{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:56:18Z","timestamp":1725544578216},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_2","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T07:10:32Z","timestamp":1141888232000},"page":"3-17","source":"Crossref","is-referenced-by-count":11,"title":["Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks"],"prefix":"10.1007","author":[{"given":"Jin Wook","family":"Byun","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Su-Mi","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dong Hoon","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dowon","family":"Hong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"2_CR2","volume-title":"Proceedings of the First ACM Conference on Computer and Communications Security","author":"M. Bellare","year":"1995","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the First ACM Conference on Computer and Communications Security, ACM, New York (1995)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"2_CR4","first-page":"72","volume-title":"Poceedings of the Symposium on Security and Privacy","author":"S. Bellovin","year":"1992","unstructured":"Bellovin, S., Merrit, M.: Encrypted key exchange: password based protocols secure against dictionary attacks. In: Poceedings of the Symposium on Security and Privacy, pp. 72\u201384. IEEE, Los Alamitos (1992)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/3-540-36178-2_31","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Group diffie-hellman key exchange secure against dictionary attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 497\u2013514. Springer, Heidelberg (2002)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.J.: Provably authenticated group diffie-hellman key exchange. In: Poceedings of 8th ACM Conference on Computer and Communications Security, pp. 255\u2013264 (2001)","DOI":"10.1145\/501983.502018"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"P. Rogaway","year":"2001","unstructured":"Rogaway, P., Black, J.A.: Ciphers with Arbitrary Finite Domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, Springer, Heidelberg (2001)"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably secure password-authenticated key exchange using diffie-hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 156\u2013171. Springer, Heidelberg (2000)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11496137_6","volume-title":"Applied Cryptography and Network Security","author":"J.W. Byun","year":"2005","unstructured":"Byun, J.W., Lee, D.H.: N-party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 75\u201390. Springer, Heidelberg (2005)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/3-540-36159-6_12","volume-title":"Information and Communications Security","author":"J.W. Byun","year":"2002","unstructured":"Byun, J.W., Jeong, I.R., Lee, D.H., Park, C.: Password-authenticated key exchange between clients with different passwords. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 134\u2013146. Springer, Heidelberg (2002)"},{"key":"2_CR11","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/11596981_21","volume-title":"Computational Intelligence and Security","author":"J.W. Byun","year":"2005","unstructured":"Byun, J.W., Lee, D.H., Lim, J.: Password-based Group Key Exchange Secure Against Insider Guessing Attacks. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol.\u00a03802, pp. 143\u2013148. Springer, Heidelberg (2005)"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1007\/11610113_81","volume-title":"Frontiers of WWW Research and Development - APWeb 2006","author":"J.W. Byun","year":"2006","unstructured":"Byun, J.W., Lee, D.H., Lim, J.: Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol.\u00a03841, pp. 830\u2013836. Springer, Heidelberg (2006)"},{"key":"2_CR13","unstructured":"Chen, L.: A weakness of the password-authenticated key agreement between clients with different passwords scheme, ISO\/IEC JTC 1\/SC27 N3716"},{"issue":"4","key":"2_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/219282.219298","volume":"29","author":"Y. Ding","year":"1995","unstructured":"Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. ACM Operating Systems Review\u00a029(4), 77\u201386 (1995)","journal-title":"ACM Operating Systems Review"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/3-540-44647-8_24","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O., Lindell, Y.: Session-key generation using human passwords only. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 408\u2013432. Springer, Heidelberg (2001)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Gu, D., Ly, H., Hong, X., Gerla, M., Pei, G., Lee, Y.: C-ICAMA: A Centralized Intelligent Channel Assigned Multiple Access for Multi-layer Ad-hoc Wireless Networks with UAVs. In: Proceedings of IEEE WCNS 2000, pp. 879\u2013884 (2000)","DOI":"10.1109\/WCNC.2000.903973"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Gu, D., Pei, G., Ly, H., Gerla, M., Hong, X.: Hierarchical Routing for Multi-layer Ad-hoc Wireless Networks with UAVs. In: Proceedings of IEEE MILCOM 2000, pp. 310\u2013314 (2000)","DOI":"10.1109\/MILCOM.2000.904964"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Gu, D., Pei, G., Ly, H., Gerla, M., Zhang, B., Hong, X.: UAV-aided Intelligent Routing for Ad-hoc Wireless Network in Single-area Theater. In: Proceedings of IEEE WCNS 2000, pp. 1220\u20131225 (2000)","DOI":"10.1109\/WCNC.2000.904805"},{"key":"2_CR19","first-page":"63","volume-title":"Proceedings ACM Conference on Computer and Communications Security","author":"S. Halevi","year":"1999","unstructured":"Halevi, S., Krawczyk, H.: Public-key cryptography and password protcols. In: Proceedings ACM Conference on Computer and Communications Security, pp. 63\u201372. ACM Press, New York (1999)"},{"issue":"5","key":"2_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. Computer Communication Review\u00a026(5), 5\u201326 (1996)","journal-title":"Computer Communication Review"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/3-540-44987-6_29","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Katz","year":"2001","unstructured":"Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 475\u2013494. Springer, Heidelberg (2001)"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of 7th ACM CCS 2000, pp. 235\u2013244 (2000)","DOI":"10.1145\/352600.352638"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1007\/978-3-540-24707-4_102","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"J. Kim","year":"2004","unstructured":"Kim, J., Kim, S., Kwak, J., Won, D.: Cryptoanalysis and improvements of password authenticated key exchange scheme between clients with different passwords. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03044, p. 895. Springer, Heidelberg (2004)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Lucks, S.: Open key exchange: how to defeat dictionary attacks without encryting public keys. In: Proceedings of the security protocol workshop 1997, pp. 79\u201390 (1997)","DOI":"10.1007\/BFb0028161"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/11496137_3","volume-title":"Applied Cryptography and Network Security","author":"R.C.-W. Phan","year":"2005","unstructured":"Phan, R.C.-W., Goi, B.: Cryptanalysis of an Improved Client-to-Client Password-authenticated Key Exchange (C2C-PAKE) Scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 33\u201339. Springer, Heidelberg (2005)"},{"key":"2_CR26","first-page":"415","volume":"21","author":"K. Rhee","year":"2005","unstructured":"Rhee, K., Park, Y., Tsudik, G.: A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. Jornal of information science and engineering\u00a021, 415\u2013428 (2005)","journal-title":"Jornal of information science and engineering"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/3-540-44647-8_15","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"V. Shoup","year":"2001","unstructured":"Shoup, V.: OAEP reconsidered. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 239\u2013259. Springer, Heidelberg (2001)"},{"key":"2_CR28","unstructured":"Tang, Q., Chen, L.: Weaknesses in two group Diffie-Hellman Key Exchange Protocols, Cryptology ePrint Archive 2005\/197 (2005)"},{"key":"2_CR29","unstructured":"Wu, T.: Secure remote password protocol. In: In proceedings of the Internet Society Network and Distributed System Security Symposium, pp. 97\u2013111 (1998)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T03:40:12Z","timestamp":1555472412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/11734666_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}