{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:29:39Z","timestamp":1773322179618,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ictc.2012.6386785","type":"proceedings-article","created":{"date-parts":[[2013,1,2]],"date-time":"2013-01-02T23:14:36Z","timestamp":1357168476000},"page":"87-91","source":"Crossref","is-referenced-by-count":2,"title":["An enhanced password authenticated key exchange protocol without server public keys"],"prefix":"10.1109","author":[{"given":"Maryam","family":"Saeed","sequence":"first","affiliation":[]},{"given":"Ali","family":"Mackvandi","sequence":"additional","affiliation":[]},{"given":"Mansour","family":"Naddafiun","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"reza Karimnejad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","article-title":"SIGMA: The 'SIGn-and-MAc' approach to authenticated diffie-hellman and Its use in the IKE protocols","volume":"2729","author":"krawczyk","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"13","year":"2004","journal-title":"Standard Specifications for Password-Based Public-Key Cryptographic Techniques"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2010.5546794"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.29"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.8.27-35"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/11610496_88"},{"key":"2","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1504\/IJSN.2007.013181","article-title":"Strong password-based authentication in tls using the three-party group diffie hellman protocol","volume":"2","author":"abdalla","year":"2007","journal-title":"International Journal of Security and Networks"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213269"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIE.2009.39"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.005"},{"key":"6","first-page":"139","article-title":"Authenticated key exchange secure against dictionary attacks","volume":"1807","author":"bellare","year":"2000","journal-title":"Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques LNCS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.08.004"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.03.024"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.09.020"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.02.008"}],"event":{"name":"2012 International Conference on ICT Convergence (ICTC)","location":"Jeju, Korea (South)","start":{"date-parts":[[2012,10,15]]},"end":{"date-parts":[[2012,10,17]]}},"container-title":["2012 International Conference on ICT Convergence (ICTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6375583\/6386757\/06386785.pdf?arnumber=6386785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:06:00Z","timestamp":1498007160000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6386785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ictc.2012.6386785","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}