{"id":"https://openalex.org/W1840291474","doi":"https://doi.org/10.1109/mwcn.2002.1045713","title":"Using SSL/TLS in authentication and key agreement procedures of future mobile networks","display_name":"Using SSL/TLS in authentication and key agreement procedures of future mobile networks","publication_year":2003,"publication_date":"2003-06-25","ids":{"openalex":"https://openalex.org/W1840291474","doi":"https://doi.org/10.1109/mwcn.2002.1045713","mag":"1840291474"},"language":"en","primary_location":{"id":"doi:10.1109/mwcn.2002.1045713","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwcn.2002.1045713","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"4th International Workshop on Mobile and Wireless Communications Network","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047345306","display_name":"Georgios Kambourakis","orcid":"https://orcid.org/0000-0001-6348-5031"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"G. Kambourakis","raw_affiliation_strings":["Department of Information and Communication Systems Engineering, University of Aegean, Samos, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems Engineering, University of Aegean, Samos, Greece","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056042393","display_name":"Angelos Rouskas","orcid":"https://orcid.org/0009-0009-7302-1260"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"A. Rouskas","raw_affiliation_strings":["Department of Information and Communication Systems Engineering, University of Aegean, Samos, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems Engineering, University of Aegean, Samos, Greece","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091815745","display_name":"Stefanos Gritzalis","orcid":"https://orcid.org/0000-0002-8037-2191"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"S. Gritzalis","raw_affiliation_strings":["Department of Information and Communication Systems Engineering, University of Aegean, Samos, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems Engineering, University of Aegean, Samos, Greece","institution_ids":["https://openalex.org/I98805295"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5047345306"],"corresponding_institution_ids":["https://openalex.org/I98805295"],"apc_list":null,"apc_paid":null,"fwci":1.6526,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.87044159,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"152","last_page":"156"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9843999743461609,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8150234222412109},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6353335976600647},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6141974329948425},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5708680748939514},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5018973350524902},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46610507369041443},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4623720645904541},{"id":"https://openalex.org/keywords/transport-layer-security","display_name":"Transport Layer Security","score":0.4596710801124573},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.44689685106277466},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41727009415626526},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2219374179840088},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1743837594985962},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15472713112831116},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08355855941772461}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8150234222412109},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6353335976600647},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6141974329948425},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5708680748939514},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5018973350524902},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46610507369041443},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4623720645904541},{"id":"https://openalex.org/C148176105","wikidata":"https://www.wikidata.org/wiki/Q206494","display_name":"Transport Layer Security","level":3,"score":0.4596710801124573},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.44689685106277466},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41727009415626526},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2219374179840088},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1743837594985962},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15472713112831116},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08355855941772461},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mwcn.2002.1045713","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mwcn.2002.1045713","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"4th International Workshop on Mobile and Wireless Communications Network","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1492809676","https://openalex.org/W2021375260","https://openalex.org/W2036456161"],"related_works":["https://openalex.org/W2387152933","https://openalex.org/W2356023093","https://openalex.org/W2366509263","https://openalex.org/W2106808815","https://openalex.org/W4230009347","https://openalex.org/W2050645532","https://openalex.org/W571145082","https://openalex.org/W2942655651","https://openalex.org/W1576950832","https://openalex.org/W3131949917"],"abstract_inverted_index":{"Existing":[0],"security":[1,24],"schemes":[2],"in":[3,80,117,153],"2G":[4,118],"and":[5,22,61,68,83,103,119,122],"3G":[6,120],"systems":[7],"are":[8,34],"inadequate,":[9],"as":[10,29,31,53,109,114],"there":[11],"is":[12],"a":[13,18],"greater":[14],"demand":[15],"to":[16,52,71,101,129],"provide":[17],"more":[19],"flexible,":[20],"reconfigurable":[21],"scalable":[23],"mechanism":[25],"that":[26,140],"can":[27,126],"advance":[28],"fast":[30],"mobile":[32,59],"hosts":[33],"evolving":[35],"into":[36],"full-IP":[37],"enabled":[38],"devices.":[39],"Work":[40],"has":[41,76],"already":[42],"begun":[43],"on":[44],"such":[45,108],"an":[46],"\"all-IP\"":[47],"end-to-end":[48],"solution,":[49],"commonly":[50],"referred":[51],"4G":[54,155],"systems.":[55],"Fully-fledged":[56],"integration":[57],"between":[58],"networks":[60],"the":[62,88,143,149,154],"Internet":[63,82],"demands":[64],"fully":[65],"compatible,":[66],"time-tested":[67],"reliable":[69],"mechanisms":[70],"depend":[72],"on.":[73],"SSL/TLS":[74,125,146],"protocol":[75],"proved":[77],"its":[78],"effectiveness":[79],"wired":[81],"it":[84],"will":[85],"probably":[86],"be":[87,127],"most":[89],"promising":[90],"candidate":[91],"for":[92],"future":[93],"wireless":[94,156],"environments.":[95],"We":[96],"discuss":[97],"existing":[98],"problems":[99],"related":[100],"authentication":[102,111],"key":[104],"agreement":[105],"procedures":[106],"(AKA),":[107],"compromised":[110],"vectors":[112],"attacks,":[113],"they":[115],"appear":[116],"systems,":[121],"propose":[123],"how":[124],"used":[128],"overcome":[130],"these":[131],"inefficiencies.":[132],"Further":[133],"on,":[134],"we":[135],"mark":[136],"down":[137],"additional":[138],"benefits":[139],"stem":[141],"from":[142],"introduction":[144],"of":[145],"combined":[147],"with":[148],"appropriate":[150],"PKI":[151],"elements":[152],"environment.":[157]},"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
