{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:28:54Z","timestamp":1744086534134,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_27","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"264-271","source":"Crossref","is-referenced-by-count":1,"title":["Three-Way Handshake-Based OTP Using Random Host-Side Keys for Effective Key Transfer in Symmetric Cryptosystems"],"prefix":"10.1007","author":[{"given":"P. R.","family":"Mahalingam","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Spencer, J.: On the (non)universality of the one-time pad. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 376\u2013385 (2002)","DOI":"10.1109\/SFCS.2002.1181962"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Yadav, D., Sardana, A.: Enhanced 3-way handshake protocol for key exchange in IEEE 802.11i. In: 3rd International Conference on Electronics Computer Technology, ICECT, pp. 132\u2013135 (2011)","DOI":"10.1109\/ICECTECH.2011.5942066"},{"key":"27_CR3","unstructured":"Deng, S.: Compare of New Security Strategy With Several Others in WLAN. In: 2nd International Conference on Computer Engineering and Technology, ICCET (2010)"},{"issue":"4","key":"27_CR4","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1080\/0161-119091864986","volume":"14","author":"T. Rittera","year":"1990","unstructured":"Rittera, T.: Substitution Cipher with pseudorandom Shuffling: The Dynamic Substitution Combiner. Cryptologia\u00a014(4), 289\u2013303 (1990)","journal-title":"Cryptologia"},{"key":"27_CR5","unstructured":"Zhang, L., Han, W., Zheng, D., Chen, K.: A Security Solution of WLAN Based on Public Key Cryptosystem. In: Proceedings of the 2005 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, pp. 123\u2013127 (2005)"},{"key":"27_CR6","unstructured":"Zeynep Gurkas, G., Halim Zaim, A., Ali Aydin, M.: Security Mechanisms and Their Performance Impacts on Wireless Local Area Networks. In: Proceedings of the Seventh IEEE International Symposium on Computer Networks, ISCN 2006, pp. 14\u201318 (2006)"},{"key":"27_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-540-30577-4_32","volume-title":"SOFSEM 2005: Theory and Practice of Computer Science","author":"D. Raub","year":"2005","unstructured":"Raub, D., Steinwandt, R., M\u00fcller-Quade, J.: On the Security and Composability of the One Time Pad. In: Vojt\u00e1\u0161, P., Bielikov\u00e1, M., Charron-Bost, B., S\u00fdkora, O. (eds.) SOFSEM 2005. LNCS, vol.\u00a03381, pp. 288\u2013297. Springer, Heidelberg (2005)"},{"issue":"10","key":"27_CR8","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1016\/S0140-3664(99)00064-X","volume":"22","author":"B. Harris","year":"1999","unstructured":"Harris, B., Hunt, R.: TCP\/IP security threats and attack methods. Computer Communications\u00a022(10), 885\u2013897 (1999)","journal-title":"Computer Communications"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Lindquist, T.E., Diarra, M., Millard, B.R.: A Java cryptography service provider implementing one-time pad. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences (2004)","DOI":"10.1109\/HICSS.2004.1265452"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Apostolopoulos, G., Peris, V., Saha, D.: Transport layer security: how much does it really cost? In: Proceedings of IEEE Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 1999, vol.\u00a02, pp. 717\u2013725 (1999)","DOI":"10.1109\/INFCOM.1999.751458"},{"key":"27_CR11","unstructured":"Parthasarathy, M.: Analysis of network management of remote network elements. In: International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (2006)"},{"key":"27_CR12","unstructured":"Shefi, A.: System and method for synchronizing one time pad encryption keys for secure communication and access control, US Patent 6,445,794 (2002)"},{"key":"27_CR13","unstructured":"Glover, J.J.: One-time pad Encryption key Distribution, US Patent 6,868,495 (2005)"},{"key":"27_CR14","unstructured":"Hammersmith, W.S.: One-time-pad encryption with central key service and key management, US Patent App. 10\/254,754 (2002)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:29:18Z","timestamp":1744079358000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}