{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T02:16:09Z","timestamp":1721182569478},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T00:00:00Z","timestamp":1333584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1007\/s11036-012-0366-2","type":"journal-article","created":{"date-parts":[[2012,4,3]],"date-time":"2012-04-03T23:21:13Z","timestamp":1333495273000},"page":"712-727","source":"Crossref","is-referenced-by-count":2,"title":["Reverse Authentication in Financial Transactions and Identity Management"],"prefix":"10.1007","volume":"18","author":[{"given":"Bangdao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Long Hoang","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"A. W.","family":"Roscoe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,5]]},"reference":[{"key":"366_CR1","doi-asserted-by":"crossref","unstructured":"Abadi M, Needham R (1996) Prudent engineering practice for cryptographic protocols. IEEE Trans Softw Eng 22(1)","DOI":"10.1109\/32.481513"},{"key":"366_CR2","doi-asserted-by":"crossref","unstructured":"Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P (1999) UMAC: fast and secure message authentication. In: CRYPTO. LNCS, vol\u00a01666, pp\u00a0216\u2013233","DOI":"10.1007\/3-540-48405-1_14"},{"key":"366_CR3","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"JL Carter","year":"1979","unstructured":"Carter JL, Wegman MN (1979) Universal classes of hash functions. J Comput Syst Sci 18:143\u2013154","journal-title":"J Comput Syst Sci"},{"key":"366_CR4","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1006\/jagm.1997.0873","volume":"25","author":"M Dietzfelbinger","year":"1997","unstructured":"Dietzfelbinger M, Hagerup T, Katajainen J, Penttonen M (1997) A reliable randomized algorithm for the closest-pair problem. J Algorithm 25:19\u201351","journal-title":"J Algorithm"},{"issue":"1","key":"366_CR5","first-page":"29","volume":"7","author":"C Gehrmann","year":"2004","unstructured":"Gehrmann C, Mitchell C, Nyberg K (2004) Manual authentication for wireless devices. RSA Cryptobytes 7(1):29\u201337","journal-title":"RSA Cryptobytes"},{"key":"366_CR6","doi-asserted-by":"crossref","unstructured":"Halevi S, Krawczyk H (1997) MMH: software message authentication in the Gbit\/second rates. In: The proceedings of FSE 1997. LNCS, vol\u00a01267, pp\u00a0172\u2013189","DOI":"10.1007\/BFb0052345"},{"key":"366_CR7","unstructured":"ISO\/IEC 9798-6, Nguyen LH (ed) (2010) Information technology \u2013 security techniques \u2013 entity authentication \u2013 part 6: mechanisms using manual data transfer"},{"key":"366_CR8","doi-asserted-by":"crossref","unstructured":"Kainda R, Flechais I, Roscoe AW (2009) Usability and security of out-of-band channels in secure device pairing protocols. In: The proceedings of SOUPS","DOI":"10.1145\/1572532.1572547"},{"key":"366_CR9","doi-asserted-by":"crossref","unstructured":"Laur S, Nyberg K (2006). Efficient mutual data authentication using manually authenticated strings. In: LNCS, vol\u00a04301, pp\u00a090\u2013107","DOI":"10.1007\/11935070_6"},{"key":"366_CR10","unstructured":"Lindell AY (2009) Comparison-based key exchange and the security of the numeric comparison mode in bluetooth v2.1. In: The proceedings of RSA conference, pp\u00a066\u201383"},{"issue":"1","key":"366_CR11","doi-asserted-by":"crossref","first-page":"83","DOI":"10.3233\/JCS-2004-12104","volume":"12","author":"G Lowe","year":"2004","unstructured":"Lowe G (2004) Analysing protocol subject to guessing attacks. J Comput Security 12(1):83\u201398","journal-title":"J Comput Security"},{"key":"366_CR12","doi-asserted-by":"crossref","unstructured":"McCune JM, Perrig A, Reiter MK (2005) Seeing is believing: using camera phones for human-verifiable