{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:21:24Z","timestamp":1725888084194},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811050404"},{"type":"electronic","value":"9789811050411"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5041-1_1","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T03:14:39Z","timestamp":1494645279000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Single Password Authentication Protocol"],"prefix":"10.1007","author":[{"given":"Pramote","family":"Kuacharoen","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"issue":"1","key":"1_CR1","doi-asserted-by":"crossref","first-page":"187","DOI":"10.3745\/JIPS.2011.7.1.187","volume":"7","author":"JJ Kim","year":"2011","unstructured":"Kim, J.J., Hong, S.P.: A method of risk assessment for multi-factor authentication. J. Inf. Process. Syst. 7(1), 187\u2013198 (2011)","journal-title":"J. Inf. Process. Syst."},{"key":"1_CR2","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2016","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 7th edn. Prentice Hall, Upper Saddle River (2016)","edition":"7"},{"issue":"1","key":"1_CR3","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.clsr.2015.12.004","volume":"32","author":"E Kennedy","year":"2016","unstructured":"Kennedy, E., Millard, C.: Data security and multi-factor authentication: analysis of requirements under EU law and in selected EU member states. Comp. Law Secur. Rev. 32(1), 91\u2013110 (2016)","journal-title":"Comp. Law Secur. Rev."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Kuacharoen, P.: A practical customer privacy protection on shared servers. In: International Conference on Information Theory and Information Security (ICITIS), pp. 525\u2013529 (2010)","DOI":"10.1109\/ICITIS.2010.5689544"},{"key":"1_CR5","unstructured":"Internet Security Glossary, IETF RFC 2828-2000"},{"key":"1_CR6","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"I Liao","year":"2006","unstructured":"Liao, I., Lee, C., Hwang, M.: A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72, 727\u2013740 (2006)","journal-title":"J. Comput. Syst. Sci."},{"key":"1_CR7","unstructured":"Ross, B., et al.: Stronger password authentication using browser extensions. In: 14th Usenix Security Symposium, pp. 17\u201331 (2005)"},{"issue":"13","key":"1_CR8","doi-asserted-by":"crossref","first-page":"3715","DOI":"10.1016\/j.comnet.2007.03.007","volume":"51","author":"MG Gouda","year":"2007","unstructured":"Gouda, M.G., et al.: SPP: an anti-phishing single password protocol. Comput. Netw. 51(13), 3715\u20133726 (2007). Elsevier","journal-title":"Comput. Netw."},{"issue":"13","key":"1_CR9","doi-asserted-by":"crossref","first-page":"2597","DOI":"10.1016\/j.comnet.2013.05.007","volume":"57","author":"T Acar","year":"2013","unstructured":"Acar, T., et al.: Single password authentication. Comput. Netw. 57(13), 2597\u20132614 (2013). Elsevier","journal-title":"Comput. Netw."}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5041-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T03:14:56Z","timestamp":1494645296000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5041-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050404","9789811050411"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5041-1_1","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}