{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:45:08Z","timestamp":1725489908433},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_22","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T03:42:01Z","timestamp":1187149321000},"page":"201-209","source":"Crossref","is-referenced-by-count":1,"title":["An Improved Password Authentication Key Exchange Protocol for 802.11 Environment"],"prefix":"10.1007","author":[{"given":"Su Jung","family":"Yu","sequence":"first","affiliation":[]},{"given":"Joo Seok","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"22_CR1","unstructured":"Whitepaper: Security for Next Generation Wireless LANs, http:\/\/www.cisco.com\/warp\/public\/cc\/pd\/witc\/ao350ap\/prodlit\/a350w-ov.htm"},{"key":"22_CR2","unstructured":"IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std 802.1x-2001 (2001)"},{"key":"22_CR3","unstructured":"IEEE 802.1X http:\/\/grouper.ieee.org\/groups\/802\/1\/pages\/802.1x.html"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"S. M. Bellovin and M. Merrit: Encrypted key exchange: Password-based protocols secure against dictionary attacks, In Proceedings of the IEEE Symposium on Research in security and Privacy (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"22_CR5","unstructured":"J. Vollbrecht: White Paper:Wireless LAN Access Control and Authentication, Interlink Networks, Inc"},{"key":"22_CR6","unstructured":"IEEE Wireless Standards http:\/\/standards.ieee.org\/wireless\/"},{"key":"22_CR7","unstructured":"EAP: http:\/\/www.ietf.org\/rfc\/rfc2284.txt , http:\/\/www.ietf.org\/rfc\/rfc2716.txt"},{"key":"22_CR8","unstructured":"Microsoft EAP-TLS Support: http:\/\/www.microsoft.com\/HWDEV\/TECH\/network\/wireless\/IEEE802Net.asp , http:\/\/www.microsoft.com\/HWDEV\/TECH\/network\/802x\/default.asp"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"T. Wu: The SRP Authentication and Key Exchange System, RFC 2945 (2000)","DOI":"10.17487\/rfc2945"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"D. P. Jablon: Strong Password-only Authenticated Key Exchange, ACM SIGCOMM Computer Communications Review (1996)","DOI":"10.1145\/242896.242897"},{"key":"22_CR11","unstructured":"T. Wu: The Secure Remote Password Protocol, In Proceedings of the Internet Society Symposium on Network and Distributed Systems Security, San Diego, CA,(1998)97\u2013111"},{"key":"22_CR12","unstructured":"D. Taylor: Using SRP for TLS Authentication, IETF draft-ietf-tls-srp-01.txt (work in progress)(2001)"},{"key":"22_CR13","unstructured":"D. Jablon: The SPEKE Password-Based Key Agreement Methods,IETF draft-jablon-speke-00.txt(2002)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T22:14:09Z","timestamp":1556748849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-44843-8_22","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}