","volume":"8","author":"gai","year":"2017","journal-title":"IEEE Transactions on Smart Grid"},{"journal-title":"Security Challenges in Next Generation 5G Mobile Networks","year":"0","author":"malik","key":"ref4"},{"journal-title":"Quantum safe crypto","year":"0","key":"ref3"},{"key":"ref6","first-page":"762","volume":"62","author":"kumari","year":"2016","journal-title":"An Efficient 3D Elliptic Curve Diffie-Hellman (ECDH) Based Two-Server Password-Only Authenticated Key Exchange Protocol with Provable Security"},{"key":"ref5","first-page":"1","article-title":"5G Security: Forward Thinking Huawei White Paper","year":"2015","journal-title":"Huawei White Paper"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.05.007"},{"key":"ref7","first-page":"357","article-title":"Quantum-Elliptic curve Cryptography for multihop Communication in 5G Networks","volume":"17","author":"khan","year":"2017","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"ref2","first-page":"1","article-title":"5G Security-Making the Right Choice to Match your Needs","year":"2016","journal-title":"A SIMalliance 5GWG technical white paper"},{"key":"ref1","first-page":"1","article-title":"Security challenges and opportunities for 5G mobile networks","year":"2017","journal-title":"Nokia white paper"},{"journal-title":"Security for 4G and 5G cellular networks A survey of existing authentication and privacy-preserving schemes","year":"0","author":"amine ferrag","key":"ref9"}],"event":{"name":"2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS)","start":{"date-parts":[[2018,5,3]]},"location":"Omaha, NE","end":{"date-parts":[[2018,5,5]]}},"container-title":["2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8415924\/8552258\/08552296.pdf?arnumber=8552296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T20:40:53Z","timestamp":1643229653000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8552296\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/bds\/hpsc\/ids18.2018.00038","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}