{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:11:01Z","timestamp":1725574261369},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540213703"},{"type":"electronic","value":"9783540246541"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24654-1_6","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T12:49:37Z","timestamp":1294404577000},"page":"73-87","source":"Crossref","is-referenced-by-count":23,"title":["Zero Common-Knowledge Authentication for Pervasive Networks"],"prefix":"10.1007","author":[{"given":"Andr\u00e9","family":"Weimerskirch","sequence":"first","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Bosselaers, A.: Even faster hashing on the Pentium. In: Rump session of Eurocrypt 1997 (1997)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. DEC SRC Research Report 39, revised version (1990)","DOI":"10.1145\/74850.74852"},{"key":"6_CR3","unstructured":"Butty\u00e1n, L., Hubaux, J.-P.: Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report DSC\/2001\/001, Swiss Federal Institute of Technology \u2013 Lausanne, Department of Communication Systems (2001)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36504-4_8","volume-title":"Financial Cryptography","author":"D. Coppersmith","year":"2003","unstructured":"Coppersmith, D., Jakobsson, M.: Almost optimal hash sequence traversal. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357, Springer, Heidelberg (2003)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/BFb0054867","volume-title":"Algorithmic Number Theory","author":"E. Win De","year":"1998","unstructured":"De Win, E., Mister, S., Preneel, B., Wiener, M.: On the performance of signature based on elliptic curves. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 252\u2013266. Springer, Heidelberg (1998)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"Algorithmic Number Theory","author":"J. Hoffstein","year":"1998","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A Ring-Based Public Key Cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 267\u2013288. Springer, Heidelberg (1998)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Lamparter, B., Paul, K., Westhoff, D.: Charging Support for Ad Hoc Stub Networks. Elsevier Journal of Computer Communication, Special Issue on Internet Pricing and Charging: Algorithms, Technology and Applications\u00a026(13) (August 2003)","DOI":"10.1016\/S0140-3664(03)00034-3"},{"key":"6_CR8","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Bosselaers, A.: Even faster hashing on the Pentium. In: Rump session of Eurocrypt 1997 (1997)"},{"key":"6_CR9","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks. To appear in Proceedings of INFOCOM 2003 (2003)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24654-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T10:46:27Z","timestamp":1592217987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24654-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540213703","9783540246541"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24654-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}