{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T14:02:07Z","timestamp":1648908127422},"reference-count":15,"publisher":"Elsevier BV","issue":"9","license":[{"start":{"date-parts":[[1995,9,1]],"date-time":"1995-09-01T00:00:00Z","timestamp":809913600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1995,9]]},"DOI":"10.1016\/0140-3664(95)99807-o","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T12:08:03Z","timestamp":1027598883000},"page":"645-653","source":"Crossref","is-referenced-by-count":12,"title":["Secure and minimal protocols for authenticated key distribution"],"prefix":"10.1016","volume":"18","author":[{"given":"Philippe","family":"Janson","sequence":"first","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(95)99807-O_BIB1","doi-asserted-by":"crossref","DOI":"10.1145\/359657.359659","article-title":"Using encryption for authentication in large networks of computers","author":"Needham","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/0140-3664(95)99807-O_BIB2","doi-asserted-by":"crossref","DOI":"10.1145\/358722.358740","article-title":"Timestamps in key distribution systems","author":"Denning","year":"1981","journal-title":"Comm. ACM"},{"key":"10.1016\/0140-3664(95)99807-O_BIB3","article-title":"The Kerberos Network Authentication Service Overview","author":"Steiner","year":"1989","journal-title":"MIT Project Athena RFC"},{"key":"10.1016\/0140-3664(95)99807-O_BIB4","series-title":"Proc. USENIX Winter Conf.","article-title":"Kerberos: an authentication service for open network systems","author":"Steiner","year":"1988"},{"key":"10.1016\/0140-3664(95)99807-O_BIB5","doi-asserted-by":"crossref","DOI":"10.1145\/381906.381946","article-title":"Limitations of the Kerberos authentication system","author":"Bellovin","year":"1990","journal-title":"ACM SIGCOMM Comput. Comm. Rev."},{"key":"10.1016\/0140-3664(95)99807-O_BIB6","series-title":"Proc. ACM Symposium Operating System Principles","article-title":"A logic of authentication","author":"Burrows","year":"1988"},{"key":"10.1016\/0140-3664(95)99807-O_BIB7","series-title":"Proc. IEEE Symposium Security and Privacy","article-title":"Reasoning about belief in cryptographic protocols","author":"Gong","year":"1990"},{"key":"10.1016\/0140-3664(95)99807-O_BIB8","series-title":"Proc. Crypto","article-title":"Systematic design of two-party authentication protocols","author":"Bird","year":"1991"},{"key":"10.1016\/0140-3664(95)99807-O_BIB9","doi-asserted-by":"crossref","DOI":"10.1109\/49.223869","article-title":"Systematic design of a family of attack-resistant authentication protocols","author":"Bird","year":"1993","journal-title":"IEEE J. Selected Areas in Comm."},{"key":"10.1016\/0140-3664(95)99807-O_BIB10","article-title":"A modular family of secure protocols for authentication and key distribution","author":"Bird","year":"1992","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"10.1016\/0140-3664(95)99807-O_BIB11","series-title":"Proc. ESORICS 92","article-title":"KryptoKnight authentication and key distribution service","author":"Molva","year":"1992"},{"key":"10.1016\/0140-3664(95)99807-O_BIB12","article-title":"Federal Information Processing Standards","author":"National Bureau of Standards","year":"1977","journal-title":"National Bureau of Standards, Publication 46"},{"key":"10.1016\/0140-3664(95)99807-O_BIB13","article-title":"Internet Draft","author":"Rivest","year":"1991","journal-title":"The MD5 Message Digest Algorithm"},{"key":"10.1016\/0140-3664(95)99807-O_BIB14","year":"1994","journal-title":"ISO\/IEC 9798-2"},{"key":"10.1016\/0140-3664(95)99807-O_BIB15","year":"1993","journal-title":"ISO\/IEC 11770-2"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014036649599807O?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014036649599807O?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T01:26:44Z","timestamp":1556674004000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/014036649599807O"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,9]]},"references-count":15,"journal-issue":{"issue":"9","published-print":{"date-parts":[[1995,9]]}},"alternative-id":["014036649599807O"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(95)99807-o","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1995,9]]}}}