{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:06:57Z","timestamp":1725534417543},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642024566"},{"type":"electronic","value":"9783642024573"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02457-3_18","type":"book-chapter","created":{"date-parts":[[2009,7,7]],"date-time":"2009-07-07T13:54:56Z","timestamp":1246974896000},"page":"204-211","source":"Crossref","is-referenced-by-count":5,"title":["Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key"],"prefix":"10.1007","author":[{"given":"Mijin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Heasuk","family":"Jo","sequence":"additional","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Smith, J., Weingarten, F.: Report from the Workshop on Research Directions for NGI. Research challenges for the next generation internet (2007)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Mitchell, C.: Security for Mobility. IEE press (2004)","DOI":"10.1049\/PBTE051E"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Kohl, J., Neuman, C.: The Kerberos network authentication service(v5). Internet Request for Comments 1510 (1993)","DOI":"10.17487\/rfc1510"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/381906.381946","volume":"20","author":"S. Bellovin","year":"1990","unstructured":"Bellovin, S., Merritt, M.: Limitations of the Kerboros authentication system. ACM communications review\u00a020, 119\u2013132 (1990)","journal-title":"ACM communications review"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B.C. Neuman","year":"1994","unstructured":"Neuman, B.C., Ts\u2019o, T.: An authentication service for computer networks. IEEE communications\u00a032, 33\u201338 (1994)","journal-title":"IEEE communications"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/206826.206832","volume":"29","author":"I. Kao","year":"1995","unstructured":"Kao, I., Chow, R.: An efficient and secure authentication protocol using uncertified keys. ACM Operating Systems Review\u00a029, 14\u201321 (1995)","journal-title":"ACM Operating Systems Review"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/NDSS.1995.390639","volume-title":"Proceedings of symposium on Network and Distributed System Security(SNDSS 1995)","author":"R. Ganesan","year":"1995","unstructured":"Ganesan, R.: Yaksha: augmenting Kerberos with public key cryptography. In: Proceedings of symposium on Network and Distributed System Security(SNDSS 1995), pp. 132\u2013143. IEEE Computer Society, Los Alamitos (1995)"},{"key":"18_CR8","first-page":"154","volume-title":"Proceedings of the second annual International Conference on Mobile Computing and Networking","author":"A. Fox","year":"1996","unstructured":"Fox, A., Gribble, S.: Security on the movie: indirect authentication using Kerberos. In: Proceedings of the second annual International Conference on Mobile Computing and Networking, pp. 154\u2013164. ACM press, New York (1996)"},{"key":"18_CR9","first-page":"134","volume-title":"Proceedings of the Symposium on Network and Distributed System Security","author":"M. Sirbu","year":"1997","unstructured":"Sirbu, M., Chuang, J.: Distrbuted authentication in Kerberos using public key cryptography. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 134\u2013141. IEEE Computer Society, Los Alamitos (1997)"},{"key":"18_CR10","first-page":"505","volume":"15","author":"S. Shieh","year":"1999","unstructured":"Shieh, S., Ho, F., Huang, Y.: An efficient authentication protocol for mobile networks. Journal of Information Science and Engineering\u00a015, 505\u2013520 (1999)","journal-title":"Journal of Information Science and Engineering"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"SamaraKoon, M., Honary, B.: Novel authentication and key agreement protocol for low processing power and systems resource requirements in portable communications systems. IEE Colloquium on novel DSP Algorithms and Architectures for Radio Systems, pp.\u00a09\/1\u20139\/5 (1999)","DOI":"10.1049\/ic:19990851"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0164-1212(02)00093-6","volume":"67","author":"H. Chien","year":"2003","unstructured":"Chien, H., Jan, J.: A hybrid authentication protocol for large mobile networks. Journal of Systems and software\u00a067, 123\u2013137 (2003)","journal-title":"Journal of Systems and software"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/3-540-38424-3_19","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"Y. Yacobi","year":"1991","unstructured":"Yacobi, Y.: A key distribution paradox. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 268\u2013273. Springer, Heidelberg (1991)"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity Authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1049\/el:19940052","volume":"30","author":"K. Nyberg","year":"1994","unstructured":"Nyberg, K., Rueppel, R.: Weaknesses in some recent key agreement protocols. Electronics Letters\u00a030, 26\u201327 (1994)","journal-title":"Electronics Letters"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.jss.2005.04.022","volume":"79","author":"Q. Tang","year":"2006","unstructured":"Tang, Q., Mitchell, C.: Cryptanalysis of a hybrid authentication protocol for large mobile networks. The journal of systems and software\u00a079, 496\u2013501 (2006)","journal-title":"The journal of systems and software"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-3-540-78849-2_32","volume-title":"Progress in WWW Research and Development","author":"W. Shi","year":"2008","unstructured":"Shi, W., Jang, I., Yoo, H.: A provable secure authentication protocol given forward secure session key. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol.\u00a04976, pp. 309\u2013318. Springer, Heidelberg (2008)"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.csi.2005.01.001","volume":"28","author":"R. Hwang","year":"2005","unstructured":"Hwang, R., Su, F.: A new efficient authentication protocol for mobile networks. Computer Standards & Interfaces\u00a028, 241\u2013252 (2005)","journal-title":"Computer Standards & Interfaces"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02457-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T08:24:28Z","timestamp":1558427068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02457-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642024566","9783642024573"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02457-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}