{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T10:36:22Z","timestamp":1756809382412},"reference-count":13,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[1994,7,1]],"date-time":"1994-07-01T00:00:00Z","timestamp":773020800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1994,7]]},"DOI":"10.1016\/0140-3664(94)90100-7","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T22:34:07Z","timestamp":1060295647000},"page":"458-465","source":"Crossref","is-referenced-by-count":22,"title":["Modern key agreement techniques"],"prefix":"10.1016","volume":"17","author":[{"given":"Rainer A","family":"Rueppel","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paul C","family":"van Oorschot","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(94)90100-7_BIB1","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"Vol 22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Info. Theory"},{"key":"10.1016\/0140-3664(94)90100-7_BIB2","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"Vol 31","author":"ElGamal","year":"1985","journal-title":"IEEE Trans. Info. Theory"},{"key":"10.1016\/0140-3664(94)90100-7_BIB3","series-title":"ISO\/IEC IS 9798-3 Entity authentication mechanisms Part 3: Entity authentication using a public-key algorithm","year":"1993"},{"key":"10.1016\/0140-3664(94)90100-7_BIB4","series-title":"Proc. 1st ACM Conf. on Comput. Commun. Security","first-page":"58","article-title":"A new signature scheme based on DSA giving message recovery","author":"Nyberg","year":"1993"},{"issue":"No 2","key":"10.1016\/0140-3664(94)90100-7_BIB5","first-page":"99","article-title":"On seeking smart public-key distribution systems","volume":"Vol 69","author":"Matsumoto","year":"1986","journal-title":"Trans. IECE Japan"},{"key":"10.1016\/0140-3664(94)90100-7_BIB6","series-title":"Advances in Cryptology \u2014 Eurocrypt'91","first-page":"487","article-title":"Self-certified public keys","author":"Girault","year":"1991"},{"key":"10.1016\/0140-3664(94)90100-7_BIB7","series-title":"Crypto'88","first-page":"583","article-title":"Zero-knowledge authentication scheme with secret key exchange","author":"Brandt","year":"1988"},{"key":"10.1016\/0140-3664(94)90100-7_BIB8","series-title":"Advances in Cryptology \u2014 Eurocrypt'89","first-page":"29","article-title":"An identity-based key exchange protocol","author":"G\u00fcnther","year":"1989"},{"key":"10.1016\/0140-3664(94)90100-7_BIB9","series-title":"ISO\/IEC CD 11770-3 Key Management \u2014 Part 3: Key management mechanisms using asymmetric techniques","year":"1993"},{"key":"10.1016\/0140-3664(94)90100-7_BIB10","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public key cryptosystems","volume":"Vol 21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"10.1016\/0140-3664(94)90100-7_BIB11","series-title":"The Directory Authentication Framework (also ISO 9594-8)","article-title":"CCITT Recommendation X.509","year":"1988"},{"key":"10.1016\/0140-3664(94)90100-7_BIB12","series-title":"Advances in Cryptology \u2014 Crypto'84","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"Shamir","year":"1984"},{"key":"10.1016\/0140-3664(94)90100-7_BIB13","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/BF00124891","article-title":"Authentication and authenticated key exchanges","volume":"Vol 2","author":"Diffie","year":"1992","journal-title":"Designs. Codes and Cryptography"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366494901007?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366494901007?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T08:56:46Z","timestamp":1552640206000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0140366494901007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,7]]},"references-count":13,"journal-issue":{"issue":"7","published-print":{"date-parts":[[1994,7]]}},"alternative-id":["0140366494901007"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(94)90100-7","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1994,7]]}}}