{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T11:16:58Z","timestamp":1648639018210},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,5,10]],"date-time":"2014-05-10T00:00:00Z","timestamp":1399680000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s11227-014-1198-6","type":"journal-article","created":{"date-parts":[[2014,5,9]],"date-time":"2014-05-09T15:56:23Z","timestamp":1399650983000},"page":"224-235","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks"],"prefix":"10.1007","volume":"70","author":[{"given":"Hang","family":"Tu","sequence":"first","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Jongsung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Changhoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,10]]},"reference":[{"key":"1198_CR1","unstructured":"Sui A, Hui L, Yiu S, Chow K, Tsang W, Chong C, et al (2005) An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. In: IEEE wireless and communications and networking conference (WCNC 2005). pp 2088\u20132093"},{"key":"1198_CR2","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1016\/j.csi.2007.04.002","volume":"29","author":"R Lu","year":"2007","unstructured":"Lu R, Cao Z, Zhu H (2007) An enhanced authenticated key agreement protocol for wireless mobile communication. Comput Stand Interfaces 29:647\u201352","journal-title":"Comput Stand Interfaces"},{"key":"1198_CR3","unstructured":"Pu Q (2010) Cryptanalysis of Lu et al.\u2019s password-based authenticated key agreement protocol, 2010. In: Second international conference on multimedia and information technology. pp 215\u2013218"},{"issue":"11","key":"1198_CR4","first-page":"5249","volume":"6","author":"J-W Lo","year":"2010","unstructured":"Lo J-W, Lee C-C, Hwang M-S (2010) A secure and efficient ECC-based AKA protocol for wireless mobile communications. Int J Innovat Comput Inform Control 6(11):5249\u201358","journal-title":"Int J Innovat Comput Inform Control"},{"issue":"3","key":"1198_CR5","doi-asserted-by":"crossref","first-page":"482","DOI":"10.4218\/etrij.12.0211.0340","volume":"34","author":"D He","year":"2012","unstructured":"He D (2012) Weakness in an ECC-based AKA protocol for wireless mobile communications. ETRI J 34(3):482\u2013483","journal-title":"ETRI J"},{"issue":"12","key":"1198_CR6","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1109\/4234.974498","volume":"5","author":"CL Lin","year":"2001","unstructured":"Lin CL, Sun HM, Steiner M, Hwang T (2001) Three-party encrypted key exchange without server public-keys. IEEE Commun Lett 5(12):497\u2013499","journal-title":"IEEE Commun Lett"},{"issue":"7","key":"1198_CR7","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.cose.2004.06.007","volume":"23","author":"TF Lee","year":"2004","unstructured":"Lee TF, Hwang T, Lin CL (2004) Enhanced three-party encrypted key exchange without server public keys. Comput Secur 23(7):571\u2013577","journal-title":"Comput Secur"},{"issue":"9","key":"1198_CR8","doi-asserted-by":"crossref","first-page":"1702","DOI":"10.1016\/j.ins.2010.01.005","volume":"180","author":"TF Lee","year":"2010","unstructured":"Lee TF, Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inf Sci 180(9):1702\u20131714","journal-title":"Inf Sci"},{"issue":"1","key":"1198_CR9","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ins.2010.08.032","volume":"181","author":"TY Chang","year":"2011","unstructured":"Chang TY, Hwang MS, Yang WP (2011) A communication-efficient three-party password authenticated key exchange protocol. Inf Sci 181(1):217\u2013226","journal-title":"Inf Sci"},{"issue":"1","key":"1198_CR10","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.ins.2012.06.005","volume":"215","author":"S Wu","year":"2012","unstructured":"Wu S, Pu Q, Wang S, He D (2012) Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol. Inf Sci 215(1):83\u201396","journal-title":"Inf Sci"},{"issue":"20","key":"1198_CR11","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2013.02.004","volume":"235","author":"H Xiong","year":"2013","unstructured":"Xiong H, Chen Y, Guan Z, Chen Z (2013) Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Inf Sci 235(20):329\u2013340","journal-title":"Inf Sci"},{"issue":"1","key":"1198_CR12","first-page":"64","volume":"9","author":"W Li","year":"2012","unstructured":"Li W, Wen Q, Su Q, Zhang H, Jin Z (2012) Password-authenticated multiple key exchange protocol for mobile applications. China Commun 9(1):64\u201372","journal-title":"China Commun"},{"issue":"5","key":"1198_CR13","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1016\/j.jcss.2007.05.001","volume":"74","author":"T Xiang","year":"2008","unstructured":"Xiang T, Wong K, Liao X (2008) Cryptanalysis of a password authentication scheme over insecure networks. J Comput System Sci 74(5):657\u2013661","journal-title":"J Comput System Sci"},{"issue":"3\u20134","key":"1198_CR14","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1016\/j.mcm.2011.10.079","volume":"55","author":"D He","year":"2012","unstructured":"He D, Wu S, Chen J (2012) Note on \u2019Design of improved password authentication and update scheme based on elliptic curve cryptography\u2019. Math Comput Modell 55(3\u20134):1661\u20131664","journal-title":"Math Comput Modell"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1198-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-014-1198-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-014-1198-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:40:34Z","timestamp":1559371234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-014-1198-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,10]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["1198"],"URL":"https:\/\/doi.org\/10.1007\/s11227-014-1198-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,10]]}}}