{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T20:51:23Z","timestamp":1726519883443},"reference-count":20,"publisher":"Elsevier BV","issue":"2-3","license":[{"start":{"date-parts":[[2003,7,1]],"date-time":"2003-07-01T00:00:00Z","timestamp":1057017600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Mathematics and Computation"],"published-print":{"date-parts":[[2003,7]]},"DOI":"10.1016\/s0096-3003(02)00192-3","type":"journal-article","created":{"date-parts":[[2002,12,28]],"date-time":"2002-12-28T12:34:16Z","timestamp":1041078856000},"page":"343-349","source":"Crossref","is-referenced-by-count":19,"title":["A new key authentication scheme based on discrete logarithms"],"prefix":"10.1016","volume":"139","author":[{"given":"Cheng-Chi","family":"Lee","sequence":"first","affiliation":[]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Li-Hua","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0096-3003(02)00192-3_BIB1","series-title":"Advances in Cryptology-CRYPTO\u201989 Proceedings","first-page":"416","article-title":"A design principle for hash functions","author":"Damgard","year":"1990"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB2","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"IT-22","author":"Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB3","series-title":"Advances in Cryptology, EUROCRYPT\u201991","first-page":"491","article-title":"Self-certified public keys","author":"Girault","year":"1991"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB4","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1016\/S0140-3664(96)01112-7","article-title":"Key authentication scheme for cryptosystems based on discrete logarithms","volume":"19","author":"Horng","year":"1996","journal-title":"Computer Communications"},{"issue":"8","key":"10.1016\/S0096-3003(02)00192-3_BIB5","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1016\/S0140-3664(99)00036-5","article-title":"Cryptanalysis of remote login authentication scheme","volume":"22","author":"Hwang","year":"1999","journal-title":"Computer Communications"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB6","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1080\/00207169908804781","article-title":"Aremote password authentication scheme based on the digital signature method","volume":"70","author":"Hwang","year":"1999","journal-title":"International Journal of Computer Mathematics"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB7","first-page":"297","article-title":"An improvement of SPLICE\/AS in WIDE against guessing attack","volume":"12","author":"Hwang","year":"2001","journal-title":"International Journal of Informatica"},{"issue":"1","key":"10.1016\/S0096-3003(02)00192-3_BIB8","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","article-title":"A new remote user authentication scheme using smart cards","volume":"46","author":"Hwang","year":"2000","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"1","key":"10.1016\/S0096-3003(02)00192-3_BIB9","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0167-4048(95)00028-3","article-title":"An access control scheme based on chinese remainder theorem and time stamp concept","volume":"15","author":"Hwang","year":"1996","journal-title":"Computers and Security"},{"issue":"1","key":"10.1016\/S0096-3003(02)00192-3_BIB10","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/0169-023X(94)90008-6","article-title":"A new dynamic access control scheme based on subject-object-list","volume":"14","author":"Hwang","year":"1994","journal-title":"Data and Knowledge Engineering"},{"issue":"9","key":"10.1016\/S0096-3003(02)00192-3_BIB11","first-page":"1042","article-title":"A two-key-lock-pair access control method using prime factorization and time stamp","volume":"E77-D","author":"Hwang","year":"1994","journal-title":"IEICE Transactions on Information and Systems"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB12","series-title":"Tech. Rep. (MIT Laboratory for Computer Science)","article-title":"A method for certification","author":"Kohnfelder","year":"1978"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB13","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1109\/49.223865","article-title":"Protecting poorly chosen secrets from guessing attacks","volume":"11","author":"Li","year":"1993","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"10.1016\/S0096-3003(02)00192-3_BIB14","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/BF00129771","article-title":"A non-interactive public-key distribution system","volume":"9","author":"Maurer","year":"1996","journal-title":"Designs, Codes and Cryptography"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB15","series-title":"Advances in Cryptology CRYPTO\u201989","first-page":"428","article-title":"One-way hash functions and DES","volume":"vol. 435","author":"Merkle","year":"1989"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB16","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1145\/361082.361089","article-title":"A high security log-in procedure","volume":"17","author":"Purdy","year":"1974","journal-title":"Communications of the ACM"},{"year":"1996","series-title":"Applied Cryptography","author":"Schneier","key":"10.1016\/S0096-3003(02)00192-3_BIB17"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB18","series-title":"Advances in Cryptology, CRYPTO\u201984","first-page":"47","article-title":"Identity based cryptosystems and signature schemes","author":"Shamir","year":"1984"},{"year":"1992","series-title":"Contemporary Cryptology: The Science of Information Integrity","author":"Simmons","key":"10.1016\/S0096-3003(02)00192-3_BIB19"},{"key":"10.1016\/S0096-3003(02)00192-3_BIB20","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1016\/S0140-3664(99)00032-8","article-title":"On the security of HY-key authentication scheme","volume":"22","author":"Zhan","year":"1999","journal-title":"Computer Communications"}],"container-title":["Applied Mathematics and Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096300302001923?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0096300302001923?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T09:55:21Z","timestamp":1554976521000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0096300302001923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,7]]},"references-count":20,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2003,7]]}},"alternative-id":["S0096300302001923"],"URL":"https:\/\/doi.org\/10.1016\/s0096-3003(02)00192-3","relation":{},"ISSN":["0096-3003"],"issn-type":[{"type":"print","value":"0096-3003"}],"subject":[],"published":{"date-parts":[[2003,7]]}}}