{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:41:56Z","timestamp":1725565316489},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220602"},{"type":"electronic","value":"9783540247685"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_64","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:14:08Z","timestamp":1284167648000},"page":"603-610","source":"Crossref","is-referenced-by-count":2,"title":["An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack"],"prefix":"10.1007","author":[{"given":"Eun-Kyung","family":"Ryu","sequence":"first","affiliation":[]},{"given":"Kee-Won","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"64_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/3-540-48892-8_26","volume-title":"Selected Areas in Cryptography","author":"S. Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 339\u2013361. Springer, Heidelberg (1999)"},{"key":"64_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transaction on Information Theory\u00a0IT-22, 644\u2013654 (1976)","journal-title":"IEEE Transaction on Information Theory"},{"key":"64_CR3","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1049\/el:19990724","volume":"35","author":"D.H. Seo","year":"1999","unstructured":"Seo, D.H., Sweeney, P.: Simple authenticated key agreement algorithm. Electronics Letters\u00a035, 1073\u20131074 (1999)","journal-title":"Electronics Letters"},{"key":"64_CR4","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1049\/el:20000112","volume":"36","author":"Y.M. Tseng","year":"2000","unstructured":"Tseng, Y.M.: Weakness in simple authenticated key agreement protocol. Electronics Letters\u00a036, 48\u201349 (2000)","journal-title":"Electronics Letters"},{"key":"64_CR5","unstructured":"Lin, I.C., Chang, C.C., Hwang, M.S.: Security enhancement for the simple authentication key agreement algorithm. In: Computer Software and Applications Conference( COMPSAC), pp. 113\u2013115 (2000)"},{"key":"64_CR6","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.1049\/el:20001269","volume":"36","author":"W.C. Ku","year":"2000","unstructured":"Ku, W.C., Wang, S.D.: Cryptanalysis of modified authenticated key agreement protocol. Electronics Letters\u00a036, 1770\u20131771 (2000)","journal-title":"Electronics Letters"},{"key":"64_CR7","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/S0096-3003(02)00304-1","volume":"142","author":"C.L. Hsu","year":"2003","unstructured":"Hsu, C.L., Wu, T.S., Wu, T.C., Mitchell, C.: Improvement of modified authenticated key agreement protocol. Applied Mathematics and Computation\u00a0142, 305\u2013308 (2003)","journal-title":"Applied Mathematics and Computation"},{"key":"64_CR8","doi-asserted-by":"crossref","unstructured":"Lee, N.Y., Lee, M.F.: Further improvement on the modified authenticated key agreement scheme. Applied Mathematics and Computation, Available online (November 2003)","DOI":"10.1016\/j.amc.2003.08.057"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_64.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:55:52Z","timestamp":1605761752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}