{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T00:54:09Z","timestamp":1717808049736},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2010,1,3]],"date-time":"2010-01-03T00:00:00Z","timestamp":1262476800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1007\/s10623-009-9352-5","type":"journal-article","created":{"date-parts":[[2010,1,2]],"date-time":"2010-01-02T00:55:55Z","timestamp":1262393755000},"page":"169-188","source":"Crossref","is-referenced-by-count":6,"title":["Practical unconditionally secure two-channel message authentication"],"prefix":"10.1007","volume":"55","author":[{"given":"Atefeh","family":"Mashatan","sequence":"first","affiliation":[]},{"given":"Douglas R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,3]]},"reference":[{"key":"9352_CR1","unstructured":"Balfanz D., Smetters D.K., Stewart P., Wong H.C.: Talking to strangers: authentication in ad-hoc wireless networks. In: Network and distributed system security symposium, San Diego, California, February (2002)."},{"key":"9352_CR2","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.cmpb.2008.02.001","volume":"91","author":"M. Chan","year":"2008","unstructured":"Chan M., Est\u00e8ve D., Escriba C., Campo E.: A review of smart homes-present state and future challenges. Comput. Method Prog. Biomed. 91, 55\u201381 (2008)","journal-title":"Comput. Method Prog. Biomed."},{"key":"9352_CR3","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1504\/IJEH.2004.004655","volume":"1","author":"G. Demiris","year":"2004","unstructured":"Demiris G.: Electronic home healthcare: concepts and challenges. Int. J. Electron. Healthc. 1, 4\u201316 (2004)","journal-title":"Int. J. Electron. Healthc."},{"key":"9352_CR4","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1023\/A:1008277509057","volume":"15","author":"C. Gehrmann","year":"1998","unstructured":"Gehrmann C.: Multiround unconditionally secure authentication. Des. Codes Cryptogr. 15, 67\u201386 (1998)","journal-title":"Des. Codes Cryptogr."},{"key":"9352_CR5","first-page":"29","volume":"7","author":"C. Gehrmann","year":"2004","unstructured":"Gehrmann C., Mitchell C.J., Nyberg K.: Manual authentication for wireless devices. RSA Cryptobytes 7, 29\u201337 (2004)","journal-title":"RSA Cryptobytes"},{"key":"9352_CR6","doi-asserted-by":"crossref","unstructured":"Gehrmann C., Nyberg K.: Security in personal area networks. In: Security for mobility, pp. 191\u2013230. IEE, London (2004).","DOI":"10.1049\/PBTE051E_ch9"},{"key":"9352_CR7","doi-asserted-by":"crossref","unstructured":"Hoepman J.-H.: The ephemeral pairing problem. Lecture Notes in Computer Science, (Financial Cryptography) vol. 3110, pp. 212\u2013226 (2004).","DOI":"10.1007\/978-3-540-27809-2_22"},{"key":"9352_CR8","doi-asserted-by":"crossref","unstructured":"Kainda R., Flechais I., Roscoe A.W.: Usability and security of out-of-band channels in secure device pairing protocols. In: Symposium on usable privacy and security (SOUPS 2009) (2009).","DOI":"10.1145\/1572532.1572547"},{"key":"9352_CR9","doi-asserted-by":"crossref","unstructured":"Krawczyk H.: LFSR-based hashing and authentication. Lecture Notes in Computer Science, vol. 839, pp. 129\u2013139, (CRYPTO 1994) (1994).","DOI":"10.1007\/3-540-48658-5_15"},{"key":"9352_CR10","doi-asserted-by":"crossref","unstructured":"Laur S., Nyberg K.: Efficient mutual data authentication using manually authenticated strings. Lecture Notes in Computer Science, vol. 4301, pp. 90\u2013107, (CANS 2006) (2006).","DOI":"10.1007\/11935070_6"},{"key":"9352_CR11","unstructured":"Laur S., Pasini S.: SAS-Based group authentication and key agreement protocols. Lecture Notes in Computer Science, vol. 4939, pp. 197\u2013213, (PKC 2008) (2008)."},{"issue":"1\/2","key":"9352_CR12","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1504\/IJSN.2009.023427","volume":"4","author":"S. Laur","year":"2009","unstructured":"Laur S., Pasini S.: User-aided data authentication. Int. J. Secur. Netw. 4(1\/2), 69\u201386 (2009)","journal-title":"Int. J. Secur. Netw."},{"key":"9352_CR13","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1049\/iet-ifs:20060131","volume":"1","author":"A. Mashatan","year":"2007","unstructured":"Mashatan A., Stinson D.R.: Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions. IET Inform. Secur. 1, 111\u2013118 (2007)","journal-title":"IET Inform. Secur."