{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:10:44Z","timestamp":1774264244250,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540220602","type":"print"},{"value":"9783540247685","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24768-5_66","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T01:14:08Z","timestamp":1284167648000},"page":"617-626","source":"Crossref","is-referenced-by-count":9,"title":["Efficient Password-Based Authenticated Key Agreement Protocol"],"prefix":"10.1007","author":[{"given":"Sung-Woon","family":"Lee","sequence":"first","affiliation":[]},{"given":"Woo-Hun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyun-Sung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"66_CR1","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: Proceedings of IEEE security and Privacy, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"66_CR2","unstructured":"IEEE. Standard Specifications for Public Key Cryptography, IEEE1363 (2002)"},{"key":"66_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 156\u2013171. Springer, Heidelberg (2000)"},{"key":"66_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"issue":"9","key":"66_CR5","first-page":"2044","volume":"E83-B","author":"T. Kwon","year":"2000","unstructured":"Kwon, T., Song, J.: A Study on the Generalized Key Agreement and Password Authentication Protocol. IEICE TRANS. COMMUN.\u00a0E83-B(9), 2044\u20132050 (2000)","journal-title":"IEICE TRANS. COMMUN."},{"key":"66_CR6","unstructured":"MacKenzie, P., Swaminathan, R.: Secure network authentication with password identification. Presented to IEEE P1363a (1999)"},{"key":"66_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/3-540-44448-3_46","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"P. MacKenzie","year":"2000","unstructured":"MacKenzie, P., Patel, S., Swaminathan, R.: Password-authenticated key exchange based on RSA. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, p. 599. Springer, Heidelberg (2000)"},{"key":"66_CR8","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise. In: ACM Conference on Computer and Communications Security, pp. 244\u2013250 (1993)","DOI":"10.1145\/168588.168618"},{"key":"66_CR9","unstructured":"Kwon, T.: Ultimate Solution to Authentication via Memorable Password. Presented to IEEE P1363a (2000)"},{"key":"66_CR10","unstructured":"Jablon, D.: Extended password key exchange protocols. In: WETICE Workshop on Enterprise Security (1997)"},{"key":"66_CR11","unstructured":"Wu, T.: Secure remote password protocol. In: Internet Society Symposium on Network and Distributed System Security (1998)"},{"issue":"11","key":"66_CR12","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1049\/el:19990623","volume":"35","author":"T. Kwon","year":"1999","unstructured":"Kwon, T., Song, J.: Secure agreement scheme for gxy via password authentication. Electronics Letters\u00a035(11), 892\u2013893 (1999)","journal-title":"Electronics Letters"},{"key":"66_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24768-5_66.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:08:50Z","timestamp":1620011330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24768-5_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220602","9783540247685"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24768-5_66","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}