{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:14:10Z","timestamp":1729671250798,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/enabl.2002.1029992","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T22:14:31Z","timestamp":1056579271000},"page":"77-82","source":"Crossref","is-referenced-by-count":3,"title":["What are multi-protocol guessing attacks and how to prevent them"],"prefix":"10.1109","author":[{"given":"S.","family":"Malladi","sequence":"first","affiliation":[]},{"given":"J.","family":"Alves-Foss","sequence":"additional","affiliation":[]},{"given":"S.","family":"Malladi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/CSFW.2000.856942"},{"key":"ref11","article-title":"The Kerberos network authentication service (v5)","author":"kohl","year":"1993","journal-title":"RFC 1510"},{"key":"ref12","first-page":"147","article-title":"Breaking and fixing the Needham-Schroeder public-key protocol using FDR","volume":"1055","author":"lowe","year":"1996","journal-title":"proceedings of TACAS"},{"key":"ref13","article-title":"Analyzing protocols subject to guessing attacks","author":"lowe","year":"2002","journal-title":"Workshop on Issues in the Theory of Security (WITS)"},{"key":"ref14","article-title":"Preventing Guessing Attacks Using Fingerprint Biometrics","author":"malladi","year":"2002","journal-title":"Proceedings of 2002 International Conference on Security and Management SAM02"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/359168.359172"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/155848.155852"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1109\/CSFW.1997.596775","article-title":"Verifying authentication protocols with CS P","author":"schneider","year":"1997","journal-title":"Proceedings of the 10th IEEE Computer Security Foundations Workshop"},{"key":"ref4","article-title":"Why is a security protocol correct?","author":"f\u00e1brega","year":"1998","journal-title":"IEEE Symposium on Security and Privacy"},{"year":"1999","author":"dierks","article-title":"The TLS protocol. RFC 2246","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","article-title":"Strand spaces: Proving security protocols correct","volume":"7","author":"f\u00e1brega","year":"1999","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/CSFW.1999.779763"},{"key":"ref8","article-title":"Strand Spaces and Protocol Security Goals","author":"guttman","year":"1998","journal-title":"Foundations of Security Analysis and Design"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/49.223865"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/CSFW.2000.856933"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/RISP.1992.213269"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CSFW.2000.856923"}],"event":{"acronym":"ENABL-02","name":"Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE 20022","location":"Pittsburgh, PA, USA"},"container-title":["Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8006\/22131\/01029992.pdf?arnumber=1029992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,24]],"date-time":"2018-02-24T23:31:25Z","timestamp":1519515085000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1029992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/enabl.2002.1029992","relation":{},"subject":[]}}