{"id":"https://openalex.org/W1928429288","doi":"https://doi.org/10.1007/11767480_23","title":"On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan","display_name":"On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan","publication_year":2006,"publication_date":"2006-01-01","ids":{"openalex":"https://openalex.org/W1928429288","doi":"https://doi.org/10.1007/11767480_23","mag":"1928429288"},"language":"en","primary_location":{"id":"doi:10.1007/11767480_23","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11767480_23","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100626958","display_name":"Xinghua Li","orcid":"https://orcid.org/0000-0002-5583-4155"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN","KR"],"is_corresponding":true,"raw_author_name":"Xinghua Li","raw_affiliation_strings":["Key Laboratory of Computer Networks and Information, Security (Ministry of Education), Xidian University, Xi\u2019an, 710071, China","Mobile Network Security Technology Research Center, Kyungpook National University, Sankyuk-dong, Buk-ku, Daegu, 702-701, Korea","Key Laboratory of Computer Networks and Information, Security (Ministry of Education), Xidian University, Xi'an, 710071, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information, Security (Ministry of Education), Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Mobile Network Security Technology Research Center, Kyungpook National University, Sankyuk-dong, Buk-ku, Daegu, 702-701, Korea","institution_ids":["https://openalex.org/I31419693"]},{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information, Security (Ministry of Education), Xidian University, Xi'an, 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080850329","display_name":"SangJae Moon","orcid":null},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"SangJae Moon","raw_affiliation_strings":["Mobile Network Security Technology Research Center, Kyungpook National University, Sankyuk-dong, Buk-ku, Daegu, 702-701, Korea"],"affiliations":[{"raw_affiliation_string":"Mobile Network Security Technology Research Center, Kyungpook National University, Sankyuk-dong, Buk-ku, Daegu, 702-701, Korea","institution_ids":["https://openalex.org/I31419693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101479563","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0002-1679-5800"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I198091727","display_name":"Tianjin Polytechnic University","ror":"https://ror.org/00xsr9m91","country_code":"CN","type":"education","lineage":["https://openalex.org/I198091727"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["Key Laboratory of Computer Networks and Information, Security (Ministry of Education), Xidian University, Xi\u2019an, 710071, China","School of Computing and Automatization, Tianjin Polytechnic University, Tianjin, 300160, China","Key Laboratory of Computer Networks and Information, Security (Ministry of Education), Xidian University, Xi'an, 710071, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information, Security (Ministry of Education), Xidian University, Xi\u2019an, 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computing and Automatization, Tianjin Polytechnic University, Tianjin, 300160, China","institution_ids":["https://openalex.org/I198091727"]},{"raw_affiliation_string":"Key Laboratory of Computer Networks and Information, Security (Ministry of Education), Xidian University, Xi'an, 710071, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100626958"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I31419693"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.4953,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.89832961,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"340","last_page":"348"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8035762310028076},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5946142673492432},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5825580358505249},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5399579405784607},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4756438434123993},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4653276801109314},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.45333558320999146},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.435001015663147},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.4332827925682068},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.42773401737213135},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.41127943992614746},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09648150205612183},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.06753787398338318}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8035762310028076},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5946142673492432},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5825580358505249},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5399579405784607},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4756438434123993},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4653276801109314},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.45333558320999146},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.435001015663147},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.4332827925682068},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.42773401737213135},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.41127943992614746},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09648150205612183},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.06753787398338318},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/11767480_23","is_oa":false,"landing_page_url":"https://doi.org/10.1007/11767480_23","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1490371707","https://openalex.org/W1586563142","https://openalex.org/W1660562555","https://openalex.org/W2153281696","https://openalex.org/W2227653143","https://openalex.org/W2409433878","https://openalex.org/W4289127653","https://openalex.org/W4300764187"],"related_works":["https://openalex.org/W2482813613","https://openalex.org/W2399882206","https://openalex.org/W2034419863","https://openalex.org/W2043851470","https://openalex.org/W2132505069","https://openalex.org/W2296396257","https://openalex.org/W2736044769","https://openalex.org/W3201780008","https://openalex.org/W2364053809","https://openalex.org/W106082050"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
