{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:32:12Z","timestamp":1725496332954},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77090-9_69","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T12:19:26Z","timestamp":1196079566000},"page":"758-769","source":"Crossref","is-referenced-by-count":4,"title":["Token-Based Authenticated Key Establishment Protocols for Three-Party Communication"],"prefix":"10.1007","author":[{"given":"Eun-Jun","family":"Yoon","sequence":"first","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"69_CR1","volume-title":"Applied Cryptography","author":"B. Shneier","year":"1996","unstructured":"Shneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Inc., Chichester (1996)","edition":"2"},{"key":"69_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)"},{"key":"69_CR3","volume-title":"Handbook of Applied Cryptograph","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)"},{"key":"69_CR4","volume-title":"Modern Cryptography Theory & Practice","author":"W. Mao","year":"2004","unstructured":"Mao, W.: Modern Cryptography Theory & Practice. Prentice Hall, Englewood Cliffs (2004)"},{"key":"69_CR5","unstructured":"Stinson, D.: Cryptography Theory and Practice, 2nd edn. Chapman & Hall\/CRC (2002)"},{"key":"69_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/3-540-48892-8_26","volume-title":"Selected Areas in Cryptography","author":"S. Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman Key Agreement Protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 339\u2013361. Springer, Heidelberg (1999)"},{"issue":"5","key":"69_CR7","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"Gong, L., Lomas, M., Needham, R., Saltzer, J.: Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE Journal on Selected Areas in Communications\u00a011(5), 648\u2013656 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"69_CR8","doi-asserted-by":"crossref","unstructured":"Gong, L.: Optimal Authentication Protocols Resistant to Password Guessing Attacks. In: Proc. of the 8th IEEE Computer Security Foundation Workshop, pp. 24\u201329 (1995)","DOI":"10.1109\/CSFW.1995.518549"},{"issue":"2","key":"69_CR9","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/TCE.2004.1309439","volume":"50","author":"W.S. Juang","year":"2004","unstructured":"Juang, W.S.: Efficient Three-Party Key Exchange using Smart Cards. IEEE Transactions on Consumer Electronics\u00a050(2), 619\u2013624 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"69_CR10","doi-asserted-by":"crossref","unstructured":"Keung, S., Siu, K.: Efficient Protocols Secure Against Guessing and Replay Attacks. In: Proc. of the Fourth International Conference on Computer Communications and Networks, pp. 105\u2013112 (1995)","DOI":"10.1109\/ICCCN.1995.540108"},{"issue":"4","key":"69_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/506106.506108","volume":"34","author":"C. Lin","year":"2000","unstructured":"Lin, C., Sun, H., Hwang, T.: Three-party Encrypted Key Exchange: Attacks and a Solution. ACM Operating Systems Review\u00a034(4), 12\u201320 (2000)","journal-title":"ACM Operating Systems Review"},{"issue":"12","key":"69_CR12","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/4234.974498","volume":"5","author":"C. Lin","year":"2001","unstructured":"Lin, C., Sun, H., Steiner, M., Hwang, T.: Three-party Encrypted Key Exchange Without Server Public-Keys. IEEE Communication Letters\u00a05(12), 497\u2013499 (2001)","journal-title":"IEEE Communication Letters"},{"issue":"3","key":"69_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M. Steiner","year":"1995","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Refinement and Extension of Encrypted Key Exchange. ACM Operating Systems Review\u00a029(3), 22\u201330 (1995)","journal-title":"ACM Operating Systems Review"},{"issue":"7","key":"69_CR14","first-page":"991","volume":"E82-B","author":"T. Kwon","year":"1999","unstructured":"Kwon, T., Kang, M., Jung, S., Song, J.: An Improvement of the Password based Authentication Protocol (K1P) on Security against Replay Attacks. IEICE Transactions on Communications\u00a0E82-B(7), 991\u2013997 (1999)","journal-title":"IEICE Transactions on Communications"},{"key":"69_CR15","unstructured":"Yeh, H.T.: User Authentication and Key Exchange Protocols Suitable for Diverse Circumstances, Ph.D. Thesis, Southern Taiwan University of Technology, Taiwan, pp. 1\u201382 (2003)"},{"key":"69_CR16","unstructured":"Kwon, T., Kang, M., Song, J.: An Adaptable and Reliable Authentication Protocol for Communication Networks. In: Proc. of IEEE INFOCOM 1997, pp. 737\u2013744 (1997)"},{"issue":"5","key":"69_CR17","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.csi.2003.12.001","volume":"26","author":"C. Chang","year":"2004","unstructured":"Chang, C., Chang, Y.: A Novel Three-party Encrypted Key Exchange Protocol. Computer Standards & Interfaces\u00a026(5), 471\u2013476 (2004)","journal-title":"Computer Standards & Interfaces"},{"issue":"1","key":"69_CR18","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S0167-4048(03)00114-7","volume":"22","author":"C.L. Lin","year":"2003","unstructured":"Lin, C.L., Hwang, T.: A Password Authentication Scheme with Secure Password Updating. Computers & Security\u00a022(1), 68\u201372 (2003)","journal-title":"Computers & Security"},{"issue":"4","key":"69_CR19","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"I.E. Liao","year":"2006","unstructured":"Liao, I.E., Lee, C.C., Hwang, M.S.: A Password Authentication Scheme over Insecure Networks. Journal of Computer and System Sciences\u00a072(4), 727\u2013740 (2006)","journal-title":"Journal of Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77090-9_69.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:58:54Z","timestamp":1619506734000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77090-9_69"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770893"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77090-9_69","relation":{},"subject":[]}}