{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:40:51Z","timestamp":1743151251829,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819724574"},{"type":"electronic","value":"9789819724581"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-2458-1_5","type":"book-chapter","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T04:01:50Z","timestamp":1713758510000},"page":"56-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Password-Based Mutual Authenticated Key Exchange Scheme by\u00a0Blockchain for\u00a0WBAN"],"prefix":"10.1007","author":[{"given":"Pei","family":"Huang","sequence":"first","affiliation":[]},{"given":"Yaorui","family":"He","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,23]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139\u2013155. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_11"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks (1992)","DOI":"10.1145\/168588.168618"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Security proofs for an efficient password-based key exchange. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 241\u2013250 (2003)","DOI":"10.1145\/948109.948142"},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s11071-014-1304-6","volume":"77","author":"MS Farash","year":"2014","unstructured":"Farash, M.S., Attari, M.A.: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn. 77(1), 399\u2013411 (2014)","journal-title":"Nonlinear Dyn."},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/978-3-030-84259-8_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2021","author":"Y Gu","year":"2021","unstructured":"Gu, Y., Jarecki, S., Krawczyk, H.: KHAPE: asymmetric PAKE from\u00a0key-hiding key exchange. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12828, pp. 701\u2013730. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-84259-8_24"},{"issue":"3","key":"5_CR6","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1145\/322510.322514","volume":"2","author":"S Halevi","year":"1999","unstructured":"Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. ACM Trans. Inf. Syst. Secur. (TISSEC) 2(3), 230\u2013268 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-17697-5_10","volume-title":"Transactions on Computational Science XI","author":"F Hao","year":"2010","unstructured":"Hao, F., Ryan, P.: J-PAKE: authenticated key exchange without PKI. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science XI. LNCS, vol. 6480, pp. 192\u2013206. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17697-5_10"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Harkins, D.: Simultaneous authentication of equals: a secure, password-based key exchange for mesh networks. In: 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008), pp. 839\u2013844. IEEE (2008)","DOI":"10.1109\/SENSORCOMM.2008.131"},{"key":"5_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101655","volume":"101","author":"M Hussain","year":"2019","unstructured":"Hussain, M., Mehmood, A., Khan, S., Khan, M.A., Iqbal, Z.: Authentication techniques and methodologies used in wireless body area networks. J. Syst. Architect. 101, 101655 (2019)","journal-title":"J. Syst. Architect."},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.cmpb.2016.07.022","volume":"135","author":"MH Ibrahim","year":"2016","unstructured":"Ibrahim, M.H., Kumari, S., Das, A.K., Wazid, M., Odelu, V.: Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput. Methods Progr. Biomed. 135, 37\u201350 (2016)","journal-title":"Comput. Methods Progr. Biomed."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Jablon, D.P.: Extended password key exchange protocols immune to dictionary attack. In: Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 248\u2013255. IEEE (1997)","DOI":"10.1109\/ENABL.1997.630822"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-319-78372-7_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"S Jarecki","year":"2018","unstructured":"Jarecki, S., Krawczyk, H., Xu, J.: OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10822, pp. 456\u2013486. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78372-7_15"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"3006","DOI":"10.1109\/TIFS.2022.3198858","volume":"17","author":"J Jiang","year":"2022","unstructured":"Jiang, J., Susilo, W., Baek, J.: Security analysis of \u201csmaka: secure many-to-many authentication and key agreement scheme for vehicular networks\u2019\u2019. IEEE Trans. Inf. Forensics Secur. 17, 3006\u20133007 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"5_CR14","first-page":"45","volume":"19","author":"B Kang","year":"2019","unstructured":"Kang, B., Xie, M., Si, L.: Research on a biometrics-based multi-cloud server authentication scheme. Netinfo Secur. 19(6), 45\u201352 (2019)","journal-title":"Netinfo Secur."},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/3-540-44987-6_29","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"J Katz","year":"2001","unstructured":"Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475\u2013494. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_29"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/11535218_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"H Krawczyk","year":"2005","unstructured":"Krawczyk, H.: HMQV: a high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546\u2013566. