{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:09Z","timestamp":1747104189334},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540545088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_12","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"169-176","source":"Crossref","is-referenced-by-count":42,"title":["Identification Tokens \u2014 or: Solving The Chess Grandmaster Problem"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Beth","sequence":"first","affiliation":[]},{"given":"Yvo","family":"Desmedt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/3-540-39568-7_39","volume-title":"Advances in Cryptology. Proc. of Crypto\u201984","author":"C. H. Bennett","year":"1985","unstructured":"C. H. Bennett and G. Brassard. An update on quantum cryptography. In Advances in Cryptology. Proc. of Crypto\u201984 (Lecture Notes in Computer Science 196), pp. 475\u2013480. Springer-Verlag, New York, 1985. Santa Barbara, August 1984."},{"key":"12_CR2","volume-title":"On numbers and games","author":"J. H. Conway","year":"1976","unstructured":"J. H. Conway. On numbers and games. Academic Press Inc., London, U.K., 1976."},{"unstructured":"Y. Desmedt. Major security problems with the \u201cunforgeable\u201d (Feige-)Fiat-Shamir proofs of identity and how to overcome them. In Securicom 88, 6th worldwide congress on computer and communications security and protection, pp. 147\u2013159. SEDEP Paris France, March 15\u201317, 1988.","key":"12_CR3"},{"key":"12_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/3-540-48184-2_3","volume-title":"Advances in Cryptology, Proc. of Crypto\u2019 87","author":"Y. Desmedt","year":"1988","unstructured":"Y. Desmedt, C. Goutier, and S. Bengio. Special uses and abuses of the Fiat-Shamir passport protocol. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto\u2019 87 (Lecture Notes in Computer Science 293), pp. 21\u201339. Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16\u201320."},{"unstructured":"A. Einstein. Relativit\u00e4tstheorie. Friedr. Vieweg, Braunschwig, 1916.","key":"12_CR5"},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat, and A. Shamir. Zero knowledge proofs of identity. Journal of Cryptology, 1(2), pp. 77\u201394, 1988.","journal-title":"Journal of Cryptology"},{"key":"12_CR7","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Advances in Cryptology, Proc. of Crypto\u201986","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A. Odlyzko, editor, Advances in Cryptology, Proc. of Crypto\u201986 (Lecture Notes in Computer Science 263), pp. 186\u2013194. Springer-Verlag, 1987. Santa Barbara, California, U. S. A., August 11\u201315."},{"unstructured":"A. Fiat and A. Shamir. Unforgeable proofs of identity. In Securicom 87, pp. 147\u2013153, March 4\u20136, 1987. Paris, France.","key":"12_CR8"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. Siam J. Comput., 18(1), pp. 186\u2013208, February 1989.","journal-title":"Siam J. Comput."},{"doi-asserted-by":"crossref","unstructured":"P. D. Merillat. Secure stand-alone positive personnel identity verification system (ssa-ppiv). Technical Report SAND79-0070, Sandia National Laboratories, March 1979.","key":"12_CR10","DOI":"10.2172\/6448547"},{"key":"12_CR11","first-page":"42","volume":"76","author":"N. F. Ramsey","year":"1988","unstructured":"N. F. Ramsey. Precise measurement of time. American Scientist, 76, pp. 42\u201349, January\u2013February 1988.","journal-title":"American Scientist"},{"issue":"1","key":"12_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/0161-118491858737","volume":"8","author":"G. J. Simmons","year":"1984","unstructured":"G. J. Simmons. A system for verifying user identity and authorization at the point-of sale or access. Cryptologia, 8(1), pp. 1\u201321, January 1984.","journal-title":"Cryptologia"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:20:06Z","timestamp":1619572806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_12","relation":{},"subject":[]}}