{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:30Z","timestamp":1725551190563},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540664888"},{"type":"electronic","value":"9783540482499"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48249-0_39","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T21:13:11Z","timestamp":1269897191000},"page":"459-467","source":"Crossref","is-referenced-by-count":0,"title":["Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature"],"prefix":"10.1007","author":[{"given":"Sung-Min","family":"Lee","sequence":"first","affiliation":[]},{"given":"Tai-Yun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,14]]},"reference":[{"issue":"12","key":"39_CR1","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. M. Needham","year":"1978","unstructured":"R. M. Needham and M. D. Schroeder, \u201cUsing Encryption for Authentication in Large Networks of Computers,\u201d Communications of the ACM, VOL. 21, NO. 12, pp. 993\u2013999, Dec 1978.","journal-title":"Communications of the ACM"},{"issue":"1","key":"39_CR2","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/24592.24594","volume":"21","author":"D. Otway","year":"1987","unstructured":"D. Otway and O. Rees, \u201cEfficient and Timely Mutual Authentication,\u201d Operating Systems Review, VOL. 21, NO. 1, pp. 8\u201310, 1987.","journal-title":"Operating Systems Review"},{"key":"39_CR3","unstructured":"John T. Kohl, B. Clifford Neuman, and Theodore Y. T\u2019so, \u201cThe Evolution of the Kerberos Authentication System. In Distributed Open Systems,\u201d IEEE Computer Society Press, pp. 78\u201394, 1994."},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"S. M. Bellovin, M. Merritt, \u201cLimitations of the Kerberos Authentication System,\u201d ACM SIGCOMM Computer Communication Review, pp. 119\u2013132, October 1990.","DOI":"10.1145\/381906.381946"},{"issue":"2","key":"39_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/155848.155852","volume":"27","author":"B. C. Neuman","year":"1993","unstructured":"B. Clifford Neuman, Stuart G. Stubblebine, \u201cA Note on the Use of Timestamps as Nonces,\u201d Operating Systems Review, Vol. 27, No. 2, pp. 10\u201314, April 1993.","journal-title":"Operating Systems Review"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"R. Molva, G. Tsudik, E. Van Herreweghen and S. Zatti, \u201cKryptoKnight Authentication and Key Distribution System,\u201d Proceedings of European Symposium on Research in Computer Security, Toulouse, France, Nov 1992.","DOI":"10.1007\/BFb0013897"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"A. Fujioka, T. Okamoto, and S. Miyaguchi, \u201cESIGN: An Efficient Digital Signature Implemenation for Smart Cards,\u201d Advances in Cryptology-EUROCRYPT\u2019 91 Proceedings, pp.446\u2013457, Springer-Verlag, 1991.","DOI":"10.1007\/3-540-46416-6_38"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"M. J. BELLER and Y. YACOBI, \u201cFully-fledged two-way public key authentication and key agreement for low-cost terminals,\u201d Electronics Letters, pp. 999\u20131001, May 1993.","DOI":"10.1049\/el:19930666"},{"key":"39_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/0-387-34805-0_30","volume-title":"Advances in Cryptology: Proc. Crypto\u2019 89","author":"M. Tatebayahi","year":"1990","unstructured":"M. Tatebayahi, N. Matsuzaki, and D. B. Newman Jr., \u201cKey Distribution Protocol for Digital Mobile Communication Systems,\u201d Advances in Cryptology: Proc. Crypto\u2019 89, Lecture Notes in Computer Science 435, pp. 324\u2013333. Springer-Verlag, 1990."},{"issue":"10","key":"39_CR10","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1109\/32.637148","volume":"23","author":"G. Lowe","year":"1997","unstructured":"Gavin Lowe, Bill Roscoe, \u201cUsing CSP to Detect Errors in the TMN Protocol,\u201d IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 23, NO. 10, pp. 659\u2013669, OCTOBER 1997.","journal-title":"IEEE TRANSACTIONS ON SOFTWARE ENGINEERING"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"W. Diffie and M. Hellman, \u201cNew Directions in Cryptography,\u201d IEEE Transactions on Information Theory, November 1976.","DOI":"10.1109\/TIT.1976.1055638"},{"issue":"2","key":"39_CR12","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir and L. Adleman, \u201cA Method for Obtaining Digital Signatures and Public-Key Cryptosystems,\u201d Comm. ACM, Vol. 21, No. 2, pp. 120\u2013126, Feb. 1978.","journal-title":"Comm. ACM"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"D. Naccache, D. M\u2019Raihi, D. Raphaeli, and S. Vaudenay, \u201cCan D.S.A. be Improved? Complexity Trade-Offs with the Digital Signature Standard,\u201d Advances in Cryptology-EUROCRYPT\u2019 93 Proceedings, Springer-Verlag, 1994.","DOI":"10.1007\/BFb0053426"},{"key":"39_CR14","unstructured":"Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, HANDBOOK OF APPLIED CRYPTOGRAPHY, CRC PRESS, 1996."},{"key":"39_CR15","unstructured":"BRUCE SCHNEIER, APPLIED CRYPTOGRAPHY, SECOND EDITION, John Wiley & Sons, Inc., 1996."},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"C. A. R. Hoare, Communicating Sequential Processes, Prentice Hall, 1985.","DOI":"10.1007\/978-3-642-82921-5_4"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48249-0_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T09:54:53Z","timestamp":1685526893000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48249-0_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664888","9783540482499"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-48249-0_39","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}