{"id":"https://openalex.org/W2001743409","doi":"https://doi.org/10.1109/icc.2014.6883452","title":"SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks","display_name":"SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2001743409","doi":"https://doi.org/10.1109/icc.2014.6883452","mag":"2001743409"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2014.6883452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085049261","display_name":"Chengzhe Lai","orcid":"https://orcid.org/0000-0002-4603-3380"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"funder","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengzhe Lai","raw_affiliation_strings":["State Key Lab. of Integrated Services Networks, Xidian Univ., Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab. of Integrated Services Networks, Xidian Univ., Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024453724","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-8310-7169"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"funder","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["State Key Lab. of Integrated Services Networks, Xidian Univ., Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab. of Integrated Services Networks, Xidian Univ., Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"funder","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Sch. of Electr. & Electron. Eng., Nanyang Technol. Univ., Singapore, , Singapore"],"affiliations":[{"raw_affiliation_string":"Sch. of Electr. & Electron. Eng., Nanyang Technol. Univ., Singapore, , Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091107196","display_name":"Rong Jiang","orcid":"https://orcid.org/0000-0003-4160-8349"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"funder","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rong Jiang","raw_affiliation_strings":["School of Computer, National University of Defense Technology; Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, National University of Defense Technology; Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"funder","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Shen","raw_affiliation_strings":["[Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada]"],"affiliations":[{"raw_affiliation_string":"[Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada]","institution_ids":["https://openalex.org/I151746483"]}]}],"institution_assertions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.471,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":43,"citation_normalized_percentile":{"value":0.978493,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1011","last_page":"1016"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9778,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.83421165},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.68234885},{"id":"https://openalex.org/keywords/wimax","display_name":"WiMAX","score":0.4349736}],"concepts":[{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.83421165},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.74327993},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.68234885},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.62951016},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.61564404},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5416111},{"id":"https://openalex.org/C44871818","wikidata":"https://www.wikidata.org/wiki/Q5154139","display_name":"Communication in small groups","level":2,"score":0.47130713},{"id":"https://openalex.org/C113950482","wikidata":"https://www.wikidata.org/wiki/Q133973","display_name":"WiMAX","level":3,"score":0.4349736},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4293705},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42675012},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.41470927},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.41015053},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30483958},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.28246593},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.18645224},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15065524},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2014.6883452","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1977204260","https://openalex.org/W1985492690","https://openalex.org/W2005208104","https://openalex.org/W2012382733","https://openalex.org/W2013849380","https://openalex.org/W2040049909","https://openalex.org/W2043301346","https://openalex.org/W2055817410","https://openalex.org/W2059148836","https://openalex.org/W2067341239","https://openalex.org/W2074423663","https://openalex.org/W2097422349","https://openalex.org/W2099577676","https://openalex.org/W2112017000","https://openalex.org/W2131487642","https://openalex.org/W2132247362","https://openalex.org/W2147298014","https://openalex.org/W2151648452","https://openalex.org/W2171072531"],"related_works":["https://openalex.org/W4238556280","https://openalex.org/W40231453","https://openalex.org/W2915550258","https://openalex.org/W2910351542","https://openalex.org/W2771023301","https://openalex.org/W2548448382","https://openalex.org/W2544055464","https://openalex.org/W2513870387","https://openalex.org/W2391338828","https://openalex.org/W1552851303"],"abstract_inverted_index":{"With":[0],"extensive":[1],"promising":[2],"applications,":[3],"machine":[4,6],"to":[5,40,65],"(M2M)":[7],"communications":[8],"or":[9],"machine-type":[10],"communication":[11,150],"(MTC)":[12],"have":[13],"attached":[14],"a":[15,42,49,57,77,102,114],"tremendous":[16],"interest":[17],"among":[18],"mobile":[19],"network":[20],"operators":[21],"and":[22,44,71,79,88,105,152],"research":[23],"groups.":[24],"Supporting":[25],"multiple":[26],"MTC":[27,52,85,99],"devices":[28,53,100],"has":[29],"been":[30],"considered":[31],"as":[32],"an":[33],"essential":[34],"requirement":[35],"in":[36,63,73,101,137,147],"M2M":[37],"communications.":[38],"How":[39],"achieve":[41],"secure":[43,78],"efficient":[45,80,160],"access":[46,69],"authentication":[47,111],"for":[48,84],"group":[50,81,103],"of":[51,110,134,149],"during":[54],"roaming":[55,82],"is":[56,94,158],"challenging":[58],"issue.":[59],"In":[60,143],"this":[61],"paper,":[62],"order":[64],"simultaneously":[66,104],"resolve":[67],"the":[68,108,123,132],"security":[70,121],"efficiency":[72],"MTC,":[74],"we":[75],"propose":[76],"scheme":[83],"between":[86],"3GPP":[87],"WiMAX":[89],"networks,":[90],"named":[91],"SEGR,":[92],"which":[93],"characterized":[95],"by":[96],"authenticating":[97],"all":[98],"speeding":[106],"up":[107],"process":[109],"through":[112],"adopting":[113],"novel":[115],"certificateless":[116],"aggregate":[117,140],"signature":[118,141],"technique.":[119],"Through":[120],"analysis,":[122],"proposed":[124],"SEGR":[125,157],"can":[126],"provide":[127],"robust":[128],"security,":[129],"especially":[130],"overcome":[131],"drawback":[133],"key":[135],"escrow":[136],"identity-based":[138],"(ID-based)":[139],"schemes.":[142,164],"addition,":[144],"performance":[145],"evaluations":[146],"terms":[148],"overhead":[151],"computation":[153],"complexity":[154],"demonstrate":[155],"that":[156],"more":[159],"than":[161],"those":[162],"traditional":[163]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2001743409","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2025-04-20T22:10:39.934084","created_date":"2016-06-24"}