{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:16:51Z","timestamp":1763810211093,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030410247"},{"type":"electronic","value":"9783030410254"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41025-4_1","type":"book-chapter","created":{"date-parts":[[2020,2,27]],"date-time":"2020-02-27T14:03:38Z","timestamp":1582812218000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Authenticated Key Distribution: When the Coupon Collector is Your Enemy"],"prefix":"10.1007","author":[{"given":"Marc","family":"Beunardeau","sequence":"first","affiliation":[]},{"given":"Fatima-Ezzahra","family":"El Orche","sequence":"additional","affiliation":[]},{"given":"Diana","family":"Maimu\u0163","sequence":"additional","affiliation":[]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[]},{"given":"Peter B.","family":"R\u00f8nne","sequence":"additional","affiliation":[]},{"given":"Peter Y. A.","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,28]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-030-29962-0_22","volume-title":"Computer Security \u2013 ESORICS 2019","author":"G Avoine","year":"2019","unstructured":"Avoine, G., Canard, S., Ferreira, L.: IoT-Friendly AKE: forward secrecy and session resumption meet symmetric-key cryptography. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 463\u2013483. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-29962-0_22"},{"key":"1_CR2","unstructured":"Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution (1993). \nhttp:\/\/cseweb.ucsd.edu\/~mihir\/papers\/eakd.pdf\n\n, full version"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS 1993, pp. 62\u201373. ACM (1993)","DOI":"10.1145\/168588.168596"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology \u2014 CRYPTO 93","author":"M Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232\u2013249. Springer, Heidelberg (1994). \nhttps:\/\/doi.org\/10.1007\/3-540-48329-2_21"},{"issue":"6","key":"1_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"1_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.spl.2007.05.011","volume":"78","author":"B Eisenberg","year":"2008","unstructured":"Eisenberg, B.: On the expectation of the maximum of IID geometric random variables. Stat. Probab. Lett. 78(2), 135\u2013143 (2008)","journal-title":"Stat. Probab. Lett."},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/302350.302359","volume":"32","author":"M Joye","year":"1998","unstructured":"Joye, M., Yen, S.M.: ID-based secret-key cryptography. SIGOPS Oper. Syst. Rev. 32(4), 33\u201339 (1998)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"12","key":"1_CR8","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"issue":"9","key":"1_CR9","doi-asserted-by":"publisher","first-page":"3353","DOI":"10.1109\/TWC.2007.06067","volume":"6","author":"M Sharif","year":"2007","unstructured":"Sharif, M., Hassibi, B.: Delay considerations for opportunistic scheduling in broadcast fading channels. IEEE Trans. Wirel. Commun. 6(9), 3353\u20133363 (2007)","journal-title":"IEEE Trans. Wirel. Commun."}],"container-title":["Lecture Notes in Computer Science","Innovative Security Solutions for Information Technology and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41025-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T00:15:53Z","timestamp":1582848953000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41025-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030410247","9783030410254"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41025-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"28 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}