{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:15:36Z","timestamp":1725567336290},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540288961"},{"type":"electronic","value":"9783540319900"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11553939_46","type":"book-chapter","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T00:35:23Z","timestamp":1285720523000},"page":"317-324","source":"Crossref","is-referenced-by-count":1,"title":["Secure Password Authentication for Keystroke Dynamics"],"prefix":"10.1007","author":[{"given":"YeongGeun","family":"Choe","sequence":"first","affiliation":[]},{"given":"Soon-Ja","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: IEEE Symposium on Research in Security and Privacy, pp. 77\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"46_CR2","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Augmented encrypted key exchange: a password-based protocols secure against dictionary attacks and password-file compromise. In: ACM Conference on Computer and Communications Security, pp. 244\u2013250 (1993)","DOI":"10.1145\/168588.168618"},{"issue":"5","key":"46_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. ACM Computer Communications Review\u00a026(5), 5\u201326 (1996)","journal-title":"ACM Computer Communications Review"},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Jablon, D.: Extended password key exchange protocols immune to dictionary attacks. In: WETICE 1997 Workshop on Enterprise Security, pp. 248\u2013255 (1997)","DOI":"10.1109\/ENABL.1997.630822"},{"key":"46_CR5","unstructured":"Wu, T.: Secure remote password protocol. In: Network and Distributed System Security Symposium Conference Proceedings (1998)"},{"key":"46_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably secure password authenticated key exchange using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 156\u2013171. Springer, Heidelberg (2000)"},{"key":"46_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/3-540-45353-9_27","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"P. MacKenzie","year":"2001","unstructured":"MacKenzie, P.: More Efficient Password-Authenticated Key Exchange. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 361\u2013377. Springer, Heidelberg (2001)"},{"key":"46_CR8","unstructured":"MacKenzie, P.: The PAK suites: Protocols for Password-Authenticated Key Exchange (2002), available from \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363\/passwdPK\/contributions.html#Mac02"},{"key":"46_CR9","unstructured":"Kwon, T.: Authentication and Key agreement via Memorable Passwords. In: Network and Distributed System Security Symposium Conference Proceedings (2001)"},{"key":"46_CR10","unstructured":"Kwon, T., Kang, M., Song, J.: An Adaptable and Reliable Authentication Protocol for Communication Networks. In: Proceedings of IEEE INFOCOM 1997, pp. 737\u2013744 (1997)"},{"issue":"7","key":"46_CR11","first-page":"991","volume":"E82-B","author":"T. Kwon","year":"1999","unstructured":"Kwon, T., Kang, M., Jung, S., Song, J.: An Improvement of the Password-based Authentication protocol(K1P) on Security against Replay Attacks. IEICE Transactions on Communications\u00a0E82-B(7), 991\u2013997 (1999)","journal-title":"IEICE Transactions on Communications"},{"issue":"4","key":"46_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/219282.219298","volume":"29","author":"Y. Ding","year":"1995","unstructured":"Ding, Y., Horster, P.: Undetectable On-line Password Guessing Attacks. ACM Operating Systems Review\u00a029(4), 77\u201386 (1995)","journal-title":"ACM Operating Systems Review"},{"issue":"4","key":"46_CR13","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/506106.506108","volume":"34","author":"C.-L. Lin","year":"2000","unstructured":"Lin, C.-L., Sun, H.-M., Hwang, T.: Three party encrypted key exchange: Attacks and a solution. ACM Operating Systems Review\u00a034(4), 12\u201320 (2000)","journal-title":"ACM Operating Systems Review"},{"issue":"12","key":"46_CR14","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/4234.974498","volume":"5","author":"C.-L. Lin","year":"2001","unstructured":"Lin, C.-L., Sun, H.-M., Steiner, M., Hwang, T.: Three-party encrypted key exchange Without Server Public-Keys. IEEE, Communications Letters\u00a05(12), 497\u2013499 (2001)","journal-title":"IEEE, Communications Letters"},{"issue":"5","key":"46_CR15","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"Gong, L., Lomos, M., Needham, R.: Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE Journal on Selected Areas in Communications\u00a011(5), 648\u2013656 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"46_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M. Steiner","year":"1995","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Refinement and Extension of Encrypted Key Exchange. ACM Operating Systems Review\u00a029(3), 22\u201330 (1995)","journal-title":"ACM Operating Systems Review"},{"key":"46_CR17","doi-asserted-by":"crossref","unstructured":"Gong, L.: Optimal Authentication Protocols Resistant to Password Guessing Attacks. In: 8th IEEE Computer Security Foundations Workshop, pp. 24\u201329 (1995)","DOI":"10.1109\/CSFW.1995.518549"},{"issue":"6","key":"46_CR18","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptograpy. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"46_CR19","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1145\/322510.322514","volume":"2","author":"S. Halevi","year":"1999","unstructured":"Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. ACM Transactions on Information and System Security\u00a02(3), 230\u2013268 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"46_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"46_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/3-540-39200-9_33","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"R. Gennaro","year":"2003","unstructured":"Gennaro, R., Lindell, Y.: A Framework for Password-Based Authenticated Key Exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 524\u2013543. Springer, Heidelberg (2003)"},{"issue":"8","key":"46_CR22","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D. Denning","year":"1981","unstructured":"Denning, D., Sacco, G.: Timestamps in key distribution protocols. Communications of the ACM\u00a024(8), 533\u2013536 (1981)","journal-title":"Communications of the ACM"},{"key":"46_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/3-540-38424-3_19","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"Y. Yacobi","year":"1991","unstructured":"Yacobi, Y.: A key distribution paradox. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 268\u2013273. Springer, Heidelberg (1991)"},{"key":"46_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"R. Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 13\u201325. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Knowledge-Based Intelligent Information and Engineering Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11553939_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:05:48Z","timestamp":1619492748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11553939_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540288961","9783540319900"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11553939_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}