{"id":"https://openalex.org/W2107811728","doi":"https://doi.org/10.1142/s0129626413500096","title":"AN AUTHENTICATION SCHEME FOR THE GLOBAL MOBILITY NETWORK","display_name":"AN AUTHENTICATION SCHEME FOR THE GLOBAL MOBILITY NETWORK","publication_year":2013,"publication_date":"2013-09-01","ids":{"openalex":"https://openalex.org/W2107811728","doi":"https://doi.org/10.1142/s0129626413500096","mag":"2107811728"},"language":"en","primary_location":{"id":"doi:10.1142/s0129626413500096","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129626413500096","pdf_url":null,"source":{"id":"https://openalex.org/S18360026","display_name":"Parallel Processing Letters","issn_l":"0129-6264","issn":["0129-6264","1793-642X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Parallel Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008386243","display_name":"Song\u2010Kong Chong","orcid":null},"institutions":[{"id":"https://openalex.org/I126145234","display_name":"Chaoyang University of Technology","ror":"https://ror.org/04xwksx09","country_code":"TW","type":"education","lineage":["https://openalex.org/I126145234"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"SONG-KONG CHONG","raw_affiliation_strings":["Department of Information Management, Chaoyang University of Technology, 168 Gifeng E. Rd., Wufeng, Taichung County, Taiwan 413, R.O.C"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Chaoyang University of Technology, 168 Gifeng E. Rd., Wufeng, Taichung County, Taiwan 413, R.O.C","institution_ids":["https://openalex.org/I126145234"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047477860","display_name":"Cheng\u2010Chi Lee","orcid":"https://orcid.org/0000-0002-8918-1703"},"institutions":[{"id":"https://openalex.org/I114150738","display_name":"Fu Jen Catholic University","ror":"https://ror.org/04je98850","country_code":"TW","type":"education","lineage":["https://openalex.org/I114150738"]},{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"CHENG-CHI LEE","raw_affiliation_strings":["Department of Library and Information Science, Fu Jen Catholic University, 510 Jhongjheng Rd., Sinjhuang City, Taipei County 24205, Taiwan, R.O.C","Department of Photonics and Communication Engineering, Asia University, No. 500, Lioufeng Raod, Wufeng Shiang, 402 Taichung, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Department of Library and Information Science, Fu Jen Catholic University, 510 Jhongjheng Rd., Sinjhuang City, Taipei County 24205, Taiwan, R.O.C","institution_ids":["https://openalex.org/I114150738"]},{"raw_affiliation_string":"Department of Photonics and Communication Engineering, Asia University, No. 500, Lioufeng Raod, Wufeng Shiang, 402 Taichung, Taiwan, R.O.C","institution_ids":["https://openalex.org/I143578492"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037292711","display_name":"Min\u2010Shiang Hwang","orcid":"https://orcid.org/0000-0001-5502-8033"},"institutions":[{"id":"https://openalex.org/I143578492","display_name":"Asia University","ror":"https://ror.org/038a1tp19","country_code":"TW","type":"education","lineage":["https://openalex.org/I143578492"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"MIN-SHIANG HWANG","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Asia University, No. 500, Lioufeng Raod, Wufeng Shiang, 402 Taichung, Taiwan, R.O.C"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Asia University, No. 500, Lioufeng Raod, Wufeng Shiang, 402 Taichung, Taiwan, R.O.C","institution_ids":["https://openalex.org/I143578492"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008386243"],"corresponding_institution_ids":["https://openalex.org/I126145234"],"apc_list":null,"apc_paid":null,"fwci":0.2365,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.62771612,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"23","issue":"03","first_page":"1350009","last_page":"1350009"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9717000126838684,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.961899995803833,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7664432525634766},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7006352543830872},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6967858672142029},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6631808280944824},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.5623192191123962},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5325393080711365},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49227824807167053},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.451425701379776},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.42119723558425903},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.38378024101257324},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07302436232566833}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7664432525634766},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7006352543830872},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6967858672142029},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6631808280944824},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.5623192191123962},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5325393080711365},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49227824807167053},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.451425701379776},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.42119723558425903},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.38378024101257324},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07302436232566833},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0129626413500096","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129626413500096","pdf_url":null,"source":{"id":"https://openalex.org/S18360026","display_name":"Parallel Processing Letters","issn_l":"0129-6264","issn":["0129-6264","1793-642X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Parallel Processing Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W3151748292"],"related_works":["https://openalex.org/W2380922985","https://openalex.org/W2518879583","https://openalex.org/W1577036450","https://openalex.org/W2985233329","https://openalex.org/W2229857154","https://openalex.org/W1513993916","https://openalex.org/W4235962728","https://openalex.org/W2392747003","https://openalex.org/W1706650111","https://openalex.org/W3124193441"],"abstract_inverted_index":{"In":[0],"this":[1,39],"paper,":[2],"we":[3,49],"shall":[4,50],"point":[5],"out":[6],"that":[7],"an":[8,52],"authentication":[9,25,54],"scheme":[10,55],"for":[11],"the":[12,41,58],"global":[13],"mobility":[14],"network":[15],"(GLOMONET)":[16],"is":[17],"insecure.":[18],"An":[19],"insider":[20],"attacker":[21,42],"can":[22,43],"obtain":[23],"a":[24,28,33],"key":[26],"of":[27,32,38,60],"user":[29],"by":[30],"means":[31],"legal":[34],"procedure,":[35],"and":[36],"because":[37],"weakness,":[40],"make":[44],"free":[45],"calls":[46],"surreptitiously.":[47],"Therefore,":[48],"propose":[51],"improved":[53],"to":[56],"protect":[57],"security":[59],"GLOMONET.":[61]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
