{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:30:58Z","timestamp":1773408658654,"version":"3.50.1"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/aiccsa.2008.4493602","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:37:07Z","timestamp":1209389827000},"page":"679-685","source":"Crossref","is-referenced-by-count":3,"title":["Extracting Kerberos passwords through RC4-HMAC encryption type analysis"],"prefix":"10.1109","author":[{"given":"Ahmed","family":"Alazzawe","sequence":"first","affiliation":[]},{"given":"Anis","family":"Alazzawe","sequence":"additional","affiliation":[]},{"given":"Asad","family":"Nawaz","sequence":"additional","affiliation":[]},{"given":"Duminda","family":"Wijesekera","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","year":"0"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.040"},{"key":"10","article-title":"encryption and checksum specifications for kerberos 5. rfc 3961 (proposed standard)","author":"raeburn","year":"2005"},{"key":"1","first-page":"267","article-title":"analyzing preauthentication timestamps to crack kerberos v passwords","author":"alazzawe","year":"2006","journal-title":"WOSIS"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4757"},{"key":"6","year":"0"},{"key":"5","first-page":"183","article-title":"representing the msr cryptoprotocol specification language in an extension of rewriting logic with dependent types","author":"cervesato","year":"2004","journal-title":"Fifth International Workshop on Rewriting Logic and its Applications -WRLA'04"},{"key":"4","first-page":"159","article-title":"typed msr: syntax and examples","volume":"2052","author":"cervesato","year":"2001","journal-title":"LNCS"},{"key":"9","first-page":"617630","article-title":"making a faster cryptanalytic time-memory trade-off","volume":"2729","author":"oechslin","year":"2003","journal-title":"Lecture Notes Computer Science"},{"key":"8","article-title":"the kerberos network authentication service (v5). rfc 4120 (proposed standard)","author":"neuman","year":"2005"}],"event":{"name":"2008 IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA)","location":"Doha, Qatar","start":{"date-parts":[[2008,3,31]]},"end":{"date-parts":[[2008,4,4]]}},"container-title":["2008 IEEE\/ACS International Conference on Computer Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4488216\/4493499\/04493602.pdf?arnumber=4493602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T13:18:00Z","timestamp":1489670280000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4493602\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2008.4493602","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}