{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:31:50Z","timestamp":1743111110632,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220572"},{"type":"electronic","value":"9783540247678"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24767-8_100","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T00:45:04Z","timestamp":1284165904000},"page":"955-964","source":"Crossref","is-referenced-by-count":1,"title":["Security Enhanced WTLS Handshake Protocol"],"prefix":"10.1007","author":[{"given":"Jin","family":"Kwak","sequence":"first","affiliation":[]},{"given":"Jongsu","family":"Han","sequence":"additional","affiliation":[]},{"given":"Soohyun","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"100_CR1","doi-asserted-by":"crossref","unstructured":"Levi, A., Savas, E.: Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. In: Proceedings of the 8th IEEE International Symposium on Computers and Communication, ISCC 2003, pp. 1245\u20131250 (2003)","DOI":"10.1109\/ISCC.2003.1214285"},{"key":"100_CR2","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The TLS Protocol version 1.0, IETF RFC 2246 (January 1999)","DOI":"10.17487\/rfc2246"},{"key":"100_CR3","unstructured":"WAP Forum, Wireless Application Protocol Wireless Transport Layer Security Specification version, February 18 (2000)"},{"key":"100_CR4","doi-asserted-by":"crossref","unstructured":"Radhamani, G., Ramasamy, K.: Security Issues in WAP WTLS Protocol. In: IEEE 2002 International Conference on Communication, Circuits and Systems and West Sino Expositions, vol.\u00a01, pp. 483\u2013487 (2002)","DOI":"10.1109\/ICCCAS.2002.1180664"},{"key":"100_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-36555-9_23","volume-title":"Mobile Communications","author":"D.J. Kwak","year":"2003","unstructured":"Kwak, D.J., Ha, J.C., Lee, H.J., Kim, H.K., Moon, S.J.: A WTLS Handshke Protocol with User Anonymity and Forward Secrecy. In: Lee, J.-Y., Kang, C.-H. (eds.) CIC 2002. LNCS, vol.\u00a02524, pp. 219\u2013230. Springer, Heidelberg (2003)"},{"key":"100_CR6","unstructured":"ANSI, Public Key Cryptography for the finacial services industry : Key agreement and key transport using elliptic curve cryptography, ANSI X9.63 (2001)"},{"key":"100_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-44843-8_21","volume-title":"Computational Science and Its Applications - ICCSA 2003","author":"S.H. Oh","year":"2003","unstructured":"Oh, S.H., Kwak, J., Lee, S.W., Won, D.H.: Security Analysis and Applications of Standard key Agreement Protocols. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., L\u2019Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol.\u00a02668, pp. 191\u2013200. Springer, Heidelberg (2003)"},{"key":"100_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-46885-4_5","volume-title":"Advances in Cryptology - EUROCRYPT \u201989","author":"C. Gunther","year":"1990","unstructured":"Gunther, C.: An Identity-based Key-exchange Protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 29\u201337. Springer, Heidelberg (1990)"},{"issue":"177","key":"100_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve Cryptosystems. Mathematics of Computation\u00a048(177), 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"100_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/3-540-47719-5_21","volume-title":"Information Security and Privacy","author":"J.P. Yang","year":"2001","unstructured":"Yang, J.P., Shin, W.S., Rhee, K.H.: An End-to-End Authentication Protocol in Wireless Application Protocol. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 247\u2013259. Springer, Heidelberg (2001)"},{"key":"100_CR11","doi-asserted-by":"crossref","unstructured":"Zheng, W.: An Authentication and Security Protocol for Mobile Computing. In: Proceeding of IFIP, September 1996, pp. 249\u2013257 (1996)","DOI":"10.1007\/978-0-387-34980-0_25"},{"key":"100_CR12","unstructured":"Go, J.S., Kim, K.J.: Wireless authentication Protocols Preserving User Anonymity. In: SCIS 2001 (January 2001)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24767-8_100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T18:05:44Z","timestamp":1740506744000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-24767-8_100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220572","9783540247678"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24767-8_100","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}