},{"key":"9352_CR14","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10207-008-0063-0","volume":"8","author":"A. Mashatan","year":"2009","unstructured":"Mashatan A., Stinson D.R.: Interactive two-channel message authentication based on interactive-collision resistant hash functions. Int. J. Inform. Secur. 8, 49\u201360 (2009)","journal-title":"Int. J. Inform. Secur."},{"key":"9352_CR15","doi-asserted-by":"crossref","unstructured":"Naor M., Segev G., Smith A.: Tight bounds for unconditional authentication protocols in the manual channel and shared key models. Lecture Notes in Computer Science, vol. 4117, pp. 214\u2013231, (CRYPTO 2006) (2006).","DOI":"10.1007\/11818175_13"},{"key":"9352_CR16","doi-asserted-by":"crossref","first-page":"2408","DOI":"10.1109\/TIT.2008.921691","volume":"54","author":"M. Naor","year":"2008","unstructured":"Naor M., Segev G., Smith A.: Tight bounds for unconditional authentication protocols in the manual channel and shared key models. IEEE Trans. Inform. Theory. 54, 2408\u20132425 (2008)","journal-title":"IEEE Trans. Inform. Theory."},{"key":"9352_CR17","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.ic.2007.07.010","volume":"206","author":"L.H. Nguyen","year":"2008","unstructured":"Nguyen L.H., Roscoe A.W.: Authenticating ad hoc networks by comparison of short digests. Inform. Comput. 206, 250\u2013271 (2008)","journal-title":"Inform. Comput."},{"key":"9352_CR18","unstructured":"Pasini S., Vaudenay S.: An optimal non-interactive message authentication protocol. Lecture Notes in Computer Science, vol. 3860, pp. 280\u2013294, (CT-RSA 2006) (2006)."},{"key":"9352_CR19","doi-asserted-by":"crossref","unstructured":"Pasini S., Vaudenay S.: SAS-based authenticated key agreement. Lecture Notes in Computer Science, vol. 3958, pp. 395\u2013409, (PKC 2006) (2006).","DOI":"10.1007\/11745853_26"},{"key":"9352_CR20","doi-asserted-by":"crossref","unstructured":"Reyhanitabar M.R., Wang S., Safavi-Naini R.: Non-interactive manual channel message authentication based on eTCR hash functions. Lecture Notes in Computer Science, vol. 4586, pp. 385\u2013399, (ACISP 2007) (2007).","DOI":"10.1007\/978-3-540-73458-1_28"},{"key":"9352_CR21","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1145\/358027.358053","volume":"27","author":"R.L. Rivest","year":"1984","unstructured":"Rivest R.L., Shamir A.: How to expose an eavesdropper. Commun. ACM. 27, 393\u2013394 (1984)","journal-title":"Commun. ACM."},{"key":"9352_CR22","unstructured":"Simmons G.J.: Authentication theory\/coding theory. Lecture Notes in Computer Science, vol. 196, pp. 411\u2013431, (CRYPTO 1984) (1985)."},{"key":"9352_CR23","unstructured":"Stajano F., Anderson R.: The resurrecting duckling: security issues for ad-hoc wireless networks. Lecture Notes in Computer Science (Security Protocols, Seventh International Workshop), vol. 1796, pp. 172\u2013182, (1999)."},{"key":"9352_CR24","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/BF01388651","volume":"4","author":"D.R. Stinson","year":"1994","unstructured":"Stinson D.R.: Universal hashing and authentication codes. Des. Codes Cryptogr. 4, 369\u2013380 (1994)","journal-title":"Des. Codes Cryptogr."},{"key":"9352_CR25","unstructured":"Stinson D.R.: On the connections between universal hashing, combinatorial designs and error-correcting codes. Congressus Numerantium (Twenty-fifth Manitoba conference on combinatorial mathematics and computing), vol. 114, pp. 7\u201327, (1996)."},{"key":"9352_CR26","unstructured":"Vaudenay S.: Secure communications over insecure channels based on short authenticated strings. Lecture Notes in Computer Science, vol. 3621, pp. 309\u2013326, (CRYPTO 2005) (2005)."},{"key":"9352_CR27","unstructured":"Wang S., Safavi-Naini R.: New results on unconditionally secure multireceiver manual authentication. Cryptology ePrint Archive, Report 2008\/039. Lecture Notes in Computer Science, vol. 4883, pp. 115\u2013132, (ICITS 2007) (2007)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9352-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-009-9352-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-009-9352-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:27Z","timestamp":1559231907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-009-9352-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,3]]},"references-count":27,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2010,5]]}},"alternative-id":["9352"],"URL":"https:\/\/doi.org\/10.1007\/s10623-009-9352-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,3]]}}}