{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T08:55:07Z","timestamp":1725440107211},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/paccs.2009.200","type":"proceedings-article","created":{"date-parts":[[2009,9,9]],"date-time":"2009-09-09T19:35:53Z","timestamp":1252524953000},"page":"771-774","source":"Crossref","is-referenced-by-count":2,"title":["Kerberos Based Authentication Protocol with Improved Identity Protection in 3G Network"],"prefix":"10.1109","author":[{"given":"Anish Prasad","family":"Shrestha","sequence":"first","affiliation":[]},{"given":"Kyu Jin","family":"Park","sequence":"additional","affiliation":[]},{"given":"Jae Sung","family":"Park","sequence":"additional","affiliation":[]},{"given":"Dong-You","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Seung-Jo","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.505"},{"key":"2","article-title":"partnership project; technical specification group services and system aspects; 3g security","author":"generation","year":"2006","journal-title":"Security Architecture (Release 7) \" 3GPP TS 33 102 Version 7 1 0"},{"journal-title":"An Adoption of Kerberos to 3G Network for Mutual Authentication Challenges and Evaluations","year":"0","author":"han","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/0471478253"},{"journal-title":"USIM-based TLS Authentication Protocol for Wireless Local Area Network","year":"2007","author":"tseng","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20040835(410) 151"},{"key":"5","first-page":"298","author":"stalling","year":"2005","journal-title":"Cryptography and Network Secuirty Principles and Practice"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2004.842941"},{"key":"9","first-page":"401","author":"sattarzdeh","year":"2007","journal-title":"Improved User Identity Confidentiality for Mobile Networks"},{"journal-title":"Enhancement Mobile Security and User Confidentiality for UMTS","year":"0","author":"al-saraireh","key":"8"},{"journal-title":"Speed Comparison of Popular Crypto Algorithms","year":"2004","key":"11"},{"journal-title":"Crypto++ Library 5 5 1","year":"0","key":"12"}],"event":{"name":"2009 Pacific-Asia Conference on Circuits, Communications and Systems (PACCS)","start":{"date-parts":[[2009,5,16]]},"location":"Chengdu, China","end":{"date-parts":[[2009,5,17]]}},"container-title":["2009 Pacific-Asia Conference on Circuits, Communications and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5231958\/5231959\/05232439.pdf?arnumber=5232439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T06:26:48Z","timestamp":1489818408000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5232439\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/paccs.2009.200","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}