{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:52:12Z","timestamp":1725490332554},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405221"},{"type":"electronic","value":"9783540450689"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45068-8_53","type":"book-chapter","created":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T12:29:10Z","timestamp":1188217750000},"page":"281-288","source":"Crossref","is-referenced-by-count":0,"title":["An Improvement of VeriSign\u2019s Key Roaming Service Protocol"],"prefix":"10.1007","author":[{"given":"Jeeyeon","family":"Kim","sequence":"first","affiliation":[]},{"given":"Hyunjo","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Haeryong","family":"Park","sequence":"additional","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,24]]},"reference":[{"key":"53_CR1","unstructured":"Baltimore: Baltimore Roaming. Private Communications (2001)"},{"key":"53_CR2","doi-asserted-by":"crossref","unstructured":"Bellovin S., Merrit M.: Encrypted key exchange: password based protocols secure against dictionary attacks. In Proceedings of the Symposium on Security and Privacy (1992) 72\u201384","DOI":"10.1109\/RISP.1992.213269"},{"key":"53_CR3","unstructured":"Burton S., Kaliski JR.: Server-Assisted Regeneration of a Strong Secret From a Weak Secret. US Patent, US Patent Number 09\/804,460 (2000)"},{"key":"53_CR4","doi-asserted-by":"crossref","unstructured":"Cohen F.: 50 Ways to Attack Your World Wide Web System. Computer Security Institute Annual Conference, Washington DC (1995)","DOI":"10.1016\/1353-4858(96)89770-4"},{"key":"53_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advanced in Cryptology \u2014 Crypto\u201989","author":"Y. Desmedt","year":"1990","unstructured":"Desmedt Y., Frankel Y.: Threshold cryptosystems. Advanced in Cryptology \u2014 Crypto\u201989, Springer-Verlag, LNCS 435 (1990) 307\u2013315"},{"key":"53_CR6","unstructured":"Entrust: The Entrust Roaming Solution. Private Communications (2000)"},{"key":"53_CR7","unstructured":"Felton E., Balfanz D., Dean D., Wallach D.: Web Spoofing: An Internet Con Game. 20th National Information Systems Security Conference, Balimore Maryland (1997) available at http:\/\/www.cs.princeton.edu\/sip\/pub\/spoofing.html"},{"key":"53_CR8","volume-title":"Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","author":"W. Ford","year":"2000","unstructured":"Ford W., Burton S., Kaliski JR.: Server-Assisted Generation of a Strong Secret from a Password. Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, NIST, Gaithersburg MD (2000)"},{"key":"53_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/3-540-48910-X_21","volume-title":"Advanced in Cryptology \u2014 Eurocrypt\u201999","author":"R. Gennaro","year":"1999","unstructured":"Gennaro R., Jarecki S., Krawczyk H., Rabin T.: Secure distributed key generation for discrete-log cryptosystems. Advanced in Cryptology \u2014 Eurocrypt\u201999, Springer-Verlag, LNCS 1592 (1999) 295\u2013310"},{"key":"53_CR10","doi-asserted-by":"crossref","unstructured":"Jablon D.: Strong password-only authenticated exchange. ACM Computer Communications Review, vol 26, No.5 (1996)","DOI":"10.1145\/242896.242897"},{"key":"53_CR11","series-title":"Lect Notes Comput Sci","volume-title":"EUROCRYPT\u201996","author":"P. Oorschot","year":"1996","unstructured":"Oorschot P., Wiener M.J.: On Diffie-Hellman Key Agreement with Short Exponents. EUROCRYPT\u201996, Spriger-Verlag, LNCS 1070 (1996)"},{"key":"53_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1007\/3-540-46416-6_47","volume-title":"Advanced in Cryptology \u2014 Eurocrypt\u201991","author":"T.P. Pedersen","year":"1991","unstructured":"Pedersen T.P.: A threshold cryptosystem without a trusted party. Advanced in Cryptology \u2014 Eurocrypt\u201991, Springer-Verlag, LNCS 547 (1991) 522\u2013526"},{"key":"53_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/3-540-46416-6_20","volume-title":"Advanced in Cryptology \u2014 Eurocrypt\u201991","author":"T.P. Pedersen","year":"1991","unstructured":"Pedersen T.P.: Distributed provers with applications to undeniable signatures. Advanced in Cryptology \u2014 Eurocrypt\u201991, Springer-Verlag, LNCS 547 (1991) 221\u2013238"},{"key":"53_CR14","unstructured":"VeriSign Inc.: Roaming Service Administrator\u2019s Guide. (2002) available at http:\/\/www.verisign.com"},{"key":"53_CR15","unstructured":"VeriSign Inc.: Roaming Service. (2002) available at http:\/\/www.verisign.com\/products\/roaming\/"},{"key":"53_CR16","unstructured":"Wiener M. J.: Secure Roaming with Software Tokens. PKI TWG Meeting (2000) available at http:\/\/csrc.nist.gov\/pki\/twg\/y2000\/presentations\/twg-00-32.pdf"}],"container-title":["Lecture Notes in Computer Science","Web Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45068-8_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T12:39:22Z","timestamp":1556800762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45068-8_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405221","9783540450689"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-45068-8_53","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}