{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T13:52:26Z","timestamp":1696513946234},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,10,10]],"date-time":"2010-10-10T00:00:00Z","timestamp":1286668800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1155\/2011\/867315","type":"journal-article","created":{"date-parts":[[2010,12,5]],"date-time":"2010-12-05T19:35:47Z","timestamp":1291577747000},"source":"Crossref","is-referenced-by-count":7,"title":["A USIM-Based Uniform Access Authentication Framework in Mobile Communication"],"prefix":"10.1186","volume":"2011","author":[{"given":"Xinghua","family":"Li","sequence":"first","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"YoungHo","family":"Park","sequence":"additional","affiliation":[]},{"given":"Li","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,10,10]]},"reference":[{"key":"2155_CR1","unstructured":"Requirements for Evolved UTRA (E-UTRA) and Evolved UTRAN (E-UTRAN) 3GPP TR 25.913, 2006, http:\/\/www.3gpp.org\/ftp\/specs\/html-info\/25931.htm"},{"key":"2155_CR2","unstructured":"System architecture evolution: report on technical options and conclusions 3GPP TR 23.882 v1.9.0, 2007, http:\/\/www.3gpp.org\/ftp\/specs\/html-info\/23882.htm"},{"key":"2155_CR3","unstructured":"Digital Cellular Telecommunications System (Phase 2+); SecurityRelated Network Functions (Release 5) 3GPP TS 43.020 v5.3.0, 2007, http:\/\/www.3gpp.org\/ftp\/specs\/html-info\/43020.htm"},{"key":"2155_CR4","unstructured":"3G Security; Security architecture (Release 9) 3GPP TS 33.102 v9.1.0, 2009, http:\/\/www.3gpp.org\/ftp\/specs\/html-info\/33102.htm"},{"key":"2155_CR5","unstructured":"3GPP System Architecture Evolution (SAE); Security architecture (Release 8) 3GPP TS 33.401 V8.1.1, 2008, http:\/\/www.3gpp.org\/ftp\/specs\/html-info\/33401.htm"},{"key":"2155_CR6","volume-title":"EAP-AKA authentication","author":"J Arkko","year":"2006","unstructured":"Arkko J, Haverinen H: EAP-AKA authentication. IETF RFC 4187,2006"},{"key":"2155_CR7","unstructured":"Ratioale and Track of Security decision in Long Term Evolved (LTE)RAN\/3GPP System Architecture Evolution (SAE)(Release 8) 3GPP TR33.821 V8.0.0, 2009, http:\/\/www.3gpp.org\/ftp\/specs\/html-info\/33821.htm"},{"issue":"4","key":"2155_CR8","first-page":"404","volume":"13","author":"Y Wang","year":"2006","unstructured":"Wang Y, Gu D-W, Bai Y-C: Public key based uniform access framework in 3G systems. Journal of Harbin Institute of Technology 2006, 13(4):404-408.","journal-title":"Journal of Harbin Institute of Technology"},{"key":"2155_CR9","first-page":"1","volume-title":"Proceedings of the IEEE International Symposium on Biometrics and Security Technologies (ISBAST '08)","author":"D He","year":"2008","unstructured":"He D, Wang J, Zheng Y: User authentication scheme based on self-certified public-key for next generation wireless network. Proceedings of the IEEE International Symposium on Biometrics and Security Technologies (ISBAST '08), 2008 1-8."},{"issue":"1","key":"2155_CR10","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1155\/S1687147204403016","volume":"2004","author":"G Kambourakis","year":"2004","unstructured":"Kambourakis G, Rouskas A, Gritzalis S: Performance evaluation of public key-based authentication in future mobile communication systems. EURASIP Journal on Wireless Communications and Networking 2004, 2004(1):184-197.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"2155_CR11","unstructured":"System Architecture Evolution: Report on Technical Optionsand Conclusions 3GPP TR23.882, 2005, http:\/\/www.3gpp.org\/ftp\/specs\/html-info\/23882.htm"},{"key":"2155_CR12","volume-title":"Analysis of EAP-SIM session keys agreement","author":"S Patel","year":"2003","unstructured":"Patel S: Analysis of EAP-SIM session keys agreement. 