{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:58:38Z","timestamp":1725559118103},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540253389"},{"type":"electronic","value":"9783540319573"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31957-3_93","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T17:26:19Z","timestamp":1278523579000},"page":"827-834","source":"Crossref","is-referenced-by-count":2,"title":["Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract)"],"prefix":"10.1007","author":[{"given":"Duncan S.","family":"Wong","sequence":"first","affiliation":[]},{"given":"Agnes H.","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"93_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, p. 139. Springer, Heidelberg (2000)"},{"key":"93_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"First ACM Conference on Computer and Communications Security","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: First ACM Conference on Computer and Communications Security, pp. 62\u201373. ACM Press, New York (1993)"},{"key":"93_CR3","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/RISP.1992.213269","volume-title":"Proceedings 1992 IEEE Symposium on Research in Security and Privacy","author":"S.M. Bellovin","year":"1992","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password based protocols secure against dictionary attacks. In: Proceedings 1992 IEEE Symposium on Research in Security and Privacy, pp. 72\u201384. IEEE Computer Society, Los Alamitos (1992)"},{"issue":"5","key":"93_CR4","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"Gong, L., Lomas, M., Needham, R., Saltzer, J.: Protecting poorly chosen secrets from guessing attacks. IEEE J. on Selected Areas in Communications\u00a011(5), 648\u2013656 (1993)","journal-title":"IEEE J. on Selected Areas in Communications"},{"unstructured":"IEEE. P1363 - 2000: Standard Specifications For Public Key Cryptography (2000)","key":"93_CR5"},{"unstructured":"IEEE. P1363.2 \/ D15: Standard Specifications for Password-based Public Key Cryptographic Techniques (May 2004)","key":"93_CR6"},{"issue":"5","key":"93_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. Computer Communication Review, ACM\u00a026(5), 5\u201326 (1996)","journal-title":"Computer Communication Review, ACM"},{"doi-asserted-by":"crossref","unstructured":"Jablon, D.: Extended password key exchange protocols immune to dictionary attack. In: Proc. of the WETICE 1997 Workshop on Enterprise Security, Cambridge, MA, USA (June 1997)","key":"93_CR8","DOI":"10.1109\/ENABL.1997.630822"},{"issue":"10","key":"93_CR9","first-page":"2229","volume":"E85-A","author":"K. Kobara","year":"2002","unstructured":"Kobara, K., Imai, H.: Pretty-simple password-authenticated key-exchange under standard assumptions. IEICE Trans.\u00a0E85-A(10), 2229\u20132237 (2002)","journal-title":"IEICE Trans."},{"key":"93_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/3-540-45353-9_27","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"P. MacKenzie","year":"2001","unstructured":"MacKenzie, P.: More efficient password-authenticated key exchange. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, p. 361. Springer, Heidelberg (2001)"},{"key":"93_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1007\/3-540-44448-3_46","volume-title":"Advances in Cryptology - ASIACRYPT 2000","author":"P. MacKenzie","year":"2000","unstructured":"MacKenzie, P., Patel, S., Swaminathan, R.: Password-authenticated key exchange based on RSA. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol.\u00a01976, pp. 599\u2013613. Springer, Heidelberg (2000)"},{"key":"93_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1023\/A:1008302122286","volume":"19","author":"M. Ueli","year":"2000","unstructured":"Ueli, M.: Maurer and Stefan Wolf. The Diffie-Hellman protocol. Designs, Codes and Cryptography\u00a019, 147\u2013171 (2000)","journal-title":"Designs, Codes and Cryptography"},{"key":"93_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic Curve Public Key Cryptosystems","author":"A. Menezes","year":"1993","unstructured":"Menezes, A.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Dordrecht (1993)"},{"unstructured":"Wang, Y.: EC-SRP. Submission to IEEE P1363 Study Group, June 2001, updated May 2002 (May 2002)","key":"93_CR14"},{"key":"93_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/3-540-47719-5_39","volume-title":"Information Security and Privacy","author":"A. Weimerskirch","year":"2001","unstructured":"Weimerskirch, A., Paar, C., Chang Shantz, S.: Elliptic curve cryptography on a Palm OS device. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 502\u2013513. Springer, Heidelberg (2001)"},{"key":"93_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-540-24582-7_28","volume-title":"Progress in Cryptology - INDOCRYPT 2003","author":"D. Wong","year":"2003","unstructured":"Wong, D., Chan, A., Zhu, F.: More efficient password authenticated key exchange based on RSA. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol.\u00a02904, pp. 375\u2013387. Springer, Heidelberg (2003)"},{"unstructured":"Wu, T.: The secure remote password protocol. In: 1998 Internet Society Symposium on Network and Distributed System Security, pp. 97\u2013111 (1998)","key":"93_CR17"}],"container-title":["Lecture Notes in Computer Science","Networking - ICN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31957-3_93.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:43:59Z","timestamp":1619999039000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31957-3_93"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540253389","9783540319573"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31957-3_93","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}