{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:45:52Z","timestamp":1725471952910},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540409298"},{"type":"electronic","value":"9783540409328"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11861201_70","type":"book-chapter","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T06:00:39Z","timestamp":1161151239000},"page":"605-610","source":"Crossref","is-referenced-by-count":1,"title":["Authentication Based on Singular Cellular Automata"],"prefix":"10.1007","author":[{"given":"Jun-Cheol","family":"Jeon","sequence":"first","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"70_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password Authentication with Insecure Communication. Communication of ACM\u00a024, 770\u2013772 (1981)","journal-title":"Communication of ACM"},{"key":"70_CR2","doi-asserted-by":"crossref","unstructured":"Haller, N.: The S\/KEY One-Time Password System. In: Proc. of the ISOC Symposium on Network and Distributed System Security (1994)","DOI":"10.17487\/rfc1760"},{"key":"70_CR3","doi-asserted-by":"crossref","unstructured":"Soh, B., Joy, A.: A Novel Web Security Evaluation Model for a One Time Password System. In: Proc. of the IEEE\/WIC International Conference on Web Intelligence (2003)","DOI":"10.1109\/WI.2003.1241228"},{"key":"70_CR4","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"70_CR5","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"W.C. Ku","year":"2004","unstructured":"Ku, W.C., Chen, S.M.: Weaknesses and Improvement of an Efficient Paword Based Remote User Authentication Scheme Using Smart Cards. IEEE trans. On Consumer electronics\u00a050, 204\u2013207 (2004)","journal-title":"IEEE trans. On Consumer electronics"},{"key":"70_CR6","volume-title":"The theory of self-reproducing automata","author":"J. Neumann Von","year":"1966","unstructured":"Von Neumann, J.: The theory of self-reproducing automata. University of Illinois Press, Urbana, London (1966)"},{"key":"70_CR7","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1111\/j.0824-7935.2004.00248.x","volume":"20","author":"J.C. Jeon","year":"2004","unstructured":"Jeon, J.C., Yoo, K.Y.: Design of Montgomery Multiplication Architecture based on Programmable Cellular Automata. Computational intelligence\u00a020, 495\u2013502 (2004)","journal-title":"Computational intelligence"},{"key":"70_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-30141-7_58","volume-title":"Network and Parallel Computing","author":"M. Seredynski","year":"2004","unstructured":"Seredynski, M., Pienkosz, K., Bouvry, P.: Reversible Cellular Automata Based Encryption. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol.\u00a03222, pp. 411\u2013418. Springer, Heidelberg (2004)"},{"key":"70_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/978-3-540-30479-1_84","volume-title":"Cellular Automata","author":"S. Das","year":"2004","unstructured":"Das, S., Sikdar, B.K., Pal Chaudhuri, P.: Charaterization of Reachable \/ Nonreachable Cellular Automata States. In: Sloot, P.M.A., Chopard, B., Hoekstra, A.G. (eds.) ACRI 2004. LNCS, vol.\u00a03305, pp. 813\u2013822. Springer, Heidelberg (2004)"},{"key":"70_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1049\/ip-cdt:19971518","volume":"144","author":"C.K. Koc","year":"1997","unstructured":"Koc, C.K., Apohan, A.M.: Inversion of cellular automata iterations. IEE Proc. Comput. Digit. Tech.\u00a0144, 279\u2013284 (1997)","journal-title":"IEE Proc. Comput. Digit. Tech."},{"key":"70_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1007\/978-3-540-30479-1_81","volume-title":"Cellular Automata","author":"M. Seredynski","year":"2004","unstructured":"Seredynski, M., Bouvry, P.: Block Encryption Using Reversible Cellular Automata. In: Sloot, P.M.A., Chopard, B., Hoekstra, A.G. (eds.) ACRI 2004. LNCS, vol.\u00a03305, pp. 785\u2013792. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Cellular Automata"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11861201_70","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T21:45:08Z","timestamp":1555883108000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11861201_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540409298","9783540409328"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11861201_70","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}