{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:06:41Z","timestamp":1725574001842},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220541"},{"type":"electronic","value":"9783540247074"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24707-4_87","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T17:05:36Z","timestamp":1294419936000},"page":"746-754","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Key Agreement Protocol for Secure Authentication"],"prefix":"10.1007","author":[{"given":"Young-Sin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Eui-Nam","family":"Huh","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Byung-Wook","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"87_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in Cryptography. IEEE Trans. on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. on Information Theory"},{"key":"87_CR2","volume-title":"Applied Cryptography-Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography-Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley & Sons, Inc., Chichester (1995)","edition":"2"},{"key":"87_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchanges. Design, Codes and Cryptography\u00a02, 107\u2013125 (1992)","journal-title":"Design, Codes and Cryptography"},{"key":"87_CR4","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Proc. of IEEE Conf. on Research in Security and Privacy, May 1992, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"issue":"5","key":"87_CR5","first-page":"291","volume":"29","author":"S. Seo","year":"2002","unstructured":"Seo, S., Cho, T., Lee, S.-H.: OTP-EKE: A Key Exchange Protocol based on One-Time-Password. Journal of Korea Information Science Society\u00a029(5), 291\u2013298 (2002)","journal-title":"Journal of Korea Information Science Society"},{"key":"87_CR6","doi-asserted-by":"crossref","unstructured":"Seo, D.H., Sweeney, P.: Simple authenticated key agreement algorithm. Electronics Letters\u00a035(13) (June 1999)","DOI":"10.1049\/el:19990724"},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Tseng, Y.-M.: Weakness in simple authenticated key agreement protocol. Electronics Letters\u00a036(1) (January 2000)","DOI":"10.1049\/el:20000112"},{"key":"87_CR8","doi-asserted-by":"crossref","unstructured":"Ku, W.-C., Wang, S.-D.: Cryptanalysis of modified authenticated key agreement protocol. Electronics Letters\u00a036(21) (October 2000)","DOI":"10.1049\/el:20001269"},{"key":"87_CR9","unstructured":"Lin, I.-C., Chang, C.-C., Hwang, M.-S.: Security Enhancement for the simple authentication key agreement algorithm. In: Proceedings of the 24th Annual International Computer Software and Application Conference, pp. 113\u2013115 (2000)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24707-4_87.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:05:27Z","timestamp":1620011127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24707-4_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220541","9783540247074"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24707-4_87","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}