{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:26:35Z","timestamp":1725891995778},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540462552"},{"type":"electronic","value":"9783540462569"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11889663_2","type":"book-chapter","created":{"date-parts":[[2006,10,9]],"date-time":"2006-10-09T10:12:37Z","timestamp":1160388757000},"page":"20-35","source":"Crossref","is-referenced-by-count":12,"title":["A Protocol for Secure Public Instant Messaging"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Mannan","sequence":"first","affiliation":[]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A. Armando","year":"2005","unstructured":"Armando, A., et al.: The AVISPA tool for the automated validation of Internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, Springer, Heidelberg (2005). Project website, http:\/\/www.avispa-project.org"},{"key":"2_CR2","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security \u2013 ESORICS 2004","author":"R. Battistoni","year":"2004","unstructured":"Battistoni, R., Gabrielli, E., Mancini, L.V.: A host intrusion prevention system for Windows operating systems. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Provably secure session key distribution: the three party case. In: ACM Symposium on Theory of Computing (STOC 1995) (1995)","key":"2_CR3","DOI":"10.1145\/225058.225084"},{"doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Encrypted Key Exchange: Password-based protocols secure against dictionary attacks. In: IEEE Symp. on Security and Privacy (1992)","key":"2_CR4","DOI":"10.1109\/RISP.1992.213269"},{"doi-asserted-by":"crossref","unstructured":"Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use PGP. In: ACM Workshop on Privacy in the Electronic Society (2004)","key":"2_CR5","DOI":"10.1145\/1029179.1029200"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"C. Boyd","year":"1994","unstructured":"Boyd, C., Mao, W.: On a limitation of BAN logic. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, Springer, Heidelberg (1994)"},{"doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. In: ACM Symposium on Operating Systems Principles (1989)","key":"2_CR7","DOI":"10.1145\/74850.74852"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSPEC.2002.1045569","volume":"39","author":"S.M. Cherry","year":"2002","unstructured":"Cherry, S.M.: IM means business. IEEE Spectrum Online\u00a039, 28\u201332 (2002)","journal-title":"IEEE Spectrum Online"},{"unstructured":"ComputerWorld staff. Instant Messaging takes financial twist, News article (April 2002), http:\/\/www.computerworld.com\/","key":"2_CR9"},{"issue":"8","key":"2_CR10","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D.E. Denning","year":"1981","unstructured":"Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Comm. ACM\u00a024(8), 533\u2013536 (1981)","journal-title":"Comm. ACM"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49116-3_47","volume-title":"STACS 99","author":"G. Crescenzo Di","year":"1999","unstructured":"Di Crescenzo, G., Ferguson, N., Impagliazzo, R., Jakobsson, M.: How to forget a secret (extended abstract). In: Meinel, C., Tison, S. (eds.) STACS 1999. LNCS, vol.\u00a01563, Springer, Heidelberg (1999)"},{"issue":"2","key":"2_CR12","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography\u00a02(2), 107\u2013125 (1992)","journal-title":"Designs, Codes and Cryptography"},{"doi-asserted-by":"crossref","unstructured":"Gong, L., Lomas, M.A., Needham, R.M., Saltzer, J.H.: Protecting poorly chosen secrets from guessing attacks. IEEE Selected Areas in Comm.