{"id":"https://openalex.org/W1516056033","doi":"https://doi.org/10.1007/978-3-540-24693-0_117","title":"A Kerberos-Based Authentication Architecture for Wireless LANs","display_name":"A Kerberos-Based Authentication Architecture for Wireless LANs","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W1516056033","doi":"https://doi.org/10.1007/978-3-540-24693-0_117","mag":"1516056033"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-24693-0_117","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-540-24693-0_117","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-24693-0_117.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-24693-0_117.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040251515","display_name":"Mohamed Ali K\u00e2afar","orcid":"https://orcid.org/0000-0003-2714-0276"},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Mohamed Ali K\u00e2afar","raw_affiliation_strings":["Ecole Nationale des Sciences de l\u2019Informatique, Universit\u00e9 de la Manouba, Tunisia","Ecole Nationale des Sciences de l'Informatique, Universit\u00e9 de la Manouba, Tunisia"],"affiliations":[{"raw_affiliation_string":"Ecole Nationale des Sciences de l\u2019Informatique, Universit\u00e9 de la Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]},{"raw_affiliation_string":"Ecole Nationale des Sciences de l'Informatique, Universit\u00e9 de la Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056564782","display_name":"Lamia Ben Azzouz","orcid":"https://orcid.org/0000-0001-9364-7302"},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Lamia Benazzouz","raw_affiliation_strings":["Ecole Nationale des Sciences de l\u2019Informatique, Universit\u00e9 de la Manouba, Tunisia","Ecole Nationale des Sciences de l'Informatique, Universit\u00e9 de la Manouba, Tunisia"],"affiliations":[{"raw_affiliation_string":"Ecole Nationale des Sciences de l\u2019Informatique, Universit\u00e9 de la Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]},{"raw_affiliation_string":"Ecole Nationale des Sciences de l'Informatique, Universit\u00e9 de la Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051546312","display_name":"Farouk Kamoun","orcid":"https://orcid.org/0000-0002-9932-9177"},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Farouk Kamoun","raw_affiliation_strings":["Ecole Nationale des Sciences de l\u2019Informatique, Universit\u00e9 de la Manouba, Tunisia","Ecole Nationale des Sciences de l'Informatique, Universit\u00e9 de la Manouba, Tunisia"],"affiliations":[{"raw_affiliation_string":"Ecole Nationale des Sciences de l\u2019Informatique, Universit\u00e9 de la Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]},{"raw_affiliation_string":"Ecole Nationale des Sciences de l'Informatique, Universit\u00e9 de la Manouba, Tunisia","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045657946","display_name":"Davor Males","orcid":null},"institutions":[{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]},{"id":"https://openalex.org/I4210159731","display_name":"Laboratoire de Recherche en Informatique de Paris 6","ror":"https://ror.org/05krcen59","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I39804081","https://openalex.org/I4210159245","https://openalex.org/I4210159731"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Davor Males","raw_affiliation_strings":["Laboratoire d\u2019Informatique de Paris 6, Universit\u00e9 Pierre et Marie Curie, 8, rue du capitaine, Scott 75015, Paris, France","Laboratoire d'Informatique de Paris 6, Universit\u00e9 Pierre et Marie Curie, 8, rue du capitaine, Scott 75015, Paris, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire d\u2019Informatique de Paris 6, Universit\u00e9 Pierre et Marie Curie, 8, rue du capitaine, Scott 75015, Paris, France","institution_ids":["https://openalex.org/I39804081","https://openalex.org/I4210159731"]},{"raw_affiliation_string":"Laboratoire d'Informatique de Paris 6, Universit\u00e9 Pierre et Marie Curie, 8, rue du capitaine, Scott 75015, Paris, France","institution_ids":["https://openalex.org/I39804081","https://openalex.org/I4210159731"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5040251515"],"corresponding_institution_ids":["https://openalex.org/I83259278"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3152,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.56339788,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1344","last_page":"1353"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/kerberos","display_name":"Kerberos","score":0.9912025928497314},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8332855105400085},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7129114866256714},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.660401463508606},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6334168910980225},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47488826513290405},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.45625361800193787},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.43018871545791626},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.35110723972320557},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.19679424166679382}],"concepts":[{"id":"https://openalex.org/C32455479","wikidata":"https://www.wikidata.org/wiki/Q506053","display_name":"Kerberos","level":3,"score":0.9912025928497314},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8332855105400085},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7129114866256714},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.660401463508606},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6334168910980225},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47488826513290405},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.45625361800193787},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.43018871545791626},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.35110723972320557},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19679424166679382}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-24693-0_117","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-540-24693-0_117","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-24693-0_117.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-540-24693-0_117","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-540-24693-0_117","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-24693-0_117.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1516056033.pdf","grobid_xml":"https://content.openalex.org/works/W1516056033.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W1595293097","https://openalex.org/W1635413415","https://openalex.org/W1894693606","https://openalex.org/W1995156790","https://openalex.org/W2132147947","https://openalex.org/W2788278440","https://openalex.org/W4214605516","https://openalex.org/W4299402001","https://openalex.org/W6635808058","https://openalex.org/W6844361458"],"related_works":["https://openalex.org/W191653431","https://openalex.org/W2034419863","https://openalex.org/W2168697159","https://openalex.org/W2360607528","https://openalex.org/W4220710588","https://openalex.org/W1904860638","https://openalex.org/W2030556877","https://openalex.org/W2533399023","https://openalex.org/W2183793056","https://openalex.org/W1507711218"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
