{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:38Z","timestamp":1725550898993},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_111","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"605-608","source":"Crossref","is-referenced-by-count":1,"title":["Unknown Key Share Attack on STPKE\u2019 Protocol"],"prefix":"10.1007","author":[{"given":"R.","family":"Padmavathy","sequence":"first","affiliation":[]},{"given":"Chakravarthy","family":"Bhagvati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"111_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.compeleceng.2007.01.001","volume":"34","author":"T.H. Chen","year":"2008","unstructured":"Chen, T.H., Lee, W.B.: A new method for using hash functions to solve remote user authentication. Comput. Electr. Eng.\u00a034(1), 53\u201362 (2008)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"111_CR2","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.compeleceng.2005.03.001","volume":"31","author":"H.T. Yeh","year":"2005","unstructured":"Yeh, H.T., Sun, H.M.: Password authenticated key exchange protocols among diverse network domains. Comput. Electr. Eng.\u00a031(3), 175\u2013189 (2005)","journal-title":"Comput. Electr. Eng."},{"issue":"4","key":"111_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/219282.219298","volume":"29","author":"Y. Ding","year":"1995","unstructured":"Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. ACM Operat. Syst. Rev.\u00a029(4), 77\u201386 (1995)","journal-title":"ACM Operat. Syst. Rev."},{"issue":"1","key":"111_CR4","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.cose.2006.08.005","volume":"26","author":"R. Lu","year":"2007","unstructured":"Lu, R., Cao, Z.: Simple three-party key exchange protocol. Comput. Secur.\u00a026(1), 94\u201397 (2007)","journal-title":"Comput. Secur."},{"issue":"1","key":"111_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.compeleceng.2008.05.007","volume":"35","author":"C. Kim","year":"2008","unstructured":"Kim, C.: Enhanced Password-based simple three-party Key exchange protocol. Computers and Electrical Engineering\u00a035(1), 107\u2013114 (2008) (in press)","journal-title":"Computers and Electrical Engineering"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_111.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:05:49Z","timestamp":1619784349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_111","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}