{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:57:58Z","timestamp":1772283478911,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540611868","type":"print"},{"value":"9783540683391","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1996]]},"DOI":"10.1007\/3-540-68339-9_28","type":"book-chapter","created":{"date-parts":[[2007,8,5]],"date-time":"2007-08-05T21:31:14Z","timestamp":1186349474000},"page":"321-331","source":"Crossref","is-referenced-by-count":32,"title":["Session Key Distribution Using Smart Cards"],"prefix":"10.1007","author":[{"given":"Victor","family":"Shoup","sequence":"first","affiliation":[]},{"given":"Avi","family":"Rubin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Provably secure session key distribution\u2014the three party case. In 27th Annual ACM Symposium on Theory of Computing, pages 57\u201366, 1995.","DOI":"10.1145\/225058.225084"},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the ACM, 33:210\u2013217, 1986.","journal-title":"Journal of the ACM"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"T. Leighton and S. Micali. Secret-key agreement without public-key cryptography. In Advances in Cryptology-Crypto\u2019 93, pages 456\u2013479, 1993.","DOI":"10.1007\/3-540-48329-2_39"},{"key":"28_CR4","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21:993\u2013999, 1978.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201996"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-68339-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T15:32:50Z","timestamp":1556724770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-68339-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996]]},"ISBN":["9783540611868","9783540683391"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/3-540-68339-9_28","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1996]]}}}