{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T15:10:28Z","timestamp":1736003428571,"version":"3.32.0"},"reference-count":46,"publisher":"Elsevier BV","issue":"11","license":[{"start":{"date-parts":[[2006,8,1]],"date-time":"2006-08-01T00:00:00Z","timestamp":1154390400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2006,8]]},"DOI":"10.1016\/j.comnet.2005.08.007","type":"journal-article","created":{"date-parts":[[2005,9,23]],"date-time":"2005-09-23T13:51:32Z","timestamp":1127483492000},"page":"1843-1859","source":"Crossref","is-referenced-by-count":2,"title":["Support of subscribers\u2019 certificates in a hybrid WLAN-3G environment"],"prefix":"10.1016","volume":"50","author":[{"given":"Georgios","family":"Kambourakis","sequence":"first","affiliation":[]},{"given":"Angelos","family":"Rouskas","sequence":"additional","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Geneiatakis","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2005.08.007_bib1","doi-asserted-by":"crossref","unstructured":"S. Farrell, R. Housley, An Internet Attribute Certificate Profile for Authorization, IETF RFC 3281, April 2002.","DOI":"10.17487\/rfc3281"},{"key":"10.1016\/j.comnet.2005.08.007_bib2","unstructured":"R. Oppliger, G. Pernul, C. Strauss, Using attribute certificates to implement role based authorization and access control models, in: Proc. of 4. Fachtagung Sicherheit in Informationsystemen (SIS 2000), Zurich, Switzerland, 2000, pp.169\u2013184."},{"key":"10.1016\/j.comnet.2005.08.007_bib3","unstructured":"D.F. Ferraiolo, J.A. Cugini, R.D. Kuhn, role-based access control (RBAC): features and motivations, electronically available at: <https:\/\/linproxy.fan.workers.dev:443\/http\/hissa.ncsl.nist.gov\/rbac\/newpaper\/rbac.html>, 1995."},{"key":"10.1016\/j.comnet.2005.08.007_bib4","unstructured":"ITU-T Recommendation X.509. Information Technology-Open Systems Interconnection\u2014The Directory: Authentication Framework, (equivalent to ISO\/IEC 9594-8, 1997), 1997."},{"year":"2000","series-title":"Security Technologies for the World Wide Web","author":"Oppliger","key":"10.1016\/j.comnet.2005.08.007_bib5"},{"year":"2001","series-title":"PKI Implementing and Managing E-Security","author":"Nash","key":"10.1016\/j.comnet.2005.08.007_bib6"},{"year":"1999","series-title":"Understanding Public-Key Infrastructure, Concepts, Standards and Deployment Considerations","author":"Adams","key":"10.1016\/j.comnet.2005.08.007_bib7"},{"key":"10.1016\/j.comnet.2005.08.007_bib8","unstructured":"3GPP Technical Specification, 3GPP system to WLAN Interworking; System description, TS 23.234 v.6.1.0, June 2004."},{"key":"10.1016\/j.comnet.2005.08.007_bib9","unstructured":"3GPP Technical Specification, 3GPP System to WLAN Interworking; UE to Network protocols, TS 24.234 v.1.5.0, July 2004."},{"key":"10.1016\/j.comnet.2005.08.007_bib10","unstructured":"F. Adrangi (Ed.), Mediating Network Discovery and Selection, IETF RFC. Available from: <draft-adrangi-eap-network-Discovery-and-Selection-01.txt>, February 2004."},{"key":"10.1016\/j.comnet.2005.08.007_bib11","unstructured":"3GPP Technical Specification, WLAN Interworking Security, TS 33.234 v.6.1.0, June 2004."},{"issue":"11","key":"10.1016\/j.comnet.2005.08.007_bib12","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCOM.2003.1244927","article-title":"Security aspects of 3G-WLAN interworking","volume":"41","author":"Koien","year":"2003","journal-title":"IEEE Communications Magazine"},{"issue":"October","key":"10.1016\/j.comnet.2005.08.007_bib13","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MWC.2002.1043861","article-title":"WLAN-GPRS integration for next-generation mobile data networks","author":"Salkintzis","year":"2002","journal-title":"IEEE Wireless Communications Magazine"},{"key":"10.1016\/j.comnet.2005.08.007_bib14","unstructured":"ASPeCT Project, Securing the future of Mobile Communications, 1999. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/www.esat.kuleuven.ac.be\/cosic\/aspect>."