{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:25:49Z","timestamp":1725456349682},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540640400"},{"type":"electronic","value":"9783540696889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0028161","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T01:50:22Z","timestamp":1132624222000},"page":"79-90","source":"Crossref","is-referenced-by-count":59,"title":["Open key exchange: How to defeat dictionary attacks without encrypting public keys"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Lucks","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"issue":"13","key":"7_CR1","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1049\/el:19940697","volume":"30","author":"R. Anderson","year":"1994","unstructured":"R. Anderson, M. Lomas, \u201cFortifying Key Negotiation Schemes with Poorly Chosen Passwords\u201d, Electronics Letters, Vol. 30, No. 13, 1994, 1040\u20131041.","journal-title":"Electronics Letters"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, P. Rogaway, \u201cRandom Oracles are Practical: A Paradigm for Designing Efficient Protocols\u201d, First ACM Conference on Computer and Communications Security, ACM, 1993.","DOI":"10.1145\/168588.168596"},{"key":"7_CR3","unstructured":"M. Bellare, P. Rogaway, \u201cEntity Authentication and Key Distribution\u201d, Crypto '93, Springer LNCS 773."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"S. Bellovin, M. Merritt, \u201cEncrypted key exchange: Password-based protocols secure against dictionary attacks\u201d, Proc. IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, 1992.","DOI":"10.1109\/RISP.1992.213269"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"S. Blake-Wilson, A. Menezes, \u201cSecurity Proofs for Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques\u201d, 1997, these proceedings.","DOI":"10.1007\/BFb0028166"},{"key":"7_CR6","unstructured":"S. Blake-Wilson, private communication."},{"issue":"5","key":"7_CR7","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"L. Gong, M. Lomas, R. Needham, J. Salzer, \u201cProtecting Poorly Chosen Secrets from Guessing Attacks\u201d, IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993, 648\u2013656.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"L. Gong, \u201cOptimal Authentication Protocols Resistant to Password Guessing Attacks\u201d, Proceedings of the 8th IEEE Computer Security Foundations Workshop, 1995, 24\u201329.","DOI":"10.1109\/CSFW.1995.518549"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"D..Jablon, \u201cStrong Password-Only Authenticated Key Exchange\u201d, ACM Computer Communications Review, October 1996.","DOI":"10.1145\/242896.242897"},{"key":"7_CR10","unstructured":"D. Jablon, private communication."},{"key":"7_CR11","unstructured":"S. Patel, \u201cInformation Leakage in Encrypted Key Exchange\u201d, manuscript."},{"key":"7_CR12","unstructured":"B. Schneier \u201cApplied Cryptography\u201d (2nd ed.), Wiley, 1996."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"M. Steiner, G. Tsudik, M. Waidner, \u201cRefinement and Extension of Encrypted Key Exchange\u201d, Operating Systems Review, Vol. 29, No. 3, 22\u201330.","DOI":"10.1145\/206826.206834"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T22:48:57Z","timestamp":1586558937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540640400","9783540696889"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/bfb0028161","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}