{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T19:40:10Z","timestamp":1736710810054,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540673804"},{"type":"electronic","value":"9783540455684"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10719994_13","type":"book-chapter","created":{"date-parts":[[2006,12,30]],"date-time":"2006-12-30T20:38:40Z","timestamp":1167511120000},"page":"156-168","source":"Crossref","is-referenced-by-count":3,"title":["A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications"],"prefix":"10.1007","author":[{"given":"Kook-Heui","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sang-Jae","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Won-Young","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Tae-Geun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"JTC(Air)\/94.12.15-119Rc, Personal Communication Services, PACS Air Interface Specification, PN3418"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Zheng, Y.: An authentication and security protocol for mobile computing. In: proceedings of lFIP, pp. 249\u2013257 (1996)","DOI":"10.1007\/978-0-387-34980-0_25"},{"key":"13_CR3","unstructured":"Bellocre: Generic Criteria for Version 0.1: Wireless Access Communications Systems (WACS), Technical Reference, TR - INS - 001313, Issue. 1 (October 1993)"},{"key":"13_CR4","unstructured":"Reserch & Development Center for Radio Systems, RCR STD-28, Personal Handy-phone System, Version 1 (December 1993)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/BFb0055870","volume-title":"Computer Security \u2013 ESORICS 98","author":"G. Horn","year":"1998","unstructured":"Horn, G., Preneel, B.: Authentication and payment in future mobile systems. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 277\u2013293. Springer, Heidelberg (1998)"},{"key":"13_CR6","unstructured":"Horn, G., Martin, K.M., Mitchell, C.J.: Authentication protocols for mobile network environment value-added services, draft, available at http:\/\/isg.rhbnc.ac.uk\/cjm\/Chris_Mitchell.htm"},{"key":"13_CR7","unstructured":"ANSI X9.63-199x, Elliptic curve key agreement and key transport protocols, Working draft (July 1998)"},{"key":"13_CR8","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of applied cryptography","author":"A.J. Manezes","year":"1996","unstructured":"Manezes, A.J., van Oorshot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology - Crypto \u201985","author":"V. Miller","year":"1986","unstructured":"Miller, V.: Uses of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"issue":"177","key":"13_CR10","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048(177), 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"13_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"A.J. Menezes","year":"1993","unstructured":"Menezes, A.J.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology-CRYPTO \u201997","author":"Y. Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) <\u2009< cost (signature) + cost (encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 165\u2013179. Springer, Heidelberg (1997)"},{"key":"13_CR13","unstructured":"Zheng, Y., Imai, H.: Efficient signcryption schemes on elliptic curves. In: Proceedings of the IFIP 14th International Information Security Conference, IFIP\/SEC 1998 (1998)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Petersen, H., Michels, M.: Cryptanalysis and improvement of signcryption schemes. In: IEE Proc. Comput. Digit. Tech., vol. 145(2) (1998)","DOI":"10.1049\/ip-cdt:19981862"},{"key":"13_CR15","unstructured":"Xu, S., Wang, X.: Cryptanalysis and two authentication and key distribution protocols in portable communications systems. In: IEEE International Symposium on Information Theory and its Applications (ISIST 1996), vol.\u00a01, pp. 347\u2013350 (1996)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Beller, M.J., Chang, L.F., Yacobi, Y.: Privacy and authentication on a portable communications system. In: IEEE GLOBECOM 1991, pp. 1922\u20131927 (1991)","DOI":"10.1109\/GLOCOM.1991.188696"},{"key":"13_CR17","unstructured":"Rabin, M.O.: Digitalized Signatures and Public-Key Functions as Intractable as Factorization, MIT Lab. Comp. Sci., TR-212 (January 1979)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC\u201999"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10719994_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T19:12:43Z","timestamp":1736709163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10719994_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673804","9783540455684"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/10719994_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}