{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T16:42:20Z","timestamp":1714754540406},"reference-count":31,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1986,9,1]],"date-time":"1986-09-01T00:00:00Z","timestamp":525916800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1986,9]]},"DOI":"10.1016\/0167-4048(86)90015-5","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T13:56:18Z","timestamp":1034344578000},"page":"243-250","source":"Crossref","is-referenced-by-count":6,"title":["Authentication: A concise survey"],"prefix":"10.1016","volume":"5","author":[{"given":"G.M.J.","family":"Pluimakers","sequence":"first","affiliation":[]},{"given":"J.","family":"van Leeuwen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(86)90015-5_BIB1","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"C.ACM"},{"key":"10.1016\/0167-4048(86)90015-5_BIB2","series-title":"New secret codes can prevent a computerized Big Brother","author":"Chaum","year":"1985"},{"key":"10.1016\/0167-4048(86)90015-5_BIB3","first-page":"383","article-title":"Cryptographic protocols","author":"DeMillo","year":"1982","journal-title":"Proc. 14th Ann. ACM Symp. Theory of Computing"},{"key":"10.1016\/0167-4048(86)90015-5_BIB4","series-title":"Cryptography and data security","author":"Denning","year":"1982"},{"key":"10.1016\/0167-4048(86)90015-5_BIB5","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"IT-22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/0167-4048(86)90015-5_BIB6","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/PROC.1979.11256","article-title":"Privacy and authentication: an introduction to cryptography","volume":"67","author":"Diffie","year":"1979","journal-title":"Proc. IEEE"},{"key":"10.1016\/0167-4048(86)90015-5_BIB7","doi-asserted-by":"crossref","unstructured":"ElGamal, T., A public-key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory (to appear).","DOI":"10.1007\/3-540-39568-7_2"},{"key":"10.1016\/0167-4048(86)90015-5_BIB8","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1145\/361082.361087","article-title":"A user authentication scheme not requiring secrecy in the computer","volume":"17","author":"Evans","year":"1974","journal-title":"C. ACM"},{"key":"10.1016\/0167-4048(86)90015-5_BIB9","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.1109\/PROC.1975.10005","article-title":"Some cryptographic techniques for machine to machine data communications","volume":"63","author":"Feistel","year":"1975","journal-title":"Proc. IEEE"},{"key":"10.1016\/0167-4048(86)90015-5_BIB10","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","article-title":"Probabilistic encryption","volume":"28","author":"Goldwasser","year":"1984","journal-title":"J. Comp. Syst. Sci."},{"key":"10.1016\/0167-4048(86)90015-5_BIB11","first-page":"441","article-title":"A \u201cparadoxical\u201d solution to the signature problem","author":"Goldwasser","year":"1984","journal-title":"Conf. Rec. 25th Ann. IEEE Symp. Foundations of Computer Science"},{"key":"10.1016\/0167-4048(86)90015-5_BIB12","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/SFCS.1982.100","article-title":"Why and how to establish private codes on a public network","author":"Goldwasser","year":"1982","journal-title":"Conf. Rec. 23rd Ann. IEEE Symp. Foundations of Computer Science"},{"key":"10.1016\/0167-4048(86)90015-5_BIB13","first-page":"431","article-title":"Strong signature schemes","author":"Goldwasser","year":"1983","journal-title":"Proc. 15th Ann. ACM Symp. Theory of Computing"},{"key":"10.1016\/0167-4048(86)90015-5_BIB14","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/0020-0190(81)90003-X","article-title":"A user authentication scheme for shared data based on a trapdoor one-way function","volume":"12","author":"Ingemarsson","year":"1981","journal-title":"Inf. Proc. Lett."},{"key":"10.1016\/0167-4048(86)90015-5_BIB15","series-title":"A one-way sequence for transaction verification","author":"Konheim","year":"1981"},{"key":"10.1016\/0167-4048(86)90015-5_BIB16","series-title":"Cryptography: a primer","author":"Konheim","year":"1981"},{"key":"10.1016\/0167-4048(86)90015-5_BIB17","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","article-title":"Password authentication with insecure communication","volume":"24","author":"Lamport","year":"1981","journal-title":"C.ACM"},{"key":"10.1016\/0167-4048(86)90015-5_BIB18","series-title":"Migration and authentication of protected objects","author":"Lindsay","year":"1978"},{"key":"10.1016\/0167-4048(86)90015-5_BIB19","first-page":"122","article-title":"Protocols for public-key cryptosystems","author":"Merkle","year":"1980","journal-title":"Proc. IEEE Symp. Security and Privacy"},{"key":"10.1016\/0167-4048(86)90015-5_BIB20","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/TIT.1978.1055927","article-title":"Hiding information and signatures in trapdoor knapsacks","volume":"IT-24","author":"Merkle","year":"1978","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/0167-4048(86)90015-5_BIB21","series-title":"Discrete logarithms in finite fields and their cryptographic significance","author":"Odlyzko","year":"1984"},{"key":"10.1016\/0167-4048(86)90015-5_BIB22","first-page":"208","article-title":"An efficient signature scheme based on quadratic forms","author":"Ong","year":"1984","journal-title":"Proc. 16th Ann. ACM Symp. Theory of Computing"},{"key":"10.1016\/0167-4048(86)90015-5_BIB23","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","article-title":"An improved algorithm for computing discrete logarithms over GF(p) and its cryptographic significance","volume":"IT-24","author":"Pohlig","year":"1978","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/0167-4048(86)90015-5_BIB24","series-title":"How to break the OSS signature scheme","author":"Pollard","year":"1984"},{"key":"10.1016\/0167-4048(86)90015-5_BIB25","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1145\/361082.361089","article-title":"A high-security log-in procedure","volume":"17","author":"Purdy","year":"1974","journal-title":"C.ACM"},{"key":"10.1016\/0167-4048(86)90015-5_BIB26","series-title":"Foundation of secure computation","first-page":"155","article-title":"Digitalized signatures","author":"Rabin","year":"1978"},{"key":"10.1016\/0167-4048(86)90015-5_BIB27","series-title":"Techn. Rep. 212","article-title":"Digitalized signatures and public-key functions as intractable as factorization","author":"Rabin","year":"1979"},{"key":"10.1016\/0167-4048(86)90015-5_BIB28","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"C.ACM"},{"key":"10.1016\/0167-4048(86)90015-5_BIB29","series-title":"Techn. Memor. 107","article-title":"A fast signature scheme","author":"Shamir","year":"1978"},{"key":"10.1016\/0167-4048(86)90015-5_BIB30","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/SFCS.1982.5","article-title":"A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem","author":"Shamir","year":"1982","journal-title":"Conf. Rec. 23rd Ann. IEEE Symp. Foundations of Computer Science"},{"key":"10.1016\/0167-4048(86)90015-5_BIB31","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1109\/TIT.1980.1056264","article-title":"A modification of the RSA public-key encryption procedure","volume":"IT-26","author":"Williams","year":"1980","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404886900155?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404886900155?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T03:51:17Z","timestamp":1554954677000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404886900155"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1986,9]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1986,9]]}},"alternative-id":["0167404886900155"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(86)90015-5","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1986,9]]}}}