{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T00:50:52Z","timestamp":1762390252455},"reference-count":12,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T00:00:00Z","timestamp":1162166400000},"content-version":"vor","delay-in-days":4565,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Pract Exp"],"published-print":{"date-parts":[[1994,5]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper describes a simple authentication protocol for use with terminal emulation programs running on small workstations, and communicating with a host computer over a (potentially) insecure network. The technique has the advantage that it requires no more network traffic than would be necessary using a standard user\u2010id\/password challenge, and also requires only a small amount of additional intelligence at the workstation. Some management issues are also discussed. The system has been implemented on two host systems and two workstation types.<\/jats:p>","DOI":"10.1002\/spe.4380240502","type":"journal-article","created":{"date-parts":[[2006,11,17]],"date-time":"2006-11-17T17:06:02Z","timestamp":1163783162000},"page":"437-447","source":"Crossref","is-referenced-by-count":3,"title":["Simple authentication"],"prefix":"10.1002","volume":"24","author":[{"given":"C. R.","family":"Snow","sequence":"first","affiliation":[]},{"given":"H.","family":"Whitfield","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,30]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"e_1_2_1_3_2","doi-asserted-by":"crossref","unstructured":"J. B.PostelandJ. K.Reynolds \u2018Telnet protocol specification\u2019.Internet Request for Comment RFC854 May1983.","DOI":"10.17487\/rfc0854"},{"key":"e_1_2_1_4_2","unstructured":"J. G.Steiner B. C.NeumanandJ. I.Schiller \u2018Kerberos: an authentication service for open network systems\u2019 Usenix Conference Proceedings Dallas Texas. February1988 pp.191\u2013202."},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.10005"},{"key":"e_1_2_1_6_2","article-title":"Data encryption standard","volume":"46","author":"National Bureau of Standards","year":"1977","journal-title":"Fed. Inf. Process. Stand. Publ."},{"key":"e_1_2_1_7_2","unstructured":"Xerox Corporation Xerox network systems: XNS standards authentication protocol Publ. XSIG098404 1984."},{"key":"e_1_2_1_8_2","doi-asserted-by":"crossref","unstructured":"F. T.GramppandR. H.Morris \u2018Unix operating system security\u2019 AT&T Bell Laboratories Technical Journal October1984 pp.1649\u20131672.","DOI":"10.1002\/j.1538-7305.1984.tb00058.x"},{"key":"e_1_2_1_9_2","unstructured":"M.Hall M.Towfiq G.Arnold D.TreadwellandH.Sanders. \u2018Windows sockets: an open interface for network programming under Microsoft Windows\u2019.Version 1.1 January1993."},{"key":"e_1_2_1_10_2","unstructured":"Novell Inc. \u2018LAN workplace for DOS user's guide\u2019 Publication No. 100\u2013000881\u2013001 Novell Inc December1990."},{"key":"e_1_2_1_11_2","volume-title":"An advanced 4.3BSD interprocess communication tutorial","author":"Leffler S. J.","year":"1986"},{"key":"e_1_2_1_12_2","volume-title":"Computer Networks","author":"Tanenbaum A. S.","year":"1988"},{"key":"e_1_2_1_13_2","volume-title":"Security for Computer Networks","author":"Davies D. W.","year":"1984"}],"container-title":["Software: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fspe.4380240502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spe.4380240502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T00:26:47Z","timestamp":1698193607000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spe.4380240502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,5]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1994,5]]}},"alternative-id":["10.1002\/spe.4380240502"],"URL":"https:\/\/doi.org\/10.1002\/spe.4380240502","archive":["Portico"],"relation":{},"ISSN":["0038-0644","1097-024X"],"issn-type":[{"value":"0038-0644","type":"print"},{"value":"1097-024X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1994,5]]}}}