{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:44:52Z","timestamp":1725551092881},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121883"},{"type":"electronic","value":"9783642121890"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12189-0_21","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T18:11:05Z","timestamp":1270059065000},"page":"236-251","source":"Crossref","is-referenced-by-count":1,"title":["An Identifiable Yet Unlinkable Authentication System with Smart Cards for Multiple Services"],"prefix":"10.1007","author":[{"given":"Toru","family":"Nakamura","sequence":"first","affiliation":[]},{"given":"Shunsuke","family":"Inenaga","sequence":"additional","affiliation":[]},{"given":"Daisuke","family":"Ikeda","sequence":"additional","affiliation":[]},{"given":"Kensuke","family":"Baba","sequence":"additional","affiliation":[]},{"given":"Hiroto","family":"Yasuura","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"OpenID, \n                    \n                      http:\/\/openid.net\/","key":"21_CR1"},{"unstructured":"Shibboleth, \n                    \n                      http:\/\/shibboleth.internet2.edu\/","key":"21_CR2"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/3-540-45708-9_11","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"M. Bellare","year":"2002","unstructured":"Bellare, M., Palacio, A.: GQ and schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, p. 162. Springer, Heidelberg (2002)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013270. Springer, Heidelberg (1991)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/3-540-63594-7_64","volume-title":"Financial Cryptography","author":"E. Gabber","year":"1997","unstructured":"Gabber, E., Information, C., Gibbons, P.B., Matias, Y., Mayer, A.: How to make personalized web browsing simple, secure and anonymous. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol.\u00a01318, pp. 17\u201331. Springer, Heidelberg (1997)"},{"key":"21_CR7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography. Cambridge University Press, Cambridge (2001)"},{"issue":"4","key":"21_CR8","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM (JACM)\u00a033(4), 792\u2013807 (1986)","journal-title":"Journal of the ACM (JACM)"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1093\/comjnl\/bxm030","volume":"50","author":"R.J. Hwang","year":"2007","unstructured":"Hwang, R.J., Shiau, S.H.: Provably efficient authenticated key agreement protocol for multi-servers. The Computer Journal\u00a050, 602\u2013615 (2007)","journal-title":"The Computer Journal"},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"W.S. Juang","year":"2004","unstructured":"Juang, W.S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics\u00a050, 251\u2013255 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"1","key":"21_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"Y.P. Liao","year":"2009","unstructured":"Liao, Y.P., Wang, S.S.: A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer standards and interfaces\u00a031(1), 24\u201329 (2009)","journal-title":"Computer standards and interfaces"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology\u00a04, 161\u2013174 (1991)","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12189-0_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T08:04:34Z","timestamp":1619769874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12189-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121883","9783642121890"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12189-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}