\u00a011(5) (1993)","key":"2_CR13","DOI":"10.1109\/49.223865"},{"issue":"3","key":"2_CR14","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1145\/322510.322514","volume":"2","author":"S. Halevi","year":"1999","unstructured":"Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. ACM Transactions on Information and Systems Security\u00a02(3), 230\u2013268 (1999)","journal-title":"ACM Transactions on Information and Systems Security"},{"unstructured":"IT Strategy Center Staff. The coming IM threat, News article (May 2005), http:\/\/www.itstrategycenter.com\/itworld\/Threat\/viruses\/coming_im_threat","key":"2_CR15"},{"doi-asserted-by":"crossref","unstructured":"Kikuchi, H., Tada, M., Nakanishi, S.: Secure Instant Messaging protocol preserving confidentiality against administrator. In: Advanced Information Networking and Applications (AINA 2004) (2004)","key":"2_CR16","DOI":"10.1109\/AINA.2004.1283749"},{"doi-asserted-by":"crossref","unstructured":"Koblitz, N., Menezes, A.: Another look at provable security. Journal of Cryptology (to appear, 2006)","key":"2_CR17","DOI":"10.1007\/11941378_12"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30144-8_1","volume-title":"Information Security","author":"T. Kwon","year":"2004","unstructured":"Kwon, T.: Practical authenticated key agreement using passwords. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography\u00a028(2) (2003)","key":"2_CR19","DOI":"10.1023\/A:1022595222606"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44448-3_46","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"P.D. MacKenzie","year":"2000","unstructured":"MacKenzie, P.D., Patel, S., Swaminathan, R.: Password-authenticated key exchange based on RSA. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, Springer, Heidelberg (2000)"},{"unstructured":"Mannan, M., van Oorschot, P.C.: Secure public Instant Messaging: A survey. In: Privacy, Security and Trust (PST 2004) (2004)","key":"2_CR21"},{"doi-asserted-by":"crossref","unstructured":"Mannan, M., van Oorschot, P.C.: On Instant Messaging worms, analysis and countermeasures. In: ACM Workshop on Rapid Malcode (WORM 2005) (2005)","key":"2_CR22","DOI":"10.1145\/1103626.1103629"},{"doi-asserted-by":"crossref","unstructured":"Mannan, M., van Oorschot, P.C.: A protocol for secure public Instant Messaging (extended version). Technical Report TR-06-01 (January 2006)","key":"2_CR23","DOI":"10.1007\/11889663_2"},{"key":"2_CR24","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"unstructured":"Open Source. Gaim-e, http:\/\/gaim-e.sourceforge.net\/","key":"2_CR25"},{"doi-asserted-by":"crossref","unstructured":"Padmanabhan, V.N., Subramanian, L.: An investigation of geographic mapping techniques for Internet hosts. ACM Computer Comm. Review\u00a031(4) (2001)","key":"2_CR26","DOI":"10.1145\/964723.383073"},{"doi-asserted-by":"crossref","unstructured":"Pinkas, B., Sander, T.: Securing passwords against dictionary attacks. In: ACM Computer and Communications Security (2002)","key":"2_CR27","DOI":"10.1145\/586110.586133"},{"unstructured":"Riikonen, P.: Secure Internet Live Conferencing (SILC), protocol specification, Internet-Draft (February 2004), http:\/\/www.silcnet.org\/docs\/draft-riikonen-silc-spec-08.txt","key":"2_CR28"},{"issue":"4","key":"2_CR29","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1145\/358027.358053","volume":"27","author":"R.L. Rivest","year":"1984","unstructured":"Rivest, R.L., Shamir, A.: How to expose an eavesdropper. Comm. ACM\u00a027(4), 393\u2013394 (1984)","journal-title":"Comm. ACM"},{"doi-asserted-by":"crossref","unstructured":"Saint-Andre, P.: Extensible messaging and presence protocol (XMPP): Core, RFC 3920, Status: Standards Track (October 2004), http:\/\/www.ietf.org\/rfc\/rfc3920.txt","key":"2_CR30","DOI":"10.17487\/rfc3920"},{"unstructured":"SecurityPark.net Staff. Instant messaging: communications godsend or security back door (July 2005), new article http:\/\/www.securitypark.co.uk\/","key":"2_CR31"},{"key":"2_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48390-X_9","volume-title":"Financial Cryptography","author":"A. Shamir","year":"1999","unstructured":"Shamir, A., van Someren, N.: Playing hide and seek with stored keys. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11889663_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T11:06:44Z","timestamp":1555844804000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11889663_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540462552","9783540462569"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/11889663_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}