{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:43:06Z","timestamp":1725702186558},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_5","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"45-53","source":"Crossref","is-referenced-by-count":0,"title":["Protocol for Secure Submissions into Learning Management Systems"],"prefix":"10.1007","author":[{"given":"Manjunath","family":"Mattam","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. In: IEEE Computer Society Symposium on Research in Security and Privacy (1994)","DOI":"10.1109\/RISP.1994.296587"},{"key":"5_CR2","unstructured":"Anderson, R., Needham, R.: Programming Satan\u2019s Computer. Cambridge University Computer Laboratory"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merrit, M.: Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. In: 1992 IEEE Computer Society Symposium on Research in Security and Privacy (1992)","DOI":"10.1145\/168588.168618"},{"key":"5_CR4","unstructured":"Richard Stevens, W.: UNIX Network Programming: Networking APIs: Sockets and XTI, 2nd edn., vol.\u00a01. Prentice Hall (1998) ISBN 0-13-490012-X"},{"key":"5_CR5","volume-title":"Proc. of the 30th STOC","author":"M. Bellare","year":"1998","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: Proc. of the 30th STOC. ACM Press, New York (1998)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R. Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password security: a case history. Communications of the ACM\u00a022, 594\u2013597 (1979)","journal-title":"Communications of the ACM"},{"key":"5_CR8","unstructured":"Glass, E.: The NTLM authentication protocol (2003)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:58Z","timestamp":1620132358000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}