{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T12:05:57Z","timestamp":1648814757669},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,9,30]],"date-time":"2008-09-30T00:00:00Z","timestamp":1222732800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s10207-008-0063-0","type":"journal-article","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T11:46:25Z","timestamp":1222688785000},"page":"49-60","source":"Crossref","is-referenced-by-count":4,"title":["Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions"],"prefix":"10.1007","volume":"8","author":[{"given":"Atefeh","family":"Mashatan","sequence":"first","affiliation":[]},{"given":"Douglas R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,9,30]]},"reference":[{"key":"63_CR1","unstructured":"Balfanz, D., Smetters, D.K., Stewart, P., Wong H.C.: Talking to strangers: authentication in ad hoc wireless networks, In: Network and Distributed System Security Symposium, San Diego, February 2002"},{"issue":"1","key":"63_CR2","first-page":"29","volume":"7","author":"C. Gehrmann","year":"2004","unstructured":"Gehrmann C., Mitchell C.J., Nyberg K.: Manual authentication for wireless devices. RSA Cryptobytes 7(1), 29\u201337 (2004)","journal-title":"RSA Cryptobytes"},{"key":"63_CR3","doi-asserted-by":"crossref","unstructured":"Gehrmann C., Nyberg K.: Security in personal area networks, Security for Mobility, pp. 191\u2013230. IEE, London (2004)","DOI":"10.1049\/PBTE051E_ch9"},{"key":"63_CR4","doi-asserted-by":"crossref","unstructured":"Hoepman, J.-H.: The ephemeral pairing problem. In: Financial Cryptography, pp. 212\u2013226. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-27809-2_22"},{"key":"63_CR5","unstructured":"Mashatan, A., Stinson, D.R.: Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions. Cryptology ePrint Archive, Report 2006\/302 (2006) http:\/\/eprint.iacr.org\/"},{"issue":"3","key":"63_CR6","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1049\/iet-ifs:20060131","volume":"1","author":"A. Mashatan","year":"2007","unstructured":"Mashatan A., Stinson D.R.: Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions. IET Inf. Secur. 1(3), 111\u2013118 (2007)","journal-title":"IET Inf. Secur."},{"key":"63_CR7","doi-asserted-by":"crossref","unstructured":"Naor, M., Segev, G., Smith, A.: Tight bounds for unconditional authentication protocols in the manual channel and shared key models. In: Advances in Cryptology\u2014CRYPTO \u201906, pp. 214\u2013231 (2006)","DOI":"10.1007\/11818175_13"},{"key":"63_CR8","doi-asserted-by":"crossref","unstructured":"Pasini, S., Vaudenay, S.: An optimal non-interactive message authentication protocol. In: Pointcheval, D. (ed.) Topics in Cryptography, Lecture Notes in Computer Science, vol. 3860, pp. 280\u2013294. Springer, San Jose (2006)","DOI":"10.1007\/11605805_18"},{"issue":"4","key":"63_CR9","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1145\/358027.358053","volume":"27","author":"R.L. Rivest","year":"1984","unstructured":"Rivest R.L., Shamir A.: How to expose an eavesdropper. Commun. ACM 27(4), 393\u2013394 (1984)","journal-title":"Commun. ACM"},{"key":"63_CR10","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad hoc wireless networks. In: Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols, Seventh International Workshop Pro-ceedings, Lecture Notes in Computer Science (1999)","DOI":"10.1007\/10720107_24"},{"key":"63_CR11","doi-asserted-by":"crossref","unstructured":"Vaudenay, S.: Secure communications over insecure channels based on short authenticated strings. In: Shoup, V. (ed.) Advances in Cryptography, CRYPTO 05: The 25th Annual International Cryptology Conference, Lecture Notes in Computer Science, vol. 3621. pp. 309\u2013326. Springer, Santa Barbara (2005)","DOI":"10.1007\/11535218_19"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0063-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-008-0063-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0063-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:23Z","timestamp":1559127683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-008-0063-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,30]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["63"],"URL":"https:\/\/doi.org\/10.1007\/s10207-008-0063-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9,30]]}}}