authentication. In: The proceedings of IEEE symposium on security and privacy, pp\u00a0110\u2013124","DOI":"10.1109\/SP.2005.19"},{"key":"366_CR13","unstructured":"Menezes AJ, van\u00a0Oorschot PC, Vanstone SA Handbook of applied cryptography. ISBN: 0-8493-8523-7"},{"key":"366_CR14","unstructured":"Nguyen LH, Roscoe AW (2006) Efficient group authentication protocol based on human interaction. In: The proceedings of FCS-ARSPA, pp\u00a09\u201331"},{"key":"366_CR15","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.ic.2007.07.010","volume":"206","author":"LH Nguyen","year":"2008","unstructured":"Nguyen LH, Roscoe AW (2008) Authenticating ad hoc networks by comparison of short digests. Inform Comput 206:250\u2013271","journal-title":"Inform Comput"},{"key":"366_CR16","unstructured":"Nguyen LH, Roscoe AW (2008) Separating two roles of hashing in one-way message authentication. In: The proceedings of FCS-ARSPA-WITS, pp\u00a0195\u2013210"},{"issue":"1","key":"366_CR17","doi-asserted-by":"crossref","first-page":"139","DOI":"10.3233\/JCS-2010-0403","volume":"19","author":"LH Nguyen","year":"2011","unstructured":"Nguyen LH, Roscoe AW (2011) Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey. J Comput Security 19(1):139\u2013201","journal-title":"J Comput Security"},{"key":"366_CR18","doi-asserted-by":"crossref","unstructured":"Nguyen LH, Roscoe AW (2012) Short-output universal hash functions, and their use in fast and secure message authentication. In: The proceeding of the 19th international workshop on fast software encryption FSE","DOI":"10.1007\/978-3-642-34047-5_19"},{"key":"366_CR19","unstructured":"Roscoe AW (1998) The theory and practice of concurrency. Prentice Hall. ISBN-10: 0136744095. ISBN-13: 978-0136744092"},{"key":"366_CR20","unstructured":"Roscoe AW (2005) Human-centred computer security. web.cs.ox.ac.uk\/oucl\/work\/bill.roscoe\/publications\/113.pdf"},{"key":"366_CR21","unstructured":"Roscoe AW, Smyth T, Nguyen LH (2012) Model checking cryptographic protocols subject to combinatorial attack (submitted for publication). http:\/\/www.cs.ox.ac.uk\/publications\/publication5266-abstract.html"},{"key":"366_CR22","unstructured":"Ryan P, Schneider S, Goldsmith M, Lowe G, Roscoe AW (2000) Modelling and analysis of security protocols. Addison-Wesley Professional. ISBN-10: 0201674718, ISBN-13: 978-0201674712"},{"key":"366_CR23","doi-asserted-by":"crossref","unstructured":"Suomalainen J, Valkonen J, Asokan N (2007) Security associations in personal networks: a comparative analysis. In: LNCS, vol\u00a04572, pp\u00a043\u201357","DOI":"10.1007\/978-3-540-73275-4_4"},{"key":"366_CR24","doi-asserted-by":"crossref","unstructured":"Vaudenay S (2005) Secure communications over insecure channels based on short authenticated strings. In: Advances in cryptology \u2013 crypto 2005. LNCS, vol\u00a03621, pp\u00a0309\u2013326","DOI":"10.1007\/11535218_19"},{"key":"366_CR25","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"MN Wegman","year":"1981","unstructured":"Wegman MN, Carter JL (1981) New hash functions and their use in authentication and set equality. J Comput Syst Sci 22:265\u2013279","journal-title":"J Comput Syst Sci"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-012-0366-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-012-0366-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-012-0366-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T17:48:44Z","timestamp":1561571324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-012-0366-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,5]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,10]]}},"alternative-id":["366"],"URL":"https:\/\/doi.org\/10.1007\/s11036-012-0366-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,5]]}}}