{"id":"https://openalex.org/W2759208029","doi":"https://doi.org/10.1109/mownet.2017.8045947","title":"Subscription identifier privacy in 5G systems","display_name":"Subscription identifier privacy in 5G systems","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2759208029","doi":"https://doi.org/10.1109/mownet.2017.8045947","mag":"2759208029"},"language":"en","primary_location":{"id":"doi:10.1109/mownet.2017.8045947","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mownet.2017.8045947","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033920372","display_name":"Enrique Cobo Jim\u00e9nez","orcid":null},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Enrique Cobo Jimenez","raw_affiliation_strings":["School of Electrical Engineering, Royal Institute of Technology (KTH), Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering, Royal Institute of Technology (KTH), Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089744557","display_name":"Prajwol Kumar Nakarmi","orcid":null},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Prajwol Kumar Nakarmi","raw_affiliation_strings":["Security Research, Ericsson AB, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Security Research, Ericsson AB, Stockholm, Sweden","institution_ids":["https://openalex.org/I1306339040"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037726591","display_name":"Mats N\u00e4slund","orcid":null},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Mats Naslund","raw_affiliation_strings":["Security Research, Ericsson AB, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Security Research, Ericsson AB, Stockholm, Sweden","institution_ids":["https://openalex.org/I1306339040"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005478348","display_name":"Karl Norrman","orcid":"https://orcid.org/0000-0003-0164-1478"},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Karl Norrman","raw_affiliation_strings":["Security Research, Ericsson AB, Stockholm, Sweden"],"affiliations":[{"raw_affiliation_string":"Security Research, Ericsson AB, Stockholm, Sweden","institution_ids":["https://openalex.org/I1306339040"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033920372"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":1.036,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.80288882,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.8615153431892395},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8534834384918213},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6025052070617676},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.523682713508606},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5106413960456848},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.4938224256038666},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4861604869365692},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4287462532520294},{"id":"https://openalex.org/keywords/paging","display_name":"Paging","score":0.4158038794994354},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.079947829246521}],"concepts":[{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.8615153431892395},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8534834384918213},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6025052070617676},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.523682713508606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5106413960456848},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.4938224256038666},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4861604869365692},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4287462532520294},{"id":"https://openalex.org/C50954386","wikidata":"https://www.wikidata.org/wiki/Q656083","display_name":"Paging","level":2,"score":0.4158038794994354},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.079947829246521},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mownet.2017.8045947","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mownet.2017.8045947","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W287263438","https://openalex.org/W1600234042","https://openalex.org/W2042280942","https://openalex.org/W2045673642","https://openalex.org/W2286649377","https://openalex.org/W2542575239","https://openalex.org/W2963061006","https://openalex.org/W4248377795"],"related_works":["https://openalex.org/W1867121152","https://openalex.org/W2350131590","https://openalex.org/W2148873835","https://openalex.org/W2030857781","https://openalex.org/W1904017904","https://openalex.org/W2046598715","https://openalex.org/W2103369849","https://openalex.org/W2012650292","https://openalex.org/W2079873404","https://openalex.org/W2083090412"],"abstract_inverted_index":{"Privacy":[0],"is":[1,60,78,117],"a":[2],"main":[3],"concern":[4],"for":[5,15,124,145],"mobile":[6,57,150],"network":[7,151],"users,":[8],"and":[9,34,83,129],"there":[10,44],"are":[11,66],"many":[12],"proposed":[13],"enhancements":[14,24,54,65],"the":[16,19,39,64,74,91,100,104,125,131,147],"protection":[17,148],"of":[18,41,52,97,99,143],"long-term":[20,75,126],"subscription":[21,76,127],"identifier.":[22],"Some":[23],"require":[25],"asymmetric":[26,105,121],"key":[27],"operations,":[28],"which":[29,102],"increase":[30],"both":[31],"processing":[32],"requirements":[33],"protocol":[35],"message":[36],"sizes.":[37],"To":[38],"best":[40],"our":[42],"knowledge,":[43],"has":[45],"been":[46],"no":[47],"practical":[48],"implementation":[49,96],"feasibility":[50],"study":[51],"these":[53],"using":[55],"commodity":[56],"devices.":[58],"Neither":[59],"it":[61,116],"clear":[62],"whether":[63],"sufficient.":[67],"This":[68,139],"paper":[69,92],"highlights":[70],"privacy":[71,133],"weaknesses,":[72],"when":[73],"identifier":[77,128],"used":[79],"in":[80,149],"Paging":[81],"procedures,":[82],"proposes":[84],"new":[85],"ways":[86],"to":[87,119],"resolve":[88],"these.":[89],"Further,":[90],"evaluates":[93],"an":[94],"Android":[95],"one":[98],"enhancements,":[101],"includes":[103],"scheme":[106],"Elliptic":[107],"Curve":[108],"Integrated":[109],"Encryption":[110],"Scheme":[111],"(ECIES).":[112],"We":[113],"conclude":[114],"that":[115,130],"feasible":[118],"implement":[120],"encryption":[122],"methods":[123],"highlighted":[132],"weaknesses":[134],"can":[135],"be":[136],"efficiently":[137],"countered.":[138],"removes":[140],"another":[141],"set":[142],"obstacles":[144],"realizing":[146],"standards.":[152]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
