{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:26:04Z","timestamp":1725715564374},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362514"},{"type":"electronic","value":"9783642362521"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36252-1_24","type":"book-chapter","created":{"date-parts":[[2013,2,9]],"date-time":"2013-02-09T04:16:01Z","timestamp":1360383361000},"page":"263-270","source":"Crossref","is-referenced-by-count":0,"title":["Novel Three-Party Password-Based Authenticated Key Exchange Protocol for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Qiaomin","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yangjunxiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xing","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Faxin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ruchuan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"24_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M. Steiner","year":"1995","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Refinement and extension of encrypted key exchange. ACM Operating Systems Review\u00a029(3), 22\u201330 (1995)","journal-title":"ACM Operating Systems Review"},{"issue":"4","key":"24_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/219282.219298","volume":"29","author":"Y. Ding","year":"1995","unstructured":"Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. ACM Operating Systems Review\u00a029(4), 77\u201386 (1995)","journal-title":"ACM Operating Systems Review"},{"key":"24_CR3","unstructured":"Hamed, A.I., El-Khamy, S.E.: New Low Complexity Key Exchange and Encryption protocols for Wireless Sensor Networks Clusters based on Elliptic Curve Cryptography. In: 2009 National Radio Science Conference: NRSC 2009, vol. 1, 2, pp. 454\u2013466 (2009)"},{"issue":"8","key":"24_CR4","first-page":"69","volume":"38","author":"M. Deng","year":"2010","unstructured":"Deng, M., Huang, Z., Lu, Z.: Authenticated key exchange protocol for medical sensor network. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)\/Journal of Huazhong University of Science and Technology (Natural Science Edition)\u00a038(8), 69\u201372 (2010)","journal-title":"Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)\/Journal of Huazhong University of Science and Technology (Natural Science Edition)"},{"issue":"7","key":"24_CR5","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.cose.2004.06.007","volume":"23","author":"T.F. Lee","year":"2004","unstructured":"Lee, T.F., Hwang, T., Lin, C.L.: Enhanced three-party encrypted key exchange without server\u2019s public keys. Computers and Security\u00a023(7), 571\u2013577 (2004)","journal-title":"Computers and Security"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Le Xuan, H., Lee, S., Lee, L.K.: A key-exchanging scheme for distributed sensor networks. In: Intelligence in Communication Systems, pp. 271\u2013279 (2005)","DOI":"10.1007\/0-387-32015-6_25"},{"issue":"1","key":"24_CR7","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.cose.2006.08.005","volume":"26","author":"R. Lu","year":"2007","unstructured":"Lu, R., Cao, Z.: Simple three-party key exchange protocol. Computers & Security\u00a026(1), 94\u201397 (2007)","journal-title":"Computers & Security"},{"issue":"4","key":"24_CR8","first-page":"953","volume":"4","author":"T.F. Chang","year":"2008","unstructured":"Chang, T.F.: A practical three-party key exchange protocol with round efficiency. International Journal of Innovative Computing, Information and Control\u00a04(4), 953\u2013960 (2008)","journal-title":"International Journal of Innovative Computing, Information and Control"},{"issue":"9","key":"24_CR9","doi-asserted-by":"publisher","first-page":"1702","DOI":"10.1016\/j.ins.2010.01.005","volume":"180","author":"T. Lee","year":"2010","unstructured":"Lee, T., Hwang, T.: Simple password-based three-party authenticated key exchange without server public keys. Information Sciences\u00a0180(9), 1702\u20131714 (2010)","journal-title":"Information Sciences"},{"issue":"11","key":"24_CR10","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1002\/dac.1304","volume":"24","author":"C. Lin","year":"2011","unstructured":"Lin, C., Hwang, T.: On a simple three-party password-based key exchange protocol. International Journal of Communication Systems\u00a024(11), 1520\u20131532 (2011)","journal-title":"International Journal of Communication Systems"},{"issue":"11","key":"24_CR11","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/LCOMM.2005.11006","volume":"9","author":"X. Tian","year":"2005","unstructured":"Tian, X., Wong, D.S., Zhu, R.W.: Analysis and improvement of an authenticated key exchange protocol for sensor networks. IEEE Communications Letters\u00a09(11), 970\u2013972 (2005)","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"24_CR12","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.ins.2010.08.032","volume":"181","author":"T. Chang","year":"2011","unstructured":"Chang, T., Hwang, M., Yang, W.: A communication-efficient three-party password authenticated key exchange protocol. Information Sciences\u00a0181(1), 217\u2013226 (2011)","journal-title":"Information Sciences"}],"container-title":["Communications in Computer and Information Science","Advances in Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36252-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T00:40:56Z","timestamp":1557535256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36252-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362514","9783642362521"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36252-1_24","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}