{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:03:41Z","timestamp":1742965421475,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_33","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"333-342","source":"Crossref","is-referenced-by-count":2,"title":["A Chain of Attacks and Countermeasures Applied to a Group Key Transfer Protocol"],"prefix":"10.1007","author":[{"given":"Ruxandra F.","family":"Olimid","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"33_CR1","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1109\/TC.2010.40","volume":"59","author":"L. Harn","year":"2010","unstructured":"Harn, L., Lin, C.: Authenticated Group Key Transfer Protocol based on Secret Sharing. IEEE Trans. Comput.\u00a059(6), 842\u2013846 (2010)","journal-title":"IEEE Trans. Comput."},{"key":"33_CR2","unstructured":"Hsu, C., Zeng, B., Cheng, Q., Cui, G.: A novel group key transfer protocol. Cryptology ePrint Archive, Report 2012\/043 (2012)"},{"key":"33_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1007\/978-3-642-38027-3_84","volume-title":"Grid and Pervasive Computing","author":"M. Kim","year":"2013","unstructured":"Kim, M., Park, N., Won, D.: Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing. In: Park, J.J(J.H.), Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) GPC 2013. LNCS, vol.\u00a07861, pp. 761\u2013766. Springer, Heidelberg (2013)"},{"key":"33_CR4","unstructured":"Manulis, M.: Survey on security requirements and models for group key exchange. Technical Report 2006\/02, Horst-G\u00f6rtz Institute, Network and Data Security Group (2008)"},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-642-27142-7_36","volume-title":"Future Generation Information Technology","author":"J. Nam","year":"2011","unstructured":"Nam, J., Kim, M., Paik, J., Jeon, W., Lee, B., Won, D.: Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing. In: Kim, T.-h., Adeli, H., Slezak, D., Sandnes, F.E., Song, X., Chung, K.-i., Arnett, K.P. (eds.) FGIT 2011. LNCS, vol.\u00a07105, pp. 309\u2013315. Springer, Heidelberg (2011)"},{"issue":"4","key":"33_CR6","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.12785\/amis\/070444","volume":"7","author":"R.F. Olimid","year":"2013","unstructured":"Olimid, R.F.: Cryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing. Appl. Math. Inf. Sci.\u00a07(4), 1585\u20131590 (2013)","journal-title":"Appl. Math. Inf. Sci."},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/978-3-642-36818-9_44","volume-title":"Information and Communication Technology","author":"R.F. Olimid","year":"2013","unstructured":"Olimid, R.F.: On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol.\u00a07804, pp. 399\u2013408. Springer, Heidelberg (2013)"},{"key":"33_CR8","unstructured":"Olimid, R.F.: A Chain of Attacks and Countermeasures Applied to a Group Key Transfer Protocol (abstract). Pre-Proceedings of WEWoRC, pp. 27\u201328 (2013)"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Olimid, R.F.: On the Vulnerability of a Group Key Transfer Protocol based on Secret Sharing. To appear in Proceeding of IEEE 9th International Symposium on Applied Computational Intelligence and Informatics (2014)","DOI":"10.1109\/SACI.2014.6840053"},{"issue":"11","key":"33_CR10","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"33_CR11","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.proeng.2011.12.731","volume":"29","author":"Y. Sun","year":"2012","unstructured":"Sun, Y., Wen, Q., Sun, H., Li, W., Jin, Z., Zhang, H.: An Authenticated Group Key Transfer Protocol Based on Secret Sharing. Procedia Engineering\u00a029, 403\u2013408 (2012)","journal-title":"Procedia Engineering"},{"issue":"1","key":"33_CR12","doi-asserted-by":"publisher","first-page":"145","DOI":"10.12785\/amis\/070117","volume":"7","author":"W. Yuan","year":"2013","unstructured":"Yuan, W., Hu, L., Li, H., Chu, J.: An Efficient Password-based Group Key Exchange Protocol Using Secret Sharing. Appl. Math. Inf. Sci.\u00a07(1), 145\u2013150 (2013)","journal-title":"Appl. Math. Inf. Sci."}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T04:37:08Z","timestamp":1676867828000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_33","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}