{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:56:45Z","timestamp":1725566205615},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_2","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"13-24","source":"Crossref","is-referenced-by-count":5,"title":["Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks"],"prefix":"10.1007","author":[{"given":"Muxiang","family":"Zhang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/10958513_16","volume-title":"Information Security","author":"F. Bao","year":"2003","unstructured":"Bao, F.: Security analysis of a password authenticated key exchange protocol. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 208\u2013217. Springer, Heidelberg (2003)"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1145\/168588.168618","volume-title":"Proc. of the 1st ACM Conference on Computer and Communications Security","author":"S.M. Bellovin","year":"1993","unstructured":"Bellovin, S.M., Merritt, M.: Augmented encrypted key exchange: A passwordbased protocol secure against dictionary attacks and password file compromise. In: Proc. of the 1st ACM Conference on Computer and Communications Security, November 1993, pp. 244\u2013250. ACM, New York (1993)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably secure password authenticated key exchange using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 156\u2013171. Springer, Heidelberg (2000)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attack. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/3-540-44647-8_24","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O., Lindell, Y.: Session-key generation using human passwords only. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 408\u2013432. Springer, Heidelberg (2001)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Gong, L.: Optimal authentication protocols resistant to password guessing attacks. In: Proc. IEEE Computer Security Foundation Workshop, June 1995, pp. 24\u201329 (1995)","DOI":"10.1109\/CSFW.1995.518549"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. In: Proc. of the Fifth ACM Conference on Computer and Communications Security, pp. 122\u2013131 (1998)","DOI":"10.1145\/288090.288118"},{"issue":"5","key":"2_CR8","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: Strong password-only authenticated key exchange, Computer Communication. Review, ACM SIGCOMM\u00a026(5), 5\u201326 (1996)","journal-title":"Review, ACM SIGCOMM"},{"key":"2_CR9","unstructured":"Jablon, D.: \n                    \n                      http:\/\/www.integritysciences.com"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/3-540-44987-6_29","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Katz","year":"2001","unstructured":"Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, p. 475. Springer, Heidelberg (2001)"},{"issue":"10","key":"2_CR11","first-page":"2229","volume":"E85-A","author":"K. Kobara","year":"2002","unstructured":"Kobara, K., Imai, H.: Pretty-simple password-authenticated key-exchange under standard assumptions. IEICE Trans.\u00a0E85-A(10), 2229\u20132237 (2002)","journal-title":"IEICE Trans."},{"key":"2_CR12","unstructured":"Kwon, T.: Authentication and key agreement via memorable passwords. In: Proc. Network and Distributed System Security Symposium, February 7-9 (2001)"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/BFb0028161","volume-title":"Security Protocols","author":"S. Lucks","year":"1998","unstructured":"Lucks, S.: Open key exchange: How to defeat dictionary attacks without encrypting public keys. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 79\u201390. Springer, Heidelberg (1998)"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/3-540-44448-3_46","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"P. MacKenzie","year":"2000","unstructured":"MacKenzie, P., Patel, S., Swaminathan, R.: Password-authenticated key exchange based on RSA. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 599\u2013613. Springer, Heidelberg (2000)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Patel, S.: Number theoretic attacks on secure password schemes. In: Proc. IEEE Symposium on Security and Privacy, Oakland, California, May 5-7 (1997)","DOI":"10.1109\/SECPRI.1997.601340"},{"key":"2_CR16","volume-title":"Elementary Number Theory and Its Applications","author":"K.H. Rosen","year":"2000","unstructured":"Rosen, K.H.: Elementary Number Theory and Its Applications, 4th edn. Addison Wesley Longman, Amsterdam (2000)","edition":"4"},{"key":"2_CR17","unstructured":"Wu, T.: The secure remote password protocol. In: Proc. Network and Distributed System Security Symposium, San Diego, March 1998, pp. 97\u2013111 (1998)"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-45811-5_11","volume-title":"Information Security","author":"F. Zhu","year":"2002","unstructured":"Zhu, F., Wong, D., Chan, A., Ye, R.: RSA-based password authenticated key exchange for imbalanced wireless networks. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol.\u00a02433, pp. 150\u2013161. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:52:27Z","timestamp":1620013947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}