{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:19:45Z","timestamp":1737436785450,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_15","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"194-208","source":"Crossref","is-referenced-by-count":3,"title":["Classification of Authentication Protocols: A Practical Approach"],"prefix":"10.1007","author":[{"given":"DongGook","family":"Park","sequence":"first","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]},{"given":"Ed","family":"TDawson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Martin Abadi and Roger Needham, \u201cPrudent Engineering Practice for Cryptographic Protocols\u201d, IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1994.","DOI":"10.1109\/RISP.1994.296587"},{"key":"15_CR2","unstructured":"ASPeCT, Initial Report on Security Requirements, AC095\/ATEA\/W21\/DS\/P\/02\/B, February 1996."},{"key":"15_CR3","unstructured":"C. Boyd and D. Park, \u201cPublic Key Protocols for Wireless Communications\u201d, ICISC\u201998, Korea, December 1998, pp. 47\u201357."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi, and R. Needham, \u201cA logic of authentication\u201d, DEC Systems Research Center, Report 39, revised February 22, 1990.","DOI":"10.1145\/74850.74852"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"D. Gollmann, \u201cWhat do we mean by entity authentication\u201d, 1994 IEEE Symposium on Research in Security and Privacy, pp.46\u201354.","DOI":"10.1109\/SECPRI.1996.502668"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1049\/el:19980242","volume":"34","author":"G. Horng","year":"1998","unstructured":"G. Horng and C.-K. Hsu, \u201cWeakness in the Helsinki protocol\u201d, Electronic Letters, 34, 1998, pp.354\u2013355.","journal-title":"Electronic Letters"},{"key":"15_CR7","unstructured":"International Organization for Standardization, Geneve, Switzerland. ISO\/IEC 2nd DIS 11770-3, Information technology Security techniques Key management; Part 3: Mechanisms using asymmetric techniques, July 1997."},{"key":"15_CR8","unstructured":"ISO\/IEC DIS 11770-3 \u201cInformation Technology-Security techniques-Key management-Part 3: Mechanisms using asymmetric techniques\u201d, 1996"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"G. Lowe, \u201cBreaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR\u201d, Technical Report, PRG, Oxford University, 1995.","DOI":"10.1007\/3-540-61042-1_43"},{"key":"15_CR10","unstructured":"K. M. Martin and C. J. Mitchell, \u201cEvaluation of authentication protocols for mobile environment value-added services\u201d, Submitted, Aug. 1998. Available from http:\/\/isg.rhbnc.ac.uk\/cjm\/Chris_Mitchell.htm ."},{"key":"15_CR11","unstructured":"A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997, p. 492."},{"key":"15_CR12","first-page":"23","volume":"2","author":"C. J. Mitchell","year":"1993","unstructured":"C. J. Mitchell and A. Thomas, \u201cStandardising authentication protocols based on public key techniques\u201d, Journal of Computer Security 2, 1993, pp. 23\u201336.","journal-title":"Journal of Computer Security"},{"issue":"4","key":"15_CR13","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/302350.302356","volume":"32","author":"C. J. Mitchell","year":"1998","unstructured":"C. J. Mitchell and C. Y. Yeun, \u201cFixing a problem in the Helsinki protocol\u201d, ACM Operating Review, 32 no. 4, 1998, pp.21\u201324.","journal-title":"ACM Operating Review"},{"key":"15_CR14","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Roger Needham and Michael Schroeder, \u201cUsing Encryption for Authentication in Large Networks of Computers\u201d, Communications of the ACM, 21, pp.993\u2013999, 1978.","journal-title":"Communications of the ACM"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"C.-S. Park, \u201cOn Certicate-Based Security Protocols for Wireless Mobile Communication Systems\u201d, IEEE Network, September\/October 1997, pp.50\u201355.","DOI":"10.1109\/65.620522"},{"key":"15_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/0-387-34805-0_32","volume-title":"On Key Distributions","author":"Y. Yacobi","year":"1990","unstructured":"Y. Yacobi and Z. Shmuely, \u201cOn Key Distributions\u201d, Advances in Cryptology-CRYPTO\u201989, Proceedings, Lecture Notes in Computer Science, Vol. 435, Springer-Verlag, pages 344\u2013355, 1989."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:07:33Z","timestamp":1737396453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_15","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}