{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:35:36Z","timestamp":1725564936009},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540223795"},{"type":"electronic","value":"9783540278009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27800-9_22","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T23:00:38Z","timestamp":1283727638000},"page":"248-261","source":"Crossref","is-referenced-by-count":5,"title":["Symmetric Key Authentication Services Revisited"],"prefix":"10.1007","author":[{"given":"Bruno","family":"Crispo","sequence":"first","affiliation":[]},{"given":"Bogdan C.","family":"Popescu","sequence":"additional","affiliation":[]},{"given":"Andrew S.","family":"Tanenbaum","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Advanced Encryption Standard. FIPS 197, NIST, US Dept. of Commerce, Washington D. C. (November 2001)"},{"issue":"4","key":"22_CR2","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems: Theory and Practice. ACM Trans. on Computer Systems\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Trans. on Computer Systems"},{"key":"22_CR3","unstructured":"Berkovits, S., Chokhani, S., Furlong, J.A., Geiter, J.A., Guild, J.C.: Public Key Infrastructure Study: Final Report. Produced by the MITRE Corporation for NIST (1994)"},{"issue":"1","key":"22_CR4","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/90.365435","volume":"3","author":"R. Bird","year":"1995","unstructured":"Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution. IEEE\/ACM Trans. on Networking\u00a03(1), 31\u201341 (1995)","journal-title":"IEEE\/ACM Trans. on Networking"},{"issue":"5","key":"22_CR5","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/49.223869","volume":"11","author":"R. Bird","year":"1999","unstructured":"Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: Systematic Design of a Family of Attack-Resistant Authentication Protocols. IEEE J. on Selected Areas in Communication\u00a011(5), 679\u2013693 (1999)","journal-title":"IEEE J. on Selected Areas in Communication"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Boyd, C.: A Class of Flexible and Efficient Key Management Protocols. In: Proc. 9th IEEE Computer Security Foundation Workshop (1996)","DOI":"10.1109\/CSFW.1996.503685"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Boyd, C.: A Framework for Design of Key Establishment Protocols. In: Proc. First Australasian Conf. on Information Security and Privacy, pp. 146\u2013157 (June 1996)","DOI":"10.1007\/BFb0023295"},{"key":"22_CR8","unstructured":"Freier, A., Karlton, P., Kocher, P.: The SSL Protocol Version 3.0. Internet Draft (expired) (November 1996)"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/0020-0190(95)00177-E","volume":"55","author":"T. Hwang","year":"1995","unstructured":"Hwang, T., Lee, N.Y., Li, C.M., Ko, M.Y., Chen, Y.H.: Two attacks on Neuman- Stubblebine Authentication Protocols. Information Processing Letters\u00a055, 103\u2013107 (1995)","journal-title":"Information Processing Letters"},{"key":"22_CR10","unstructured":"ISO\/IEC. ISO\/IEC 9798-2 - Information Technology - Security techniques - Entity Authentication - Part2: Mechanisms using symmetric encipherment algorithms (1999)"},{"issue":"3","key":"22_CR11","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/206826.206832","volume":"29","author":"I.L. Kao","year":"1995","unstructured":"Kao, I.L., Chow, R.: An Efficient and Secure Authentication Protocol Using Uncertified Keys. ACM Operating System Review\u00a029(3), 14\u201321 (1995)","journal-title":"ACM Operating System Review"},{"issue":"4","key":"22_CR12","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/142854.142872","volume":"26","author":"A. Kehne","year":"1992","unstructured":"Kehne, A., Schonwalder, J., Langendolfer, H.: A Nonce-Based Protocol for Multiple Authentication. ACM Operating System Review\u00a026(4), 84\u201389 (1992)","journal-title":"ACM Operating System Review"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Kohl, J.T., Neuman, B.C.: The Kerberos Network Authentication Service (Version 5). Technical report, IETF Network Working Group, Internet Request for Comments RFC-1510 (1993)","DOI":"10.17487\/rfc1510"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: RFC 2104 - HMAC: Keyed-Hashing for Message Authentication. Internet RFC 2104, Febraury (1997)","DOI":"10.17487\/rfc2104"},{"issue":"12","key":"22_CR15","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Commun. of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Commun. of the ACM"},{"issue":"7","key":"22_CR16","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/24592.24593","volume":"21","author":"R.M. Needham","year":"1987","unstructured":"Needham, R.M., Schroeder, M.D.: Authentication Revisited. ACM Operating System Review\u00a021(7), 7\u20137 (1987)","journal-title":"ACM Operating System Review"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Clifford Neuman, B., Stubblebine, S.G.: A Note on the Use of Timestamps as Nonces. ACM Operating System Review\u00a027(2) (1993)","DOI":"10.1145\/155848.155852"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: Discrete logarithms and factoring. In: Proc. of the 35th Annual IEEE Symp. on the Foundations of Computer Science, pp. 124\u2013134 (1994)","DOI":"10.1109\/SFCS.1994.365700"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27800-9_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:21:18Z","timestamp":1605759678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27800-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223795","9783540278009"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27800-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}