{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:29:24Z","timestamp":1725564564336},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340775"},{"type":"electronic","value":"9783540340782"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751632_43","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T11:00:57Z","timestamp":1147345257000},"page":"396-405","source":"Crossref","is-referenced-by-count":3,"title":["Efficient User Authentication and Key Agreement in Ubiquitous Computing"],"prefix":"10.1007","author":[{"given":"Wen-Shenq","family":"Juang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Encrypted key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72\u201384 (1992)","key":"43_CR1","DOI":"10.1109\/RISP.1992.213269"},{"doi-asserted-by":"crossref","unstructured":"Borriello, G.: Key Challenges in Communication for Ubiquitous Computing. IEEE Communications Magazine, 16\u201318 (May 2002)","key":"43_CR2","DOI":"10.1109\/MCOM.2002.1006967"},{"issue":"1","key":"43_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Trans. on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Trans. on Computer Systems"},{"issue":"6","key":"43_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"43_CR5","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.cose.2005.03.006","volume":"24","author":"C. Fan","year":"2005","unstructured":"Fan, C., Chan, Y., Zhang, Z.: Robust Remote Authentication Scheme with Smart Cards. Computers & Security\u00a024, 619\u2013628 (2005)","journal-title":"Computers & Security"},{"issue":"5","key":"43_CR6","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/26.387429","volume":"43","author":"T. Hwang","year":"1995","unstructured":"Hwang, T., Ku, W.: Repairable Key Distribution Protocols for Internet Environments. IEEE Trans. on Communications\u00a043(5), 1947\u20131950 (1995)","journal-title":"IEEE Trans. on Communications"},{"issue":"2","key":"43_CR7","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.cose.2003.11.005","volume":"23","author":"W. Juang","year":"2004","unstructured":"Juang, W.: Efficient Password Authenticated Key Agreement Using Smart Cards. Computers & Security\u00a023(2), 167\u2013173 (2004)","journal-title":"Computers & Security"},{"issue":"1","key":"43_CR8","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"W. Juang","year":"2004","unstructured":"Juang, W.: Efficient Multi-server Password Authenticated Key Agreement Using Smart Cards. IEEE Trans. on Consumer Electronics\u00a050(1), 251\u2013255 (2004)","journal-title":"IEEE Trans. on Consumer Electronics"},{"key":"43_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/11604938_7","volume-title":"Information Security Applications","author":"W. Juang","year":"2006","unstructured":"Juang, W.: A simple and efficient conference scheme for mobile communications. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 81\u201395. Springer, Heidelberg (2006)"},{"issue":"1","key":"43_CR10","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"W. Ku","year":"2004","unstructured":"Ku, W., Chen, S.: Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards. IEEE Trans on Consumer Electronics\u00a050(1), 204\u2013207 (2004)","journal-title":"IEEE Trans on Consumer Electronics"},{"issue":"2","key":"43_CR11","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1109\/TCE.2004.1309433","volume":"50","author":"M. Kumar","year":"2004","unstructured":"Kumar, M.: New Remote User Authentication Scheme Using Smart Cards. IEEE Trans. Consumer Electron\u00a050(2), 597\u2013600 (2004)","journal-title":"IEEE Trans. Consumer Electron"},{"issue":"1","key":"43_CR12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/LCOMM.2005.01032","volume":"9","author":"T. Kwon","year":"2005","unstructured":"Kwon, T., Park, Y., Lee, H.: Security Analysis and Improvement of the Efficient Password-based Authentication Protocol. IEEE Commun. Letters\u00a09(1), 93\u201395 (2005)","journal-title":"IEEE Commun. Letters"},{"key":"43_CR13","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM\u00a024, 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"43_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-540-40061-5_4","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"A. Lenstra","year":"2003","unstructured":"Lenstra, A., Tromer, E., Shamir, A., Kortsmit, W., Dodson, B., Hughes, J., Leyland, P.: Factoring estimates for a 1024-bit RSA modulus. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 55\u201374. Springer, Heidelberg (2003)"},{"key":"43_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 428\u2013446. Springer, Heidelberg (1990)"},{"unstructured":"NIST FIPS PUB 197, \u201cAnnouncing the ADVANCED ENCRYPTION STANDARD(AES),\u201d National Institute of Standards and Technology, U. S. Department of Commerce (November 2001)","key":"43_CR16"},{"unstructured":"NIST FIPS PUB 180-2, \u201cSecure Hash Standard,\u201d National Institute of Standards and Technology, U. S. Department of Commerce, DRAFT (2004)","key":"43_CR17"},{"key":"43_CR18","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1049\/el:19990724","volume":"35","author":"D. Seo","year":"1999","unstructured":"Seo, D., Sweeney, P.: Simple Authenticated Key Agreement Algorithm. Electronics Letters\u00a035, 1073\u20131074 (1999)","journal-title":"Electronics Letters"},{"issue":"4","key":"43_CR19","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H. Sun","year":"2000","unstructured":"Sun, H.: An Efficient User Authentication Scheme Using Smart Cards. IEEE Trans. Consumer Electron\u00a046(4), 958\u2013961 (2000)","journal-title":"IEEE Trans. Consumer Electron"},{"doi-asserted-by":"crossref","unstructured":"Syverson, P.: A Taxonomy of Replay Attacks. In: Proc. of Computer Security Foundations Workshop VII, pp. 187\u2013191 (1994)","key":"43_CR20","DOI":"10.1109\/CSFW.1994.315935"},{"issue":"7","key":"43_CR21","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/159544.159617","volume":"36","author":"M. Weiser","year":"1993","unstructured":"Weiser, M.: Some Computer Science Problems in Ubiquitous Computing. Communications of the ACM\u00a036(7), 75\u201384 (1993)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Wen, H., Lin, C., Hwang, T.: Provably Secure Authenticated Key Exchange Protocols for Low Power Computing Clients. Computers & Security (2006) (in press)","key":"43_CR22","DOI":"10.1016\/j.cose.2005.09.010"},{"key":"43_CR23","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.cose.2004.02.006","volume":"23","author":"C. Yang","year":"2004","unstructured":"Yang, C., Wang, R.: Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Cards. Computer & Security\u00a023, 425\u2013427 (2004)","journal-title":"Computer & Security"},{"issue":"8","key":"43_CR24","first-page":"2174","volume":"87","author":"C. Yang","year":"2004","unstructured":"Yang, C., Chang, T., Hwang, M.: Cryptanalysis of Simple Authenticated Key Agreement Protocols. IEICE Trans. Fundamentals\u00a0E87-A(8), 2174\u20132176 (2004)","journal-title":"IEICE Trans. Fundamentals"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751632_43.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:00:52Z","timestamp":1619492452000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751632_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340775","9783540340782"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11751632_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}