{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:05:17Z","timestamp":1743131117826,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442707"},{"type":"electronic","value":"9783540458111"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45811-5_11","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T05:43:51Z","timestamp":1192772631000},"page":"150-161","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks"],"prefix":"10.1007","author":[{"given":"Feng","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Agnes H.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Robbie","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,5]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In First ACM Conference on Computer and Communications Security, pages 62\u201373, Fairfax, 1993. ACM.","DOI":"10.1145\/168588.168596"},{"key":"11_CR2","unstructured":"S. M. Bellovin and M. Merritt. Encrypted key exchange: Password based protocols secure against dictionary attacks. In Proceedings 1992 IEEE Symposium on Research in Security and Privacy, pages 72\u201384. IEEE Computer Society, 1992."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Victor Boyko, Philip MacKenzie, and Sarvar Patel. Provably secure passwordauthenticated key exchange using diffie-hellman. In Proc.EUR OCRYPT 2000, pages 156\u2013171, 2000.","DOI":"10.1007\/3-540-45539-6_12"},{"key":"11_CR4","unstructured":"J. Daemen and V. Rijmen. AES proposal: Rijndael. AES Algorithm Submission, Sep 1999. \nhttp:\/\/www.nist.gov\/aes\n\n."},{"issue":"5","key":"11_CR5","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"L. Gong, M. A. Lomas, R. M. Needham, and J. H. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5):648\u2013656, 1993.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"11_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. P. Jablon","year":"1996","unstructured":"David P. Jablon. Strong password-only authenticated key exchange. Computer Communication Review, ACM, 26(5):5\u201326, 1996.","journal-title":"Computer Communication Review, ACM"},{"key":"11_CR7","series-title":"Lect Notes Comput Sci","volume-title":"Efficient password-authenticated key exchange using human-memorable passwords","author":"J. Katz","year":"2001","unstructured":"Jonathan Katz, Rafail Ostrovsky, and Moti Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Proc.EUR OCRYPT 2001. Springer-Verlag, 2001. Lecture Notes in Computer Science No. 2045."},{"key":"11_CR8","unstructured":"Taekyoung Kwon. Ultimate solution to authentication via memorable password. Contribution to the IEEE P1363 Study Group, May 2000."},{"issue":"165","key":"11_CR9","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1090\/S0025-5718-1984-0726007-1","volume":"42","author":"H. W. Lenstra Jr","year":"1984","unstructured":"H. W. Lenstra, Jr. Divisors in residue classes. Mathematics of Computation, 42(165):331\u2013340, 1984.","journal-title":"Mathematics of Computation"},{"key":"11_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/BFb0028161","volume-title":"Open key exchange: How to defeat dictionary attacks without encrypting public keys","author":"S. Lucks","year":"1998","unstructured":"Stefan Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Proc. of the Security Protocols Workshop, pages 79\u201390, 1997. LNCS 1361."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Philip MacKenzie, Sarvar Patel, and Ram Swaminathan. Password-authenticated key exchange basedon RSA. In Proc. ASIA CRYPT 2000, pages 599\u2013613, 2000.","DOI":"10.1007\/3-540-44448-3_46"},{"key":"11_CR12","unstructured":"Philip MacKenzie and Ram Swaminathan. Secure network authentication with password identification. Submitted to IEEE P1363a, 1999."},{"key":"11_CR13","unstructured":"Duncan S. Wong. On the design andanalysis of authenticated key exchange schemes for low power wireless computing platforms. Ph.D. Thesis, July 2002."},{"key":"11_CR14","unstructured":"Duncan S. Wong, Hector Ho Fuentes, and Agnes H. Chan. The performance measurement of cryptographic primitives on palm devices. In Proc. of the 17th Annual Computer Security Applications Conference, Dec 2001."},{"key":"11_CR15","unstructured":"Thomas Wu. The secure remote password protocol. In 1998 Internet Society Symposium on Network and Distributed System Security, pages 97\u2013111, 1998."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45811-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T18:04:04Z","timestamp":1580148244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45811-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442707","9783540458111"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-45811-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"5 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}