{"id":"https://openalex.org/W1554369939","doi":"https://doi.org/10.1109/wimob.2005.1512853","title":"Perfect identity concealment in UMTS over radio access links","display_name":"Perfect identity concealment in UMTS over radio access links","publication_year":2006,"publication_date":"2006-10-04","ids":{"openalex":"https://openalex.org/W1554369939","doi":"https://doi.org/10.1109/wimob.2005.1512853","mag":"1554369939"},"language":"en","primary_location":{"id":"doi:10.1109/wimob.2005.1512853","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2005.1512853","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087753863","display_name":"Michel Barbeau","orcid":"https://orcid.org/0000-0003-3531-4926"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"M. Barbeau","raw_affiliation_strings":["School of Computer Science, Carleton University, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103469469","display_name":"Jean\u2010Bernard Robert","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"J.-M. Robert","raw_affiliation_strings":["Alcatel, Research and Innovation, Security Group, Ottawa, Canada"],"affiliations":[{"raw_affiliation_string":"Alcatel, Research and Innovation, Security Group, Ottawa, Canada","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087753863"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":0.6036,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.69962409,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2","issue":null,"first_page":"72","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.909509003162384},{"id":"https://openalex.org/keywords/umts-frequency-bands","display_name":"UMTS frequency bands","score":0.8717297315597534},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7131445407867432},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6183092594146729},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6162055730819702},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5815455913543701},{"id":"https://openalex.org/keywords/subscriber-identity-module","display_name":"Subscriber identity module","score":0.46631038188934326},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44806304574012756},{"id":"https://openalex.org/keywords/umts-terrestrial-radio-access-network","display_name":"UMTS Terrestrial Radio Access Network","score":0.44699206948280334},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.27041494846343994},{"id":"https://openalex.org/keywords/radio-access-network","display_name":"Radio access network","score":0.22287863492965698},{"id":"https://openalex.org/keywords/mobile-station","display_name":"Mobile station","score":0.16350817680358887},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.15610599517822266}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.909509003162384},{"id":"https://openalex.org/C101618186","wikidata":"https://www.wikidata.org/wiki/Q3633928","display_name":"UMTS frequency bands","level":2,"score":0.8717297315597534},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7131445407867432},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6183092594146729},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6162055730819702},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5815455913543701},{"id":"https://openalex.org/C40367706","wikidata":"https://www.wikidata.org/wiki/Q230110","display_name":"Subscriber identity module","level":3,"score":0.46631038188934326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44806304574012756},{"id":"https://openalex.org/C31304418","wikidata":"https://www.wikidata.org/wiki/Q283455","display_name":"UMTS Terrestrial Radio Access Network","level":5,"score":0.44699206948280334},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.27041494846343994},{"id":"https://openalex.org/C106365562","wikidata":"https://www.wikidata.org/wiki/Q3078360","display_name":"Radio access network","level":4,"score":0.22287863492965698},{"id":"https://openalex.org/C207029474","wikidata":"https://www.wikidata.org/wiki/Q384018","display_name":"Mobile station","level":3,"score":0.16350817680358887},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.15610599517822266},{"id":"https://openalex.org/C2779971919","wikidata":"https://www.wikidata.org/wiki/Q1378949","display_name":"Handset","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wimob.2005.1512853","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wimob.2005.1512853","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W120660591","https://openalex.org/W1660562555","https://openalex.org/W1880212920","https://openalex.org/W2087811006","https://openalex.org/W2108975750","https://openalex.org/W4289127653","https://openalex.org/W6604929939"],"related_works":["https://openalex.org/W1949164028","https://openalex.org/W2231293615","https://openalex.org/W1585599692","https://openalex.org/W1486733671","https://openalex.org/W2314609072","https://openalex.org/W47280288","https://openalex.org/W2113935291","https://openalex.org/W1590208196","https://openalex.org/W2122653500","https://openalex.org/W1929980166"],"abstract_inverted_index":{"Identity":[0],"concealment":[1,57],"is":[2],"viewed":[3],"as":[4],"a":[5,28],"standard":[6],"identity":[7,26,56],"privacy":[8],"feature.":[9],"UMTS":[10,18,69],"provides":[11,54],"partial":[12],"concealment.":[13],"This":[14],"work":[15],"extends":[16],"the":[17,24,39,62],"mutual":[19],"authentication":[20],"protocol":[21],"such":[22],"that":[23],"true":[25],"of":[27,52,67],"mobile":[29,59],"equipment":[30,60],"cannot":[31],"be":[32],"discovered":[33],"by":[34],"an":[35,68],"attacker":[36],"eavesdropping":[37],"over":[38,61],"radio":[40,63],"access":[41,64],"link":[42,65],"interface.":[43],"Three":[44],"different":[45],"solutions":[46],"using":[47],"aliases":[48],"are":[49],"proposed.":[50],"Each":[51],"them":[53],"perfect":[55],"to":[58],"part":[66],"connection.":[70]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
