{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:27:27Z","timestamp":1725488847207},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442554"},{"type":"electronic","value":"9783540458012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45801-8_36","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T11:19:58Z","timestamp":1186831198000},"page":"375-380","source":"Crossref","is-referenced-by-count":0,"title":["An Improved ID-Based Authentication and Key Distribution Protocol"],"prefix":"10.1007","author":[{"given":"Wei-Chi","family":"Ku","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,13]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/4234.585805","volume":"1","author":"S.-P. Shieh","year":"1997","unstructured":"Shieh, S.-P., Yang, W.-H., Sun, H.-M.: An Authentication Protocol without Trusted Third Party. IEEE Commun. Lett., Vol. 1 (1997) 87\u201389","journal-title":"IEEE Commun. Lett."},{"key":"36_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Commun. ACM, Vol. 21 (1978) 120\u2013126","journal-title":"Commun. ACM"},{"key":"36_CR3","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/4234.740113","volume":"3","author":"S.-M. Yen","year":"1999","unstructured":"Yen, S.-M.: Cryptanalysis of An Authentication and Key Distribution Protocol. IEEE Commun. Lett., Vol. 3 (1999) 7\u20138","journal-title":"IEEE Commun. Lett."},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication. IETF RFC 2104 (1997)","DOI":"10.17487\/rfc2104"}],"container-title":["Lecture Notes in Computer Science","Information Networking: Wireless Communications Technologies and Network Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45801-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:33:28Z","timestamp":1556739208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45801-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442554","9783540458012"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-45801-8_36","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}