{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T20:31:33Z","timestamp":1648585893254},"reference-count":11,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1992,5,1]],"date-time":"1992-05-01T00:00:00Z","timestamp":704678400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1992,5]]},"DOI":"10.1016\/0167-4048(92)90205-6","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T09:56:18Z","timestamp":1034330178000},"page":"253-258","source":"Crossref","is-referenced-by-count":1,"title":["Passports and visas versus IDs"],"prefix":"10.1016","volume":"11","author":[{"given":"George I.","family":"Davida","sequence":"first","affiliation":[]},{"given":"Yvo G.","family":"Desmedt","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(92)90205-6_BIB1","series-title":"Advances in Cryptology, Proc. Eurocrypt '88 (Lecture Notes in Computer Science 330)","first-page":"77","article-title":"A Fiat-Shamir-like authentication protocol for the El-Gamal-scheme","author":"Beth","year":"1988"},{"key":"10.1016\/0167-4048(92)90205-6_BIB2","series-title":"Advances in Cryptology, Proc. Crypto '90 (Lecture Notes in Computer Science 537)","first-page":"169","article-title":"Identification tokens-or: Solving the chess grandmaster problem","author":"Beth","year":"1991"},{"key":"10.1016\/0167-4048(92)90205-6_BIB3","series-title":"Tech. Report TR-CS-88-15","article-title":"\u201cComplete\u201d identification systems","author":"Davida","year":"1988"},{"key":"10.1016\/0167-4048(92)90205-6_BIB4","series-title":"Advances in Cryptology, Proc. Eurocrypt '88 (Lecture Notes in Computer Science 330)","first-page":"183","article-title":"Passports and visas versus IDs","author":"Davida","year":"1988"},{"key":"10.1016\/0167-4048(92)90205-6_BIB5","series-title":"Securicom 88, 6th worldwide congress on computer and communications security and protection","first-page":"147","article-title":"Major security problems with the \u201cunforgeable\u201d (Feige-)Fiat-Shamir proofs of identity and how to overcome them","author":"Desmedt","year":"1988"},{"key":"10.1016\/0167-4048(92)90205-6_BIB6","series-title":"Advances in Cryptology, Proc. Crypto '87 (Lecture Notes in Computer Science 293)","first-page":"21","article-title":"Special uses and abuses of the Fiat-Shamir passport protocol","author":"Desmedt","year":"1988"},{"key":"10.1016\/0167-4048(92)90205-6_BIB7","series-title":"Advances in Cryptology, Proc. Crypto '86 (Lecture Notes in Computer Science 263)","first-page":"111","article-title":"Public key systems based on the difficulty of tampering (Is there a difference between DES and RSA?)","author":"Desmedt","year":"1987"},{"issue":"6","key":"10.1016\/0167-4048(92)90205-6_BIB8","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"IT-22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/0167-4048(92)90205-6_BIB9","series-title":"Advances in Cryptology, Proc. Crypto '86 (Lecture Notes in Computer Science 263)","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems","author":"Fiat","year":"1987"},{"key":"10.1016\/0167-4048(92)90205-6_BIB10","series-title":"Advances in Cryptology, Proc. Eurocrypt '88 (Lecture Notes in Computer Science 330)","first-page":"123","article-title":"A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory","author":"Guillou","year":"1988"},{"issue":"1","key":"10.1016\/0167-4048(92)90205-6_BIB11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/0161-118491858737","article-title":"A system for verifying user identity and authorization at the point-of-sale or access","volume":"8","author":"Simmons","year":"1984","journal-title":"Cryptologia"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404892902056?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0167404892902056?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T23:56:27Z","timestamp":1554940587000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0167404892902056"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,5]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1992,5]]}},"alternative-id":["0167404892902056"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(92)90205-6","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1992,5]]}}}