{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:22:35Z","timestamp":1729653755983,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aina.2003.1192871","type":"proceedings-article","created":{"date-parts":[[2003,12,22]],"date-time":"2003-12-22T12:34:10Z","timestamp":1072096450000},"page":"202-205","source":"Crossref","is-referenced-by-count":0,"title":["An enhanced authentication key exchange protocol"],"prefix":"10.1109","author":[{"family":"Ren-Junn Hwang","sequence":"first","affiliation":[]},{"family":"Sheng-Hua Shiau","sequence":"additional","affiliation":[]},{"family":"Chih-Hua Lai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"IEEE P1363\/Editorial Contribution (Draft)","year":"0","key":"ref4"},{"article-title":"Cryptography: Theory and Practice","year":"1995","author":"stinson","key":"ref3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref6","first-page":"155","article-title":"An authenticated key agreement protocol without using one-way function","author":"harn","year":"1998","journal-title":"Proc 8th Information Security Conf"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/el:19970071"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2000.860634"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1049\/el:20010441","article-title":"authenticated key agreement without using one-way hash functions","volume":"37","author":"harn","year":"2001","journal-title":"Electronics Letters"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1592","DOI":"10.1049\/el:19941112","article-title":"security of interactive dsa batch verification","volume":"30","author":"lim","year":"1994","journal-title":"Electronics Letters"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref1","first-page":"22","article-title":"Some key agreement protocols providing implicit authentication","author":"menezes","year":"1995","journal-title":"Proceedings of the Second Workshop on Selected Areas in Cryptography (SAC '95)"}],"event":{"name":"17th International Conference on Advanced Information Networking and Applications. AINA 2003","acronym":"AINA-03","location":"Xi'an, China"},"container-title":["17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8485\/26745\/01192871.pdf?arnumber=1192871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:58:00Z","timestamp":1497567480000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1192871\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/aina.2003.1192871","relation":{},"subject":[]}}