{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:50:11Z","timestamp":1725472211313},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540485636"},{"type":"electronic","value":"9783540485643"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11919568_74","type":"book-chapter","created":{"date-parts":[[2006,11,6]],"date-time":"2006-11-06T13:49:40Z","timestamp":1162820980000},"page":"743-753","source":"Crossref","is-referenced-by-count":1,"title":["Password-Based User Authentication Protocol for Mobile Environment"],"prefix":"10.1007","author":[{"given":"Sung-Won","family":"Moon","sequence":"first","affiliation":[]},{"given":"Young-Gab","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Chang-Joo","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Doo-Kwon","family":"Baik","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. In: Proceedings of the I.E.E.E. Symposium on Research in Security and Privacy, Oakland (May 1992)","key":"74_CR1","DOI":"10.1145\/168588.168618"},{"doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise. In: ACM Conference on Computer and Communications Security (1993)","key":"74_CR2","DOI":"10.1145\/168588.168618"},{"doi-asserted-by":"crossref","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. ACM Computer Communications Review (October 1996)","key":"74_CR3","DOI":"10.1145\/242896.242897"},{"unstructured":"Ford, W., Kaliski, B.: Server-Assisted Generation of a Strong Secret from a Password. In: Proc. 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, IEEE, June 14-16 (2000)","key":"74_CR4"},{"key":"74_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, p. 139. Springer, Heidelberg (2000)"},{"issue":"5","key":"74_CR6","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"Gong, L., Lomas, T.M.A., Needham, R.M., Saltzer, J.H.: Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE Journal on Selected Areas in Communications\u00a011(5), 648\u2013656 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"unstructured":"Perlman, R., Kaufman, C.: Secure Password-Based Protocol for Downloading a Private Key. In: Proc. 01999 Network and Distributed System Security Symposium, Internet Society (January 1999)","key":"74_CR7"},{"key":"74_CR8","series-title":"van Oorschot, P.C., Wiener, M.J","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/3-540-68339-9_29","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"P.C. Oorschot van","year":"1996","unstructured":"van Oorschot, P.C., Wiener, M.J.: On Diffie-Hellman Key Agreement with Short Exponents. In: Maurer, U.M. (ed.) EUROCRYPT 1996. van Oorschot, P.C., Wiener, M.J, vol.\u00a01070, pp. 332\u2013343. Springer, Heidelberg (1996)"},{"doi-asserted-by":"crossref","unstructured":"Jablon, D.P.: Password Authentication Using Multiple Servers. In: The Cryptographers\u2019 Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12 (2001)","key":"74_CR9","DOI":"10.1007\/3-540-45353-9_26"},{"key":"74_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/3-540-45708-9_25","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"P. Mackenzie","year":"2002","unstructured":"Mackenzie, P., Shrimpton, T., Jakobsson, M.: Threshold Password-Authenticated Key Exchange. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 385\u2013400. Springer, Heidelberg (2002)"},{"key":"74_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/3-540-44448-3_46","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"P. Mackenzie","year":"2000","unstructured":"Mackenzie, P., Patel, S., Swaminathan, R.: Password-authenticated key exchange based on RSA. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, p. 599. Springer, Heidelberg (2000)"},{"key":"74_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, Springer, Heidelberg (2000)"},{"key":"74_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/3-540-39200-9_32","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"M. Raimondo Di","year":"2003","unstructured":"Di Raimondo, M., Gennaro, R.: Provably Secure Threshold Password-Authenticated Key Exchange Extended Abstract. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 507\u2013523. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Networking. Advances in Data Communications and Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11919568_74","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T23:18:27Z","timestamp":1558307907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11919568_74"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540485636","9783540485643"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11919568_74","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}