{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:19:11Z","timestamp":1775470751207,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642152108","type":"print"},{"value":"9783642152115","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15211-5_25","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T11:38:15Z","timestamp":1284982695000},"page":"241-245","source":"Crossref","is-referenced-by-count":2,"title":["Improving the Security of CHAP Protocol by Quantum Cryptography"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Elboukhari","sequence":"first","affiliation":[]},{"given":"Mostafa","family":"Azizi","sequence":"additional","affiliation":[]},{"given":"Abdelmalek","family":"Azizi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N. Gisin","year":"2002","unstructured":"Gisin, N., et al.: Quantum cryptography. Rev. Mod. Phys.\u00a074, 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"25_CR2","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, Chichester (1995)","edition":"2"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H., et al.: Experimental quantum cryptography. J. Cryptol.\u00a05, 3\u201328 (1992)","journal-title":"J. Cryptol."},{"issue":"5","key":"25_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.4304\/jnw.1.5.9-20","volume":"1","author":"T.M.T. Nguyen","year":"2006","unstructured":"Nguyen, T.M.T., Sfaxi, M.A., Ghernaouti-H\u00e9lie, S.: 802.11 i Encryption Key Distribution Using Quantum Cryptography. JOURNAL OF NETWORKS\u00a01(5), 9 (2006)","journal-title":"JOURNAL OF NETWORKS"},{"issue":"12","key":"25_CR5","first-page":"21","volume":"9","author":"M. Elboukhari","year":"2009","unstructured":"Elboukhari, M., Azizi, M., Azizi, A.: Integration of Quantum Key Distribution in the TLS Protocol. IJCSNS\u00a09(12), 21\u201328 (2009), http:\/\/paper.ijcsns.org\/07_book\/200912\/20091204.pdf (Cited June 07, 2010)","journal-title":"IJCSNS"},{"key":"25_CR6","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proc. IEEE Int. Conf. Computers, Systems and Signal Processing, New York, Bangalore, India, pp. 175\u2013179 (1984)"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Simpson, W.: PPP Challenge Handshake Authentication Protocol (CHAP), RFC 1994 (August 1996)","DOI":"10.17487\/rfc1994"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Simpson, W.: The Point-to-Point Protocol (PPP), RFC1661 (July 1994)","DOI":"10.17487\/rfc1661"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 message-Digest Algorithm, RFC 1321 (April 1992)","DOI":"10.17487\/rfc1321"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15211-5_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:02:41Z","timestamp":1606186961000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15211-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642152108","9783642152115"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15211-5_25","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}