2003, http:\/\/www6.ietf.org\/proceedings\/57\/slides\/eap-11.pdf"},{"key":"2155_CR13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2284","volume-title":"PPP Extensible Authentication Protocol(EAP)","author":"L Blunk","year":"1998","unstructured":"Blunk L, Vollbrecht J: PPP Extensible Authentication Protocol(EAP). IETF RFC 2284, 1998"},{"key":"2155_CR14","unstructured":"Medium Access Control (MAC) Security enhancements,Amendment 6 to IEEE Standard for Information technology\u2014Telecommunications and information exchange between systems\u2014Local and metropolitan area networks\u2014Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) andPhysical Layer(PHY) specifications IEEE Std. 802.11i-2004, 2004, http:\/\/ieeexplore.ieee.org\/xpl\/RecentIssue.jsp?punumber=9214"},{"key":"2155_CR15","unstructured":"http:\/\/hostap.epitest.fi\/wpa_supplicant\/"},{"key":"2155_CR16","unstructured":"http:\/\/open1x.sourceforge.net\/"},{"key":"2155_CR17","unstructured":"Smart Cards;UICC-Terminal interface; Physical and logical characteristics (Release 8) ETSI TS 102.221, v8.2.0, 2009, http:\/\/www.etsi.eu\/deliver\/etsi_ts\/102200_102299\/102221\/08.02.00_60\/ts_102221v080200p.pdf"},{"key":"2155_CR18","volume-title":"State Machines forExtensible Authentication Protocol (EAP) Peer and Authenticator","author":"J Vollbrecht","year":"2005","unstructured":"Vollbrecht J, Eronen P, Petroni N, Ohba Y: State Machines forExtensible Authentication Protocol (EAP) Peer and Authenticator. IETFRFC 4137, 2005"},{"key":"2155_CR19","volume-title":"Proceeding of the International Conference on Signal Processing and Communications (ICSPC '07)","author":"N Boudriga","year":"2007","unstructured":"Boudriga N: Security of mobile communications. Proceeding of the International Conference on Signal Processing and Communications (ICSPC '07), 2007"},{"key":"2155_CR20","volume-title":"Introduction to differential power analysisand related attacks","author":"P Kocher","year":"1998","unstructured":"Kocher P, Jaffe J, Jun B: Introduction to differential power analysisand related attacks. 1998, http:\/\/www.cryptography.com\/public\/pdf\/DPATechInfo.pdf"},{"key":"2155_CR21","first-page":"151","volume-title":"Proceedings of the USENIX Workshop on Smartcard Technology","author":"TS Messerges","year":"1999","unstructured":"Messerges TS, Dabbish EA, Sloan RH: Investigations of power analysis attacks on smartcards. Proceedings of the USENIX Workshop on Smartcard Technology, 1999 151-162."},{"key":"2155_CR22","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-45418-7_17","volume-title":"Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security (E-smart '01)","author":"J-J Quisquater","year":"2001","unstructured":"Quisquater J-J, Samyde D: ElectroMagnetic Analysis (EMA): measures and couter-measures for smart cards. Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security (E-smart '01), 2001 200-210."},{"key":"2155_CR23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4746","volume-title":"Extensible Authentication Protocol (EAP) Password Authenticated Exchange","author":"T Clancy","year":"2006","unstructured":"Clancy T, Arbaugh W: Extensible Authentication Protocol (EAP) Password Authenticated Exchange. IETF RFC 4746, 2006"},{"key":"2155_CR24","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/GLOCOM.2001.965876","volume":"3","author":"A Klemm","year":"2001","unstructured":"Klemm A, Lindemann C, Lohmann M: Traffic modeling and characterization for UMTS networks. Proceeding of the Global Telecommunications Conference (GLOBECOM '01), 2001 3: 1741-1746.","journal-title":"Proceeding of the Global Telecommunications Conference (GLOBECOM '01)"},{"key":"2155_CR25","unstructured":"Feasibility study for Further Advancements for E-UTRA (LTEAdvanced) 3GPP TR 36.912, 2010, http:\/\/www.3gpp.org\/ftp\/specs\/html-info\/36912.htm"},{"key":"2155_CR26","unstructured":"Li X, Lu X, Ma J, Zhu Z, Xu L, Park Y: Authentications and key management in 3G-WLAN interworking. Mobile Networks and Applications, http:\/\/www.springerlink.com\/content\/tw485835x756vq14\/ Mobile Networks and Applications,"},{"key":"2155_CR27","unstructured":"Report on the Design and Evaluation of the MILENAGE AlgorithmSet; Deliverable 5: An Example Algorithm for the 3GPP Authenticationand Key Generation Functions (Release 4) 3GPP TR 33.909, v4.0.1, 2001, http:\/\/www.3gpp.org\/ftp\/specs\/html-info\/33909.htm"},{"key":"2155_CR28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5216","volume-title":"The EAP-TLS authentication protocol","author":"D Simon","year":"2008","unstructured":"Simon D, Aboba B, Hurst R: The EAP-TLS authentication protocol. IETF RFC 5216, 2008"},{"key":"2155_CR29","first-page":"d2\/1","volume-title":"Proceeding of the 1st IEE International Conference on Commercialising Technology and Innovation","author":"P Laitinen","year":"2005","unstructured":"Laitinen P, Ginzboorg P, Asokan N, Holtmanns S, Niemi V: Extending cellular authentication as a service. Proceeding of the 1st IEE International Conference on Commercialising Technology and Innovation, 2005 d2\/1-d2\/4."},{"key":"2155_CR30","unstructured":"Generic Authentication Architecture (GAA); System description 3GPP TR 33.919, 2006, http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33919.htm"},{"key":"2155_CR31","unstructured":"Generic Authentication Architecture (GAA); Generic bootstrapping architecture 3GPP TS 33.220, 2006, http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33220.htm"},{"key":"2155_CR32","unstructured":"Generic Authentication Architecture (GAA); Support for subscriber certificates 3GPP TS 33.221, 2006, http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/33221.htm"},{"key":"2155_CR33","first-page":"1288","volume-title":"Proceeding of the 10th International Conference on Advanced Communication Technology (ICACT '08)","author":"K Kim","year":"2008","unstructured":"Kim K, Lee H-W, Jo S-K, Ryu W: Design of unified authenticationfor multi-mode terminal between service and access network inNGN. Proceeding of the 10th International Conference on Advanced Communication Technology (ICACT '08), 2008 1288-1292."},{"key":"2155_CR34","first-page":"218","volume-title":"Proceeding of the International Conferenceon Complex Systems and Applications (ICCSA '07)","author":"X Li","year":"2007","unstructured":"Li X, Ma J, Moon S: A new authentication scheme compatiblewith 802.11i and WAPI. Proceeding of the International Conferenceon Complex Systems and Applications (ICCSA '07), 2007 218-223."},{"key":"2155_CR35","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1109\/ICACT.2007.358719","volume-title":"Proceeding of the 9th International Conference on Advanced Communication Technology","author":"J Lee","year":"2007","unstructured":"Lee J, Yu M, Choi S, Jeong T, Kang S: A new scheme for unified-authentication in BcN. Proceeding of the 9th International Conference on Advanced Communication Technology, 2007 1795-1799."},{"issue":"3-4","key":"2155_CR36","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1023\/B:WIRE.0000047068.20203.57","volume":"29","author":"G Kambourakis","year":"2004","unstructured":"Kambourakis G, Rouskas A, Gritzalis S: Experimental analysis of an SSL-based AKA mechanism in 3G-and-beyond wireless networks. Wireless Personal Communications 2004, 29(3-4):303-321.","journal-title":"Wireless Personal Communications"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1155\/2011\/867315.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1155\/2011\/867315\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1155\/2011\/867315.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T19:17:50Z","timestamp":1565205470000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1155\/2011\/867315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,10]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["2155"],"URL":"https:\/\/doi.org\/10.1155\/2011\/867315","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,10,10]]},"article-number":"867315"}}