{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:22:00Z","timestamp":1751516520607,"version":"3.41.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763477"},{"type":"electronic","value":"9783319763484"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76348-4_58","type":"book-chapter","created":{"date-parts":[[2018,3,21]],"date-time":"2018-03-21T15:10:42Z","timestamp":1521645042000},"page":"597-607","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Multi-party Key Exchange Protocol"],"prefix":"10.1007","author":[{"given":"Swapnil","family":"Paliwal","sequence":"first","affiliation":[]},{"given":"Ch.","family":"Aswani Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,22]]},"reference":[{"key":"58_CR1","doi-asserted-by":"crossref","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: EUROCRYPT 2001, pp. 451\u2013469 (2001)","DOI":"10.1007\/3-540-44987-6_28"},{"key":"58_CR2","doi-asserted-by":"crossref","unstructured":"Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thom\u00e9, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-B\u00e9guelink, S., Zimmermann, P.: In: 2nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, CO, pp. 1\u20135, October 2015","DOI":"10.1145\/2810103.2813707"},{"key":"58_CR3","unstructured":"Sauerbier, C.: Computing a Discrete Logarithm in O(n3). https:\/\/arxiv.org\/ftp\/arxiv\/papers\/0912\/0912.2269.pdf . Accessed 17 Sept 2017"},{"key":"58_CR4","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.cose.2006.08.005","volume":"26","author":"R Lu","year":"2007","unstructured":"Lu, R., Cao, Z.: Simple three-party key exchange protocol. Comput. Secur. 26, 94\u201397 (2007)","journal-title":"Comput. Secur."},{"key":"58_CR5","unstructured":"University of Texas. https:\/\/www.cs.utexas.edu\/~shmat\/courses\/cs395t_fall04\/gupta_gdh.pdf . Accessed 24 Sept 2017"},{"key":"58_CR6","unstructured":"AL-Sammarraie, O.A., Bashir, M.A.: Generalization of Newton\u2019s forward interpolation formula. Int. J. Sci. Res. Publ. 5(3), 1\u20135 (2015)"},{"key":"58_CR7","volume-title":"Cryptography and Network Security Principles and Practices","author":"W Stallings","year":"2006","unstructured":"Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Prentice Hall, Upper Saddle River (2006)","edition":"4"},{"issue":"2","key":"58_CR8","first-page":"69","volume":"1","author":"M Ahmed","year":"2012","unstructured":"Ahmed, M., Sanjabi, B., Aldiaz, D., Rezaei, A., Omotunde, H.: Diffie-Hellman and its application in security protocols. Int. J. Eng. Sci. Innov. Technol. (IJESIT) 1(2), 69\u201371 (2012)","journal-title":"Int. J. Eng. Sci. Innov. Technol. (IJESIT)"},{"key":"58_CR9","doi-asserted-by":"crossref","unstructured":"Khader, A.S., Lai, D.: Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol. In: 22nd International Conference on Telecommunications (ICT 2015), pp. 204\u2013208 (2015)","DOI":"10.1109\/ICT.2015.7124683"},{"key":"58_CR10","unstructured":"McCurley, K.S.: Proceedings of Symposia in Applied Mathematics, vol. 42, pp. 49\u201369, 8\u20139 August 1989"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems Design and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76348-4_58","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:26:54Z","timestamp":1751495214000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76348-4_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763477","9783319763484"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76348-4_58","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}