{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:25:31Z","timestamp":1725456331508},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540632320"},{"type":"electronic","value":"9783540692379"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0027936","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T06:46:12Z","timestamp":1132641972000},"page":"294-302","source":"Crossref","is-referenced-by-count":49,"title":["On key agreement and conference key agreement"],"prefix":"10.1007","author":[{"given":"Colin","family":"Boyd","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,16]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"S. Bakhtiari, R. Safavi-Naini and J. Pieprzyk, \u201cKeyed Hash Functons, Cryptography: Policy and Algorithms, Springer-Verlag, LNCS 1029, pp.210\u2013214, 1996.","DOI":"10.1007\/BFb0032359"},{"key":"27_CR2","unstructured":"T. Berson, L. Gong and M. Lomas, \u201cSecure, Keyed and Collisionful Hash Function\u201d, Technical Report, SRI International, September 1994."},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"C. Boyd, \u201cTowards a Classification of Key Agreement Protocols\u201d, IEEE Computer Security Foundations Workshop, pp.38\u201343, IEEE Press 1995.","DOI":"10.1109\/CSFW.1995.518551"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"M. Burmester and Y. Desmedt, \u201cA Secure and Efficient Conference Key Distribution System\u201d, Advances in Cryptology \u2014 Eurocrypt 94, Springer-Verlag, 1995, pp.275\u2013286.","DOI":"10.1007\/BFb0053443"},{"issue":"6","key":"27_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman, \u201cNew Directions in Cryptography\u201d, IEEE Transactions on Information Theory, IT-22, 6, pp. 644\u2013654, 1976.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"27_CR6","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"IT-28","author":"I. Ingemarsson","year":"1982","unstructured":"I. Ingemarsson, D. Tang and C. Wong, \u201cA Conference Key Distribution Scheme\u201d, IEEE Transactions on Information Theory, IT-28, 5, September 1982, pp. 714\u2013720.","journal-title":"IEEE Transactions on Information Theory"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"M. Just and S. Vaudenay, \u201cAuthenticated Multi-Party Key Agreement\u201d, Advances in Cryptology \u2014 Asiacrypt 96, Springer-Verlag, 1996, pp.26\u201335.","DOI":"10.1007\/BFb0034833"},{"key":"27_CR8","unstructured":"B. Klein, M. Otten and T. Beth, \u201cConference Key Distribution Protocols in Distributed Systems\u201d, Codes and Cyphers \u2014 Cryptography and Coding IV, IMA, 1995, pp.225\u2013242."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"B. Preneel and P. van Oorschot, \u201cMDx-MAC and Building Fast MACs from Hash Functions\u201d, Advances in Cryptology \u2014 Crypto '95, Springer-Verlag, 1995, pp.1\u201314.","DOI":"10.1007\/3-540-44750-4_1"},{"key":"27_CR10","unstructured":"M. Rabin, \u201cDigitalized Signatures and Public-Key Functions as Intractable as Factorization\u201d, MIT Laboratory for Computer Science, 1979."},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"R. Rueppel and P. van Oorschot, \u201cModern Key Agreement Techniques\u201d, Computer Communications, July 1994.","DOI":"10.1016\/0140-3664(94)90100-7"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0027936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:47:30Z","timestamp":1586573250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0027936"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540632320","9783540692379"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/bfb0027936","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}