{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T04:07:06Z","timestamp":1751342826621,"version":"3.41.0"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1999,12,1]],"date-time":"1999-12-01T00:00:00Z","timestamp":944006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Combinatorial Optimization"],"published-print":{"date-parts":[[1999,12]]},"DOI":"10.1023\/a:1009894418895","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T23:53:29Z","timestamp":1040601209000},"page":"347-361","source":"Crossref","is-referenced-by-count":16,"title":["Practical Human-Machine Identification over Insecure Channels"],"prefix":"10.1007","volume":"3","author":[{"given":"Xiang-Yang","family":"Li","sequence":"first","affiliation":[]},{"given":"Shang-Hua","family":"Teng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"244013_CR1","first-page":"305","volume-title":"Advances in Cryptology-CRYPTO'92","author":"T. Baritaud","year":"1992","unstructured":"T. Baritaud, M. Campana, P. Chauvaud, and H. Gilbert, \"On the Security of the Permuted Kernel Identification Scheme,\" Advances in Cryptology-CRYPTO'92, Springer-Verlag: Santa Barbara, 1992, pp. 305\u2013312."},{"key":"244013_CR2","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1007\/0-387-34805-0_46","volume-title":"Advances in Cryptology-CRYPTO'89","author":"U. Feige","year":"1990","unstructured":"U. Feige and A. Shamir, \"Zero Knowledge Proofs of Knowledge in Two Rounds,\" in Advances in Cryptology-CRYPTO'89, Springer-Verlag: Berlin, 1990, pp. 526\u2013545."},{"key":"244013_CR3","first-page":"186","volume-title":"Advances in Cryptology-CRYPTO'86","author":"A. Fiat","year":"1986","unstructured":"A. Fiat and A. Shamir, \"How to Prove Yourself: Practical Solutions to Identical Solutions to Identification and Signature Problems,\" in Advances in Cryptology-CRYPTO'86, Springer-Verlag: Santa Brabara, USA, 1986, pp. 186\u2013194."},{"key":"244013_CR4","first-page":"250","volume-title":"Cryptography: Policy and Algorithms","author":"A. Fuchsberger","year":"1995","unstructured":"A. Fuchsberger, D. Gollman, P. Lothian, K.G. Paterson, and A. Sidiropoulos, \"Public-key Cryptography on Smart Cards,\" in Cryptography: Policy and Algorithms, Springer-Verlag: Australia, 1995, pp. 250\u2013270."},{"key":"244013_CR5","first-page":"270","volume-title":"Cryptography: Policy and Algorithms","author":"G. Gaskell","year":"1995","unstructured":"G. Gaskell and M. Looi, \"Integrating Smart Cards into Authentication Systems, Cryptography on Smart Cards,\" in Cryptography: Policy and Algorithms, Springer-Verlag: Australia, 1995, pp. 270\u2013282."},{"key":"244013_CR6","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1007\/0-387-34805-0_47","volume-title":"Advances in Cryptology-CRYPTO'89","author":"J. Kilian","year":"1990","unstructured":"Joe, Kilian, S. Micali, and R. Ostrovsky, \"Minimum Resource Zero-Knowledge Proofs,\" in Advances in Cryptology-CRYPTO'89, Springer-Verlag: Berlin, 1990, pp. 545\u2013546."},{"key":"244013_CR7","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1007\/3-540-46416-6_35","volume-title":"Advances in Cryptology-EUROCRYPT'91","author":"T. Matsumoto","year":"1991","unstructured":"T. Matsumoto and H. Imai, \"Human Identification Through Insecure Channel,\" in Advances in Cryptology-EUROCRYPT'91, Springer-Verlag: Berlin, Germany, 1991, pp. 409\u2013421."},{"key":"244013_CR8","first-page":"31","volume-title":"Advances in Cryptology-CRYPTO'92","author":"T. Okamoto","year":"1992","unstructured":"T. Okamoto, \"Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes,\" in Advances in Cryptology-CRYPTO'92, Springer-Verlag: Santa Barbara, 1992, pp. 31\u201354."},{"key":"244013_CR9","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1007\/0-387-34805-0_54","volume-title":"Advances in Cryptology-CRYPTO'89","author":"A. Shamir","year":"1990","unstructured":"A. Shamir, \"An Efficient Identification Scheme Based on Permuted Kernels,\" in Advances in Cryptology-CRYPTO'89, Springer-Verlag: Berlin, 1990, pp. 606\u2013609."},{"key":"244013_CR10","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology-CRYPTO'89","author":"C.P. Schnorr","year":"1990","unstructured":"C.P. Schnorr, \"Efficient Identification and Signatures for Smart Cards,\" in Advances in Cryptology-CRYPTO'89, Springer-Verlag: Berlin, 1990, pp. 239\u2013252."},{"key":"244013_CR11","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/3-540-49264-X_31","volume-title":"Advances in Cryptology-EUROCRYPT'95","author":"C.-H. Wang","year":"1995","unstructured":"C.-H. Wang, T. Hwang, and J.-J. Tsai, \"On the Matsumoto and Imai's Human Identification Scheme,\" in Advances in Cryptology-EUROCRYPT'95, Springer-Verlag: Saint-Malo, France, 1995, pp. 382\u2013392."}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1009894418895.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1009894418895\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1009894418895.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T11:06:20Z","timestamp":1751281580000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1009894418895"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,12]]},"references-count":11,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1999,12]]}},"alternative-id":["244013"],"URL":"https:\/\/doi.org\/10.1023\/a:1009894418895","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"type":"print","value":"1382-6905"},{"type":"electronic","value":"1573-2886"}],"subject":[],"published":{"date-parts":[[1999,12]]}}}