{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:48:16Z","timestamp":1773082096823,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540418986","type":"print"},{"value":"9783540453536","type":"electronic"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45353-9_26","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T15:50:02Z","timestamp":1184601002000},"page":"344-360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["Password Authentication Using Multiple Servers"],"prefix":"10.1007","author":[{"given":"David P.","family":"Jablon","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2001,4,2]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"S. Bellovin and M. Merritt, Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks, Proc. IEEE Symposium on Research in Security and Privacy, May 1992.","DOI":"10.1145\/168588.168618"},{"key":"26_CR2","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"V. Boyko, P. MacKenzie and S. Patel, Provably Secure Password Authenticated Key Exchange Using Die-Hellman, Advances in Cryptology \u2014 EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, May 2000."},{"key":"26_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"M. Bellare, D. Pointcheval and P. Rogaway, Authenticated Key Exchange Secure Against Dictionary Attack, Advances in Cryptology \u2014 EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, pp. 139\u2013155, Springer-Verlag, May 2000."},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"M. K. Boyarsky, Public-Key Cryptography and Password Protocols: The Multi-User Case, Proc. 6th ACMConference on Computer and Communications Security, November 1\u20134, 1999, Singapore.","DOI":"10.1145\/319709.319719"},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"D. Chaum, Security without Identification: Transaction Systems to Make Big Brother Obsolete, Communications of the ACM, 28 (1985), 1030\u20131044.","journal-title":"Communications of the ACM"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Cohen, F., 50 Ways to Attack Your World Wide Web System, Computer Security Institute Annual Conference, Washington, DC, October 1995.","DOI":"10.1016\/1353-4858(96)89770-4"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"T. Dierks and C. Allen, The TLS Protocol Version 1.0, IETF RFC 2246, http:\/\/www.ietf.org\/rfc\/rfc2246.txt , Internet Activities Board, January 1999.","DOI":"10.17487\/rfc2246"},{"key":"26_CR8","unstructured":"E. Felton, D. Balfanz, D. Dean and D. Wallach, Web Spoofing: An Internet Con Game, 20th National Information Systems Security Conference, Oct. 7\u201310, 1997, Baltimore, Maryland, http:\/\/www.cs.princeton.edu\/sip\/pub\/spoofing.html ."},{"key":"26_CR9","unstructured":"FIPS 186, Digital Signature Standard (DSS), NIST, 19 May 1994."},{"key":"26_CR10","unstructured":"FIPS 180-1, Secure Hash Standard (SHA), NIST, 11 July 1994."},{"key":"26_CR11","unstructured":"W. Ford and B. Kaliski, Server-Assisted Generation of a Strong Secret from a Password, Proc. 9th InternationalWorkshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, IEEE, June 14\u201316, 2000."},{"key":"26_CR12","unstructured":"A. Frier, P. Karlton, and P. Kocher, The SSL 3.0 Protocol, Netscape Communications Corp., Nov 18, 1996."},{"issue":"5","key":"26_CR13","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"L. Gong, T.M.A. Lomas, R.M. Needham, and J.H. Saltzer, Protecting Poorly Chosen Secrets from Guessing Attacks, IEEE Journal on Selected Areas in Communications, vol.11, no.5, June 1993, pp. 648\u2013656.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"26_CR14","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1109\/49.223866","volume":"11","author":"L. Gong","year":"1993","unstructured":"L. Gong, Increasing Availability and Security of an Authentication Service, IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, June 1993, pp. 657\u2013662.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"L. Gong, Optimal Authentication Protocols Resistant to Password Guessing Attacks, Proc. 8th IEEE Computer Security Foundations Workshop, Ireland, June 13, 1995, pp. 24\u201329.","DOI":"10.1109\/CSFW.1995.518549"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"S. Halevi and H. Krawczyk, Public-Key Cryptography and Password Protocols, Proc. Fifth ACM Conference on Computer and Communications Security, 1998.","DOI":"10.1145\/288090.288118"},{"key":"26_CR17","unstructured":"IEEE Std 1363-2000, IEEE Standard Specifications for Public-Key Cryptography, IEEE, August 29, 2000, A.11.1, p. 131."},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"D. Jablon, Strong Password-Only Authenticated Key Exchange, ACM Computer Communications Review, October 1996, http:\/\/www.IntegritySciences.com\/links.html#Jab96 .","DOI":"10.1145\/242896.242897"},{"key":"26_CR19","unstructured":"D. Jablon, Extended Password Protocols Immune to Dictionary Attack, Proc. 6th Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Enterprise Security Workshop, IEEE, June 1997, http:\/\/www.IntegritySciences.com\/links.html#Jab97 ."},{"key":"26_CR20","unstructured":"C. Kaufman, R. Perlman, M. Speciner, Network Security: Private Communication in a Public World, Prentice-Hall, 1995, Chapter 8: Authentication of People, p. 205, 3rd paragraph."},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"S. Lucks, Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys, The Security Protocol Workshop\u2019 97Ecole Normale Superieure, April 7\u20139, 1997.","DOI":"10.1007\/BFb0028161"},{"key":"26_CR22","unstructured":"P. MacKenzie and R. Swaminathan, Secure Network Authentication with Password Identification, submission to IEEE P1363 working group, http:\/\/grouper.ieee.org\/groups\/1363\/ , July 30, 1999."},{"key":"26_CR23","unstructured":"R. Perlman and C. Kaufman, Secure Password-Based Protocol for Downloading a Private Key, Proc. 1999 Network and Distributed System Security Symposium, Internet Society, January 1999."},{"key":"26_CR24","unstructured":"J. Tardo and K. Alagappan, SPX: Global Authentication Using Public Key Certificates, Proc. 1991 IEEE Computer Society Symposium on Security and Privacy, 1991, pp. 232\u2013244."},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"P. C. van Oorschot, M. J. Wiener, On Diffe-Hellman Key Agreement with Short Exponents, Proceedings of Eurocrypt 96, Springer-Verlag, May 1996.","DOI":"10.1007\/3-540-68339-9_29"},{"key":"26_CR26","unstructured":"T. Wu, The Secure Remote Password Protocol, Proc. 1998 Network and Distributed System Security Symposium, Internet Society, January 1998, pp. 97\u2013111."}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2014 CT-RSA 2001"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45353-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,19]],"date-time":"2025-01-19T11:40:22Z","timestamp":1737286822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45353-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540418986","9783540453536"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/3-540-45353-9_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"2 April 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}