{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T05:58:34Z","timestamp":1742795914198,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/ic3.2015.7346744","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:17:05Z","timestamp":1449613025000},"page":"561-566","source":"Crossref","is-referenced-by-count":1,"title":["Mitigation of desynchronization attack during inter-eNodeB handover key management in LTE"],"prefix":"10.1109","author":[{"family":"Pavan Kumar Reddy K","sequence":"first","affiliation":[]},{"given":"B. R.","family":"Chandavarkar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.041513.00174"},{"journal-title":"Security investigation in 4g lte wireless networks","year":"2012","author":"ma","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.242"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/9781118380642"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653690"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5164-7"},{"journal-title":"Nomor Research","article-title":"Lte Protocol Stack Library","year":"2014","key":"ref16"},{"key":"ref17","article-title":"Network simulations with the ns-3 simulator","volume":"14","author":"henderson","year":"2008","journal-title":"SIGCOMM Demonstration"},{"journal-title":"3rd Generation Partnership Project (3GPP) Version 9 0 0 TS 33 821","article-title":"Rationale and Track of Security Decisions in Long Term Evolution (LTE) RAN\/3GPP System Architecture Evolution (SAE) (Release 9)","year":"2009","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2004.842941"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4785384"},{"key":"ref5","article-title":"The security of the gsm air interface protocol","author":"mitchell","year":"2001","journal-title":"RHUL-MA-2001-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.07.002"},{"key":"ref7","article-title":"3gpp security hot topics: Lte\/sae and home (e) nb","author":"niemi","year":"2009","journal-title":"Proc ETSI Security Workshop"},{"journal-title":"3rd Generation Partnership Project (3GPP) Version 11 2 0 TS 33 401","article-title":"3GPP System Architecture Evolution (SAE); Security architecture","year":"2011","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470978504"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2007.4394792"}],"event":{"name":"2015 Eighth International Conference on Contemporary Computing (IC3)","start":{"date-parts":[[2015,8,20]]},"location":"Noida, India","end":{"date-parts":[[2015,8,22]]}},"container-title":["2015 Eighth International Conference on Contemporary Computing (IC3)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7337021\/7346637\/07346744.pdf?arnumber=7346744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T01:06:07Z","timestamp":1490403967000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7346744\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ic3.2015.7346744","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}