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535218_33"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/11593447_30","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"C Kudla","year":"2005","unstructured":"Kudla, C., Paterson, K.G.: Modular security proofs for key agreement protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 549\u2013565. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11593447_30"},{"issue":"5","key":"5_CR18","first-page":"1042","volume":"15","author":"JO Kwon","year":"2009","unstructured":"Kwon, J.O., Jeong, I.R., Lee, D.H.: Light-weight key exchange with different passwords in the standard model. J. Univ. Comput. Sci. 15(5), 1042\u20131064 (2009)","journal-title":"J. Univ. Comput. Sci."},{"key":"5_CR19","unstructured":"software ltd, S.: Miracle. https:\/\/github.com\/miracl\/MIRACL, June 2015"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/BFb0028161","volume-title":"Security Protocols","author":"S Lucks","year":"1998","unstructured":"Lucks, S.: Open key exchange: how to defeat dictionary attacks without encrypting public keys. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 79\u201390. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0028161"},{"key":"5_CR21","volume":"2014","author":"J Nam","year":"2014","unstructured":"Nam, J., et al.: Password only authenticated three-party key exchange with provable security in the standard model. Sci. World J. 2014, 825072 (2014)","journal-title":"Sci. World J."},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Narwal, B., Mohapatra, A.: A review on authentication protocols in wireless body area networks (WBAN). In: 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), pp. 227\u2013232. IEEE (2018)","DOI":"10.1109\/IC3I44769.2018.9007303"},{"issue":"3","key":"5_CR23","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M Steiner","year":"1995","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Refinement and extension of encrypted key exchange. ACM SIGOPS Oper. Syst. Rev. 29(3), 22\u201330 (1995)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"4801","DOI":"10.1109\/TIFS.2021.3116429","volume":"16","author":"P Szalachowski","year":"2021","unstructured":"Szalachowski, P.: Password-authenticated decentralized identities. IEEE Trans. Inf. Forensics Secur. 16, 4801\u20134810 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR25","unstructured":"Thomas, K., et\u00a0al.: Protecting accounts from credential stuffing with password breach alerting. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 1556\u20131571 (2019)"},{"issue":"10","key":"5_CR26","first-page":"83","volume":"21","author":"S Xiao","year":"2021","unstructured":"Xiao, S., Zhang, H., Xiao, H., Chen, F.: A password authentication key agreement protocol for IoT devices. Netinfo Secur. 21(10), 83\u201389 (2021)","journal-title":"Netinfo Secur."},{"issue":"12","key":"5_CR27","first-page":"3687","volume":"65","author":"X Yi","year":"2016","unstructured":"Yi, X., et al.: ID2s password-authenticated key exchange protocols. IEEE Trans. Comput. 65(12), 3687\u20133701 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-04846-3_13","volume-title":"Advances in Information and Computer Security","author":"X Yi","year":"2009","unstructured":"Yi, X., Tso, R., Okamoto, E.: ID-Based group password-authenticated key exchange. In: Takagi, T., Mambo, M. (eds.) IWSEC 2009. LNCS, vol. 5824, pp. 192\u2013211. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04846-3_13"},{"key":"5_CR29","first-page":"45","volume":"12","author":"X Yi","year":"2012","unstructured":"Yi, X., Tso, R., Okamoto, E.: Identity-based password-authenticated key exchange for client\/server model. SECRYPT 12, 45\u201354 (2012)","journal-title":"SECRYPT"},{"key":"5_CR30","doi-asserted-by":"publisher","first-page":"1810","DOI":"10.1109\/TIFS.2020.3044855","volume":"16","author":"J Zhang","year":"2020","unstructured":"Zhang, J., Zhong, H., Cui, J., Xu, Y., Liu, L.: SMAKA: secure many-to-many authentication and key agreement scheme for vehicular networks. IEEE Trans. Inf. Forensics Secur. 16, 1810\u20131824 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR31","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1016\/j.future.2017.02.016","volume":"78","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Xiang, Y., Wu, W., Alelaiwi, A.: A variant of password authenticated key exchange protocol. Futur. Gener. Comput. Syst. 78, 699\u2013711 (2018)","journal-title":"Futur. Gener. Comput. Syst."}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-2458-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,16]],"date-time":"2024-11-16T19:06:50Z","timestamp":1731784010000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-2458-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819724574","9789819724581"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-2458-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yanuca Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fiji","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}