{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:54:51Z","timestamp":1725771291469},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_26","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T09:26:22Z","timestamp":1391765182000},"page":"288-297","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis of Yang et al.\u2019s Digital Rights Management Authentication Scheme Based on Smart Card"],"prefix":"10.1007","author":[{"given":"Dheerendra","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Sourav","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","first-page":"1311","volume":"arXiv","author":"D. Mishra","year":"2013","unstructured":"Mishra, D.: A study on id-based authentication schemes for telecare medical information system. arXiv preprint arXiv:1311.0151 (2013)","journal-title":"arXiv preprint"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-38033-4_23","volume-title":"Information Security Practice and Experience","author":"D. Mishra","year":"2013","unstructured":"Mishra, D., Mukhopadhyay, S.: Secure content delivery in drm system with consumer privacy. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol.\u00a07863, pp. 321\u2013335. Springer, Heidelberg (2013)"},{"issue":"2","key":"26_CR3","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MP.2006.1649008","volume":"25","author":"S. Subramanya","year":"2006","unstructured":"Subramanya, S., Yi, B.K.: Digital rights management. IEEE Potentials\u00a025(2), 31\u201334 (2006)","journal-title":"IEEE Potentials"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Yang, H.W., Yang, C.C., Lin, W.: Enhanced digital rights management authentication scheme based on smart card. Institution of Engineering and Technology (2013)","DOI":"10.1049\/iet-ifs.2012.0191"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, Y.C., Yang, L., Xu, P., Zhan, Y.S.: A drm authentication scheme based on smart-card. In: International Conference on Computational Intelligence and Security, CIS 2009, vol.\u00a02, pp. 202\u2013207. IEEE (2009)","DOI":"10.1109\/CIS.2009.182"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T03:12:20Z","timestamp":1558840340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}