},{"key":"10.1016\/j.comnet.2005.08.007_bib15","unstructured":"USECA Project, UMTS security architecture: intermediate report on a PKI architecture for UMTS, Public Report, July 1999."},{"key":"10.1016\/j.comnet.2005.08.007_bib16","unstructured":"3GPP TSG, Using PKI to provide network domain Security, Discussion Document S3-010622 SA WG3 Security\u2014S3# 15bis, November 2000."},{"key":"10.1016\/j.comnet.2005.08.007_bib17","unstructured":"3GPP TSG, Support of certificates in 3GPP security architecture, Discussion Document S3-010353 SA WG3 Security\u2014S3#19, July 2001."},{"key":"10.1016\/j.comnet.2005.08.007_bib18","series-title":"Proc. of the IFIPSEC\u20192003 18th IFIP International Information Security Conference, May 2003","first-page":"109","article-title":"Introducing PKI to enhance security in future mobile networks","author":"Kambourakis","year":"2003"},{"key":"10.1016\/j.comnet.2005.08.007_bib19","unstructured":"H. Chen, M. Zivkovic, D.-J. Plas, Transparent end-user authentication across heterogeneous wireless networks, in: Proc. of the IEEE VTC 2003, Fall Conference, Korea, October 2003."},{"key":"10.1016\/j.comnet.2005.08.007_bib20","unstructured":"eNorge 2005, Naerings\u2014og handelsdepartmentet, 2002."},{"key":"10.1016\/j.comnet.2005.08.007_bib21","doi-asserted-by":"crossref","unstructured":"Wireless Application Protocol, WAP Certificate and CRL Profiles Specification, WAP-211-WAPCert, May 2001.","DOI":"10.1049\/cp:20010502"},{"key":"10.1016\/j.comnet.2005.08.007_bib22","unstructured":"3GPP Technical Specification, Generic Authentication Architecture (GAA); support for subscriber certificates, TS 33.221 v.6.0.0, March 2004."},{"key":"10.1016\/j.comnet.2005.08.007_bib23","unstructured":"3GPP Technical Specification, Bootstrapping of application security using AKA and support for subscriber certificates; system description, TS ab.cde v.0.3.0, September 2003."},{"key":"10.1016\/j.comnet.2005.08.007_bib24","unstructured":"3GPP Technical Specification, MAP Application Layer Security, TS 33.200 v.5.1.0, December 2002."},{"key":"10.1016\/j.comnet.2005.08.007_bib25","unstructured":"3GPP Technical Specification, IP Network Layer Security, TS 33.210 v.6.5.0, June 2004."},{"key":"10.1016\/j.comnet.2005.08.007_bib26","unstructured":"J. Arkko, H. Haverinen, EAP-AKA authentication, IETF RFC. Available from: <draft-arkko-pppext-eap-aka-10.txt>, June 2003."},{"key":"10.1016\/j.comnet.2005.08.007_bib27","doi-asserted-by":"crossref","unstructured":"K. Hahnsang, A. Hossam, Improving mobile authentication with new AAA protocols, in: Proc. of the ICC 2033\u2014IEEE International Conference on Communications, (1), May 2003, pp. 497\u2013501.","DOI":"10.1109\/ICC.2003.1204226"},{"issue":"5","key":"10.1016\/j.comnet.2005.08.007_bib28","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1049\/ip-com:20040835","article-title":"Advanced SSL\u29f9TLS-based authentication for secure WLAN-3G interworking","volume":"151","author":"Kambourakis","year":"2004","journal-title":"IEE Proceedings Communications"},{"key":"10.1016\/j.comnet.2005.08.007_bib29","unstructured":"IEEE Std 802.11-1999, Local and metropolitan area networks\u2014specific requirements\u2014Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, IEEE, September 1999."},{"year":"2003","series-title":"Wireless IP and Building the Mobile Internet","key":"10.1016\/j.comnet.2005.08.007_bib30"},{"key":"10.1016\/j.comnet.2005.08.007_bib31","doi-asserted-by":"crossref","unstructured":"B. Aboba, M. Beadles, The network access identifier, IETF RFC 2486, January 1999.","DOI":"10.17487\/rfc2486"},{"key":"10.1016\/j.comnet.2005.08.007_bib32","unstructured":"3GPP Technical Specification, Access security for IP-based services, TS 33.203 v.6.0.0, September 2003."