{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:28:45Z","timestamp":1725586125599},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219337"},{"type":"electronic","value":"9783642219344"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21934-4_48","type":"book-chapter","created":{"date-parts":[[2011,6,17]],"date-time":"2011-06-17T14:12:27Z","timestamp":1308319947000},"page":"593-606","source":"Crossref","is-referenced-by-count":3,"title":["Secure Hash-Based Password Authentication Protocol Using Smartcards"],"prefix":"10.1007","author":[{"given":"Hyunhee","family":"Jung","sequence":"first","affiliation":[]},{"given":"Hyun Sung","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"48_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"48_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Security and Privacy 1992, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"48_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P.D., Patel, S.: Provably secure password-authenticated key exchange using diffie-hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 156\u2013171. Springer, Heidelberg (2000)"},{"issue":"9","key":"48_CR5","first-page":"2044","volume":"E83-B","author":"T. Kwon","year":"2000","unstructured":"Kwon, T., Song, J.: A study on the generalized key agreement and password authentication protocol. IEICE Transactions on Communications\u00a0E83-B(9), 2044\u20132050 (2000)","journal-title":"IEICE Transactions on Communications"},{"key":"48_CR6","first-page":"1363","volume":"E83-B","author":"M. Sandirigama","year":"2000","unstructured":"Sandirigama, M., Shimizu, A., Noda, M.: Simple and secure password authentication protocol. IEICE Transactions on Communications\u00a0E83-B, 1363\u20131365 (2000)","journal-title":"IEICE Transactions on Communications"},{"key":"48_CR7","first-page":"2622","volume":"E84-B","author":"C.L. Lin","year":"2001","unstructured":"Lin, C.L., Sun, H.M., Hwang, T.: Attacks and solutions on strong-password authentication. IEICE Transactions on Communications\u00a0E84-B, 2622\u20132627 (2001)","journal-title":"IEICE Transactions on Communications"},{"key":"48_CR8","first-page":"2519","volume":"E85-B","author":"C.M. Chen","year":"2002","unstructured":"Chen, C.M., Ku, W.C.: Stolen-verifier attack on two new strong-password authentication protocols. IEICE Transactions on Communications\u00a0E85-B, 2519\u20132521 (2002)","journal-title":"IEICE Transactions on Communications"},{"key":"48_CR9","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/583800.583803","volume":"36","author":"C.C. Lee","year":"2002","unstructured":"Lee, C.C., Li, L.H., Hwang, M.S.: A remote user authentication scheme using hash functions. ACM Operating System Review\u00a036, 23\u201329 (2002)","journal-title":"ACM Operating System Review"},{"key":"48_CR10","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1016\/S0167-4048(00)05032-X","volume":"19","author":"M. Peyravian","year":"2000","unstructured":"Peyravian, M., Zunic, N.: Methods for protecting password transmissions. Computers and Security\u00a019, 466\u2013469 (2000)","journal-title":"Computers and Security"},{"key":"48_CR11","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/991130.991135","volume":"38","author":"E.J. Yoon","year":"2004","unstructured":"Yoon, E.J., Ryu, E.K., Yoo, K.Y.: A secure user authentication scheme using hash functions. ACM Operating System Review\u00a038, 62\u201368 (2004)","journal-title":"ACM Operating System Review"},{"key":"48_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1044552.1044561","volume":"39","author":"W.C. Ku","year":"2005","unstructured":"Ku, W.C., Chiang, M.H., Chang, S.T.: Weaknesses of Yoon-Ryu-Yoo\u2019s hash-based password authentication scheme. ACM Operating System Review\u00a039, 85\u201389 (2005)","journal-title":"ACM Operating System Review"},{"key":"48_CR13","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1134\/S1064230706040137","volume":"45","author":"Kim","year":"2006","unstructured":"Kim, Ko\u00e7: A secure hash-based strong-password authentication protocol using one-time public-key cryptography. Journal of Computer and Systems Sciences International\u00a045, 623\u2013626 (2006)","journal-title":"Journal of Computer and Systems Sciences International"},{"key":"48_CR14","first-page":"1845","volume":"26","author":"H. Jeong","year":"2010","unstructured":"Jeong, H., Won, D., Kim, S.: Weaknesses and improvement of secure hash-based strong-password authentication protocol. Journal of Information Science and Engineering\u00a026, 1845\u20131858 (2010)","journal-title":"Journal of Information Science and Engineering"},{"key":"48_CR15","unstructured":"Wikipedia, \n                    \n                      http:\/\/en.wikipedia.org\/wiki\/Client%E2%80%93server_model"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21934-4_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T19:27:31Z","timestamp":1553801251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21934-4_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219337","9783642219344"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21934-4_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}