{"id":"https://openalex.org/W1979706229","doi":"https://doi.org/10.1109/icmcs.2014.6911380","title":"Enhanced authentication and key agreement protocol for improving security in UMTS networks","display_name":"Enhanced authentication and key agreement protocol for improving security in UMTS networks","publication_year":2014,"publication_date":"2014-04-01","ids":{"openalex":"https://openalex.org/W1979706229","doi":"https://doi.org/10.1109/icmcs.2014.6911380","mag":"1979706229"},"language":"en","primary_location":{"id":"doi:10.1109/icmcs.2014.6911380","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmcs.2014.6911380","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Conference on Multimedia Computing and Systems (ICMCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051430097","display_name":"Ahmed Ziani","orcid":null},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Ahmed Ziani","raw_affiliation_strings":["Faculty of Science, Abdelmalek Essaadi University, Tetuan, Morocco","Information Systems and Telecommunications Laboratory, Faculty of Science, Abdelmalek Essaadi University, Tetuan, Morocco"],"affiliations":[{"raw_affiliation_string":"Faculty of Science, Abdelmalek Essaadi University, Tetuan, Morocco","institution_ids":["https://openalex.org/I240042149"]},{"raw_affiliation_string":"Information Systems and Telecommunications Laboratory, Faculty of Science, Abdelmalek Essaadi University, Tetuan, Morocco","institution_ids":["https://openalex.org/I240042149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078766712","display_name":"Abdellatif Medouri","orcid":null},"institutions":[{"id":"https://openalex.org/I240042149","display_name":"Abdelmalek Essa\u00e2di University","ror":"https://ror.org/03c4shz64","country_code":"MA","type":"education","lineage":["https://openalex.org/I240042149"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Abdellatif Medouri","raw_affiliation_strings":["Modeling and Information Theory Group, Abdelmalek Essaadi University, Tetuan, Morocco","Modeling and Information Theory Group, Polydisciplinary Faculty of Tetuan, Abdelmalek Essaadi University, Morocco"],"affiliations":[{"raw_affiliation_string":"Modeling and Information Theory Group, Abdelmalek Essaadi University, Tetuan, Morocco","institution_ids":["https://openalex.org/I240042149"]},{"raw_affiliation_string":"Modeling and Information Theory Group, Polydisciplinary Faculty of Tetuan, Abdelmalek Essaadi University, Morocco","institution_ids":["https://openalex.org/I240042149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051430097"],"corresponding_institution_ids":["https://openalex.org/I240042149"],"apc_list":null,"apc_paid":null,"fwci":0.3448,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62923026,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"890","last_page":"894"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7489475607872009},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7307999134063721},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.6638587713241577},{"id":"https://openalex.org/keywords/umts-frequency-bands","display_name":"UMTS frequency bands","score":0.605899453163147},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.569713294506073},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5459685325622559},{"id":"https://openalex.org/keywords/generic-bootstrapping-architecture","display_name":"Generic Bootstrapping Architecture","score":0.5287988781929016},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.5238894820213318},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.49161583185195923},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4885352551937103},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.4134260416030884}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7489475607872009},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7307999134063721},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.6638587713241577},{"id":"https://openalex.org/C101618186","wikidata":"https://www.wikidata.org/wiki/Q3633928","display_name":"UMTS frequency bands","level":2,"score":0.605899453163147},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.569713294506073},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5459685325622559},{"id":"https://openalex.org/C174953433","wikidata":"https://www.wikidata.org/wiki/Q5532650","display_name":"Generic Bootstrapping Architecture","level":5,"score":0.5287988781929016},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.5238894820213318},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.49161583185195923},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4885352551937103},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.4134260416030884}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icmcs.2014.6911380","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmcs.2014.6911380","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 International Conference on Multimedia Computing and Systems (ICMCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W16724058","https://openalex.org/W160083575","https://openalex.org/W204868726","https://openalex.org/W1561564981","https://openalex.org/W2171579368","https://openalex.org/W2237486024","https://openalex.org/W2288687584","https://openalex.org/W2480642149","https://openalex.org/W2480724832","https://openalex.org/W2484636755","https://openalex.org/W2500679913","https://openalex.org/W2504719585","https://openalex.org/W2759921978","https://openalex.org/W4231359629","https://openalex.org/W4233985122","https://openalex.org/W4301421289","https://openalex.org/W6600664119","https://openalex.org/W6690034868","https://openalex.org/W6696489265","https://openalex.org/W6722950673","https://openalex.org/W6725028801","https://openalex.org/W6831911672"],"related_works":["https://openalex.org/W2093798919","https://openalex.org/W2107692711","https://openalex.org/W2134444393","https://openalex.org/W2314541983","https://openalex.org/W2360010141","https://openalex.org/W2147816236","https://openalex.org/W2941888532","https://openalex.org/W2102741679","https://openalex.org/W2117797620","https://openalex.org/W4253316174"],"abstract_inverted_index":{"The":[0,43,112,154],"UMTS":[1,107],"networks":[2,29],"(Universal":[3],"Mobile":[4],"Telecommunications":[5],"System)":[6],"constitute":[7],"an":[8,135],"evolution":[9],"of":[10,15,53,92],"mobile":[11,28],"systems":[12],"in":[13,23,82,100],"terms":[14],"data":[16],"speed,":[17],"capacity":[18],"and":[19,31,45,56,68,105,144,167],"new":[20,124],"service":[21],"capabilities":[22],"comparison":[24],"with":[25],"Second":[26],"generation":[27],"(2G),":[30],"provide":[32],"a":[33,63,123,157],"better":[34],"Security":[35],"Mechanism":[36],"for":[37],"wireless":[38],"access":[39],"to":[40,61,65,72,127,160,170],"3G":[41],"services.":[42],"authentication":[44,74,79,138],"key":[46,96,159],"agreement":[47],"(AKA)":[48],"protocol":[49,149],"is":[50,58,88],"the":[51,59,66,73,78,83,93,101,106,129,140,145,172],"One":[52],"these":[54],"mechanisms,":[55],"it":[57],"essence":[60],"authenticate":[62,171],"user":[64],"network":[67,166],"vice":[69],"versa":[70],"through":[71],"vectors":[75],"generated":[76],"by":[77,90,178],"center":[80],"(AuC)":[81,104],"user's":[84],"Home":[85],"Network.":[86],"This":[87,120],"possible":[89],"means":[91],"preshared":[94],"secret":[95],"K":[97],"stored":[98],"both":[99],"Authentication":[102],"Center":[103],"Subscriber":[108],"Identity":[109],"Module":[110],"(USIM).":[111],"other":[113],"parameters":[114],"are":[115],"derived":[116],"from":[117],"this":[118,148],"key.":[119],"paper":[121],"describes":[122],"security":[125],"plan":[126],"surmount":[128],"issues":[130],"mentioned":[131],"above,":[132],"which":[133],"proposes":[134],"secureand":[136],"efficient":[137],"between":[139],"User":[141,173],"Equipment":[142,174],"(UE)":[143,175],"home":[146],"networks,":[147],"khnown":[150],"Enhanced":[151],"AKA":[152],"(EAKA).":[153],"EAKA":[155],"uses":[156],"temporary":[158],"allow":[161],"visitor":[162],"location":[163],"register":[164],"serving":[165],"(VLR/":[168],"SN)":[169],"without":[176],"intervention":[177],"HLR":[179],"/":[180],"AuC.":[181]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
