{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T09:48:17Z","timestamp":1672307297103},"reference-count":16,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1992,4,1]],"date-time":"1992-04-01T00:00:00Z","timestamp":702086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1992,4]]},"DOI":"10.1016\/0167-4048(92)90044-r","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T13:56:18Z","timestamp":1034344578000},"page":"173-183","source":"Crossref","is-referenced-by-count":2,"title":["Asymmetric user authentication"],"prefix":"10.1016","volume":"11","author":[{"given":"Rotraut","family":"Laun","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(92)90044-R_BIB1","series-title":"Chipkarten als Sicherheitswerkzeug","author":"Beutelspacher","year":"1991"},{"key":"10.1016\/0167-4048(92)90044-R_BIB2","series-title":"Personal ID\u2014The Latest Technology","author":"Brown","year":"1991"},{"issue":"6","key":"10.1016\/0167-4048(92)90044-R_BIB3","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10.1016\/0167-4048(92)90044-R_BIB4","series-title":"Security for Computer Networks","author":"Davies","year":"1989"},{"key":"10.1016\/0167-4048(92)90044-R_BIB5","series-title":"International Z\u00fcrich Seminar on Digital Communications","first-page":"191","article-title":"Fast authentication\u2014using public key schemes","author":"Desmedt","year":"1984"},{"issue":"4","key":"10.1016\/0167-4048(92)90044-R_BIB6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"El Gamal","year":"1985","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10.1016\/0167-4048(92)90044-R_BIB7","series-title":"Federal Information Processing Standards: Data Encryption Standard","year":"1981"},{"key":"10.1016\/0167-4048(92)90044-R_BIB8","first-page":"186","article-title":"How to prove yourself: practical solutions to identification and signature problems","volume":"263","author":"Fiat","year":"1987"},{"key":"10.1016\/0167-4048(92)90044-R_BIB9","unstructured":"W. Fumy and A. Pfau, Asymmetric authentication schemes for smart cards\u2014dream or reality? Computer Security and Information Integrity in our Changing World, Proc. IFIP '90."},{"key":"10.1016\/0167-4048(92)90044-R_BIB10","first-page":"291","article-title":"The knowledge complexity of interactive proof-systems","author":"Goldwasser","year":"1985","journal-title":"Proc. 27th Annu. Symp. on Foundations of Computer Science"},{"key":"10.1016\/0167-4048(92)90044-R_BIB11","volume":"114","author":"Koblitz","year":"1987"},{"key":"10.1016\/0167-4048(92)90044-R_BIB12","first-page":"114","article-title":"A public-key cryptosystem based on algebraic coding theory","author":"McEliece","year":"1978","journal-title":"Jet Propulsion Laboratory, DSN Progress Rep. 42\u201344"},{"key":"10.1016\/0167-4048(92)90044-R_BIB13","first-page":"244","article-title":"An improvement of the Fiat-Shamir identification and signature scheme","volume":"403","author":"Micali","year":"1988"},{"key":"10.1016\/0167-4048(92)90044-R_BIB14","first-page":"232","article-title":"A modification of the Fiat-Shamir scheme","volume":"403","author":"Ohta","year":"1988"},{"issue":"2","key":"10.1016\/0167-4048(92)90044-R_BIB15","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method of obtaining digital signatures and public key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(92)90044-R_BIB16","first-page":"606","article-title":"An efficient identification scheme based on permuted kernels","volume":"435","author":"Shamir","year":"1989"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489290044R?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489290044R?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T03:56:15Z","timestamp":1554954975000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016740489290044R"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,4]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1992,4]]}},"alternative-id":["016740489290044R"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(92)90044-r","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1992,4]]}}}