{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:39:20Z","timestamp":1742953160628,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":5,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_79","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:50:23Z","timestamp":1319723423000},"page":"587-588","source":"Crossref","is-referenced-by-count":0,"title":["Identity Verification Protocol"],"prefix":"10.1007","author":[{"given":"Robert","family":"Zuccherato","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"79_CR1_79","volume-title":"Information technology-security techniques-entity authentication-Part 2: mechanisms using symmetric encipherment algorithms","author":"ISO\/IEC 9798-2","year":"1999","unstructured":"ISO\/IEC 9798-2 (1999) Information technology-security techniques-entity authentication-Part 2: mechanisms using symmetric encipherment algorithms"},{"key":"79_CR2_79","volume-title":"Information technology-security techniques-entity authentication-Part 3: entity authentication using digital signature techniques","author":"ISO\/IEC 9798-3","year":"1998","unstructured":"ISO\/IEC 9798-3 (1998) Information technology-security techniques-entity authentication-Part 3: entity authentication using digital signature techniques"},{"key":"79_CR3_79","volume-title":"Federal Information Processing Standards Publication 196","author":"FIPS 196","year":"1997","unstructured":"FIPS 196 (1997) Entity authentication using public key cryptography. Federal Information Processing Standards Publication 196, U.S. Department of Commerce\/NIST, National Technical Information Service, Springfield, Virginia"},{"key":"79_CR4_79","volume-title":"The Transport Layer Security (TLS) Protocol\u00a0\u2013 Version 1.2","author":"T Dierks","year":"2008","unstructured":"Dierks T, Rescorla E (2008) The Transport Layer Security (TLS) Protocol\u00a0\u2013 Version 1.2. RFC\u00a05246"},{"key":"79_CR5_79","doi-asserted-by":"crossref","unstructured":"Guillou LC, J.-J. Quisquater (1988) A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: G\u00fcnther CG (ed) Advances in Cryptology\u00a0\u2013 EUROCRYPT\u201988, pp 123\u2013128. Lect Notes in Computer Science, vol 330. Springer, Berlin","DOI":"10.1007\/3-540-45961-8_11"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_79","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:42:28Z","timestamp":1591058548000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_79"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_79","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}