},{"key":"10.1016\/j.comnet.2005.08.007_bib33","doi-asserted-by":"crossref","unstructured":"C. Rigney, et al., Remote authentication dial in user service (RADIUS), IETF RFC 2865, June 2000.","DOI":"10.17487\/rfc2865"},{"key":"10.1016\/j.comnet.2005.08.007_bib34","doi-asserted-by":"crossref","unstructured":"P. Calhoun, et al., Diameter base protocol, IETF RFC 3588, September 2003.","DOI":"10.17487\/rfc3588"},{"key":"10.1016\/j.comnet.2005.08.007_bib35","doi-asserted-by":"crossref","unstructured":"H. Rossnagel, Mobile qualified electronic signatures and certification on demand, in: Proc. of the 1st European PKI Workshop, Samos, Greece, June 2004, pp. 274\u2013286.","DOI":"10.1007\/978-3-540-25980-0_22"},{"key":"10.1016\/j.comnet.2005.08.007_bib36","unstructured":"WAP-217-WPKI, 24.4.2001. Available from: <https:\/\/linproxy.fan.workers.dev:443\/http\/www1.wapforum.org\/tech\/documents\/WAP-217-WPKI-20010424-a.pdf>."},{"key":"10.1016\/j.comnet.2005.08.007_bib37","series-title":"Proc. of the 1st European PKI Workshop, Samos, Greece, June 2004","first-page":"287","article-title":"Performance evaluation of certificate based authentication in integrated emerging 3G and Wi-Fi networks","author":"Kambourakis","year":"2004"},{"issue":"2","key":"10.1016\/j.comnet.2005.08.007_bib38","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/JCN.2002.6596651","article-title":"Performance issues with general packet radio service (GPRS)","volume":"4","author":"Chakravorty","year":"2002","journal-title":"Journal of Communications and Networks (JCN)"},{"key":"10.1016\/j.comnet.2005.08.007_bib39","doi-asserted-by":"crossref","unstructured":"R. Chakravorty, J. Cartwright, I. Pratt, Practical experience with TCP over GPRS, in: Proc. of the IEEE Global Communications Conference (GLOBECOM), vol. 2, Taipei, Taiwan, November 2002, pp. 1678\u20131682.","DOI":"10.1109\/GLOCOM.2002.1188483"},{"key":"10.1016\/j.comnet.2005.08.007_bib40","doi-asserted-by":"crossref","unstructured":"J. Korhonen, O. Aalto, A. Gurtov, H. Lamanen, Measured performance of GSM HSCSD and GPRS\u201d, in: Proc. of the IEEE International Conference on Communications (ICC), vol. 5, Helsinki, June 2001, pp. 1330\u20131334.","DOI":"10.1109\/ICC.2001.937138"},{"key":"10.1016\/j.comnet.2005.08.007_bib41","doi-asserted-by":"crossref","unstructured":"S. Kent, R. Atkinson, Security Architecture for the Internet protocol, IETF RFC 2401, November 1998.","DOI":"10.17487\/rfc2401"},{"key":"10.1016\/j.comnet.2005.08.007_bib42","doi-asserted-by":"crossref","unstructured":"C. Kaufman (Ed.), Internet key exchange (IKEv2) protocol. Available from: <draft-ietf-ipsec-ikev2-13.txt>, March 2004.","DOI":"10.17487\/rfc4306"},{"year":"2002","series-title":"Network Security with OpenSSL","author":"Viega","key":"10.1016\/j.comnet.2005.08.007_bib43"},{"key":"10.1016\/j.comnet.2005.08.007_bib44","doi-asserted-by":"crossref","DOI":"10.1145\/967030.967033","article-title":"fine-grained control of security capabilities","author":"Boneh","year":"2004","journal-title":"ACM Transactions on Internet Technology"},{"issue":"October","key":"10.1016\/j.comnet.2005.08.007_bib45","first-page":"42","article-title":"Defending against flooding-based distributed denial-of- service attacks: a tutorial","author":"Rocky","year":"2002","journal-title":"IEEE Communications Magazine"},{"key":"10.1016\/j.comnet.2005.08.007_bib46","series-title":"Proc. of IEEE Design, Automation and Test in Europe Conference and Exhibition (DATE\u201903)","first-page":"10176","article-title":"Securing mobile appliances: new challenges for the system designer","author":"Raghunathan","year":"2003"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1389128605002653?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1389128605002653?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T14:50:16Z","timestamp":1736002216000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128605002653"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8]]},"references-count":46,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2006,8]]}},"alternative-id":["S1389128605002653"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2005.08.007","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2006,8]]}}}