{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:36Z","timestamp":1725549336103},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_24","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"190-205","source":"Crossref","is-referenced-by-count":3,"title":["Secure Sessions from Weak Secrets"],"prefix":"10.1007","author":[{"given":"Bruce","family":"Christianson","sequence":"first","affiliation":[]},{"given":"Michael","family":"Roe","sequence":"additional","affiliation":[]},{"given":"David","family":"Wheeler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"13","key":"24_CR1","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1049\/el:19940697","volume":"30","author":"R. Anderson","year":"1994","unstructured":"Anderson, R., Lomas, M.: Fortifying Key negotiation Schemes with Poorly Chosen Passwords. Electronics Letters\u00a030(13), 1040\u20131041 (1994)","journal-title":"Electronics Letters"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0055986","volume-title":"Programming Satan\u2019s Computer","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Needham, R.: Programming Satan\u2019s Computer. LNCS, vol.\u00a01000. Springer, Heidelberg (1998)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. In: Proc. of the IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, vol.\u00a092, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"issue":"6","key":"24_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"24_CR5","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Gong, L.: Optimal Authentication Protocols Resistant to Password Guessing Attacks. In: Proc. 8th IEEE Computer Security Foundations Workshop, pp. 24\u201329 (1995)","DOI":"10.1109\/CSFW.1995.518549"},{"issue":"5","key":"24_CR7","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"Gong, L., Lomas, M., Needham, R., Salzer, J.: Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE Journal on Selected Areas in Communications\u00a011(5), 648\u2013656 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"24_CR8","volume-title":"An Introduction to the Theory of Numbers","author":"G.H. Hardy","year":"1978","unstructured":"Hardy, G.H., Wright, E.M.: An Introduction to the Theory of Numbers, 5th edn. Oxford University Press, Oxford (1978)","edition":"5"},{"issue":"5","key":"24_CR9","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D.P. Jablon","year":"1996","unstructured":"Jablon, D.P.: Strong Password-Only Authenticated Key Exchange. Computer Communications Review\u00a026(5), 5\u201326 (1996)","journal-title":"Computer Communications Review"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/BFb0028162","volume-title":"Security Protocols","author":"J. Kelsey","year":"1998","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Protocol Interactions and the Chosen Protocol Attack. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 91\u2013104. Springer, Heidelberg (1998)"},{"issue":"1","key":"24_CR11","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/2.362630","volume":"28","author":"M. Lomas","year":"1995","unstructured":"Lomas, M., Christianson, B.: To Whom am I Speaking? Remote Booting in a Hostile World. IEEE Computer\u00a028(1), 50\u201354 (1995)","journal-title":"IEEE Computer"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/BFb0028161","volume-title":"Security Protocols","author":"S. Lucks","year":"1998","unstructured":"Lucks, S.: Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 79\u201390. Springer, Heidelberg (1998)"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Patel, S.: Number Theoretic Attacks on Secure Password Schemes. In: Proc IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, vol.\u00a097, pp. 236\u2013247 (1997)","DOI":"10.1109\/SECPRI.1997.601340"},{"issue":"2","key":"24_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978); Operating Systems Review 29(3), 22\u201330","journal-title":"Communications of the ACM"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/3-540-62494-5_7","volume-title":"Security Protocols","author":"D. Wheeler","year":"1997","unstructured":"Wheeler, D.: Transactions using Bets. In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol.\u00a01189, pp. 89\u201392. Springer, Heidelberg (1997)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:56:36Z","timestamp":1619506596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11542322_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}