{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:52:06Z","timestamp":1725792726957},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,10]],"date-time":"2018-10-10T00:00:00Z","timestamp":1539129600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,10]]},"DOI":"10.1145\/3286606.3286795","type":"proceedings-article","created":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T14:12:50Z","timestamp":1544796770000},"page":"1-7","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["5G"],"prefix":"10.1145","author":[{"given":"Hafida","family":"Amgoune","sequence":"first","affiliation":[{"name":"National School of Applied Sciences, kenitra, Morocco"}]},{"given":"Tomader","family":"Mazri","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences, kenitra, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2018,10,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/www.efort.com\/. Last accessed","author":"Networks Architectures","year":"2018","unstructured":"Architectures of Networks and TelecommunicationServices , http:\/\/www.efort.com\/. Last accessed 02 March 2018 . Architectures of Networks and TelecommunicationServices, http:\/\/www.efort.com\/. Last accessed 02 March 2018."},{"key":"e_1_3_2_1_2_1","volume-title":"Security for 5G Mobile Wireless Networks","author":"Fang Dongfeng","year":"2017","unstructured":"Dongfeng Fang , Rose QingyangHu , Yi Qian . : Security for 5G Mobile Wireless Networks . IEEE Journals & Magazine ( 2017 ). Dongfeng Fang, Rose QingyangHu, Yi Qian.: Security for 5G Mobile Wireless Networks. IEEE Journals & Magazine (2017)."},{"key":"e_1_3_2_1_3_1","volume-title":"Higo Marques.: Security for 5G Communications.","author":"Rodriguez Jonathan","year":"2015","unstructured":"Jonathan Rodriguez , Georgios Mantas , Nikos Komninos , Jonathan Rodriguez , EvaristeL ogota , Higo Marques.: Security for 5G Communications. ( 2015 ). Jonathan Rodriguez, Georgios Mantas, Nikos Komninos, Jonathan Rodriguez, EvaristeL ogota, Higo Marques.: Security for 5G Communications. (2015)."},{"key":"e_1_3_2_1_4_1","volume-title":"First International Workshop on Green and Secure CommunicationsTechnology","author":"Pan Fei","year":"2015","unstructured":"Fei Pan , Huanhuan Song , Tang Jie , LongyeWang.:5 G security architecture and lightweight security authentication.IEEE\/CIC International Conference on Communications in China : First International Workshop on Green and Secure CommunicationsTechnology ( 2015 ). Fei Pan, Huanhuan Song, Tang Jie, LongyeWang.:5G security architecture and lightweight security authentication.IEEE\/CIC International Conference on Communications in China: First International Workshop on Green and Secure CommunicationsTechnology (2015)."},{"key":"e_1_3_2_1_5_1","unstructured":"Jonathan Rodriguez Georgios Mantas Nikos Komninos EvaristeLogota Higo Marques.: Security for 5G Communications.(2015). Jonathan Rodriguez Georgios Mantas Nikos Komninos EvaristeLogota Higo Marques.: Security for 5G Communications.(2015)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.499"},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/www.efort.com\/r tutoriels\/M2M EFORT.pdf. Last accessed","author":"Machine To","year":"2018","unstructured":"Machine To Machine (M2M) definition , http:\/\/www.efort.com\/r tutoriels\/M2M EFORT.pdf. Last accessed 20 April 2018 Machine To Machine (M2M) definition, http:\/\/www.efort.com\/r tutoriels\/M2M EFORT.pdf. Last accessed 20 April 2018"},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/www.efort.com.Last accessed","author":"Networks Architectures","year":"2018","unstructured":"Architectures of Networks and Telecommunication Services , http:\/\/www.efort.com.Last accessed 2 March 2018 . Architectures of Networks and Telecommunication Services, http:\/\/www.efort.com.Last accessed 2 March 2018."},{"key":"e_1_3_2_1_9_1","unstructured":"Jonathan Rodriguez Georgios Mantas NikosKomninos EvaristeLogota Higo Marques.: Security for 5G Communications.(2015) Jonathan Rodriguez Georgios Mantas NikosKomninos EvaristeLogota Higo Marques.: Security for 5G Communications.(2015)"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600213NM"},{"key":"e_1_3_2_1_11_1","volume-title":"Abdulmotaleb El Saddik.:Advances inNextGeneration Technologies for Smart Healthcare","author":"Xu Changsheng","year":"2018","unstructured":"Changsheng Xu , Ying Li , Josu Bilbao , Abdulmotaleb El Saddik.:Advances inNextGeneration Technologies for Smart Healthcare . IEEE CommunicationsMagazine( 2018 ). Changsheng Xu, Ying Li, Josu Bilbao, Abdulmotaleb El Saddik.:Advances inNextGeneration Technologies for Smart Healthcare.IEEE CommunicationsMagazine(2018)."}],"event":{"name":"SCA '18: 3rd International Conference on Smart City Applications","acronym":"SCA '18","location":"Tetouan Morocco"},"container-title":["Proceedings of the 3rd International Conference on Smart City Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286606.3286795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T17:02:47Z","timestamp":1698426167000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286606.3286795"}},"subtitle":["Interconnection of Services and Security Approaches"],"short-title":[],"issued":{"date-parts":[[2018,10,10]]},"references-count":11,"alternative-id":["10.1145\/3286606.3286795","10.1145\/3286606"],"URL":"https:\/\/doi.org\/10.1145\/3286606.3286795","relation":{},"subject":[],"published":{"date-parts":[[2018,10,10]]},"assertion":[{"value":"2018-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}