{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:09:58Z","timestamp":1774264198159,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iri.2014.7051926","type":"proceedings-article","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T15:16:47Z","timestamp":1425395807000},"page":"466-474","source":"Crossref","is-referenced-by-count":3,"title":["A secure two-party password-authenticated key exchange protocol"],"prefix":"10.1109","author":[{"given":"Maryam","family":"Saeed","sequence":"first","affiliation":[]},{"given":"Hadi Shahriar","family":"Shahhoseini","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Mackvandi","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Rezaeinezhad","sequence":"additional","affiliation":[]},{"given":"Mansour","family":"Naddafiun","sequence":"additional","affiliation":[]},{"given":"Mohammad Zare","family":"Bidoki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"492","article-title":"Cryptanalysis of three Provably Secure Password Authenticated Key Exchange Protocols in the Three-party Setting","volume":"3","author":"saeed","year":"2013","journal-title":"International Journal of Soft Computing and Software Engineering [JSCSE]"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/219282.219298","article-title":"Undetectable on-line password guessing attacks","volume":"29","author":"ding","year":"1995","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.03.007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322514"},{"key":"ref15","year":"2005","journal-title":"IETF Eap Password Authenticated Exchange"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501981"},{"key":"ref17","first-page":"475","article-title":"Efficient password-authenticated key exchange using human-memorable passwords","volume":"2045","author":"katz","year":"2001","journal-title":"Proc of LNCS EUROCRYPT"},{"key":"ref18","article-title":"The art of computer programming","author":"knuth","year":"1981"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.09.020"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","article-title":"Provably secure password-authenticated key exchange using diffie-hellman","volume":"1807","author":"boyko","year":"2000","journal-title":"LNCS Advances in Cryptology EUROCRYPT 2000"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2009.1025.1035"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","article-title":"Protocols for authentication and key establishment","author":"boyd","year":"2003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.03.024"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_1"},{"key":"ref5","first-page":"145","article-title":"New security results on encrypted key exchange","volume":"2947","author":"bresson","year":"2004","journal-title":"LNCS Public key Cryptography"},{"key":"ref8","first-page":"585","article-title":"Examining indistinguishability-based proof models for key establishment protocols","volume":"3788","author":"choo","year":"2005","journal-title":"Advances on in cryptology-asiacrypt'94 LNCS"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0920-5489(04)00100-X"},{"key":"ref2","first-page":"139","article-title":"Authenticated key exchange secure against dictionary attacks","volume":"1807","author":"bellare","year":"2000","journal-title":"Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques LNCS"},{"key":"ref9","article-title":"Eap password authenticated exchange","author":"clancy","year":"2005","journal-title":"A draft"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2007.013181"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1007\/978-3-540-70583-3_57","article-title":"Password mistyping in two-factor-authenticated key exchange","volume":"5126","author":"kolesnikov","year":"2010","journal-title":"In Automata Languages and Programming LNCS"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.09.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.01.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.02.008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0233-z"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213269"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2010.5546794"}],"event":{"name":"2014 IEEE International Conference on Information Reuse and Integration (IRI)","location":"Redwood City, CA, USA","start":{"date-parts":[[2014,8,13]]},"end":{"date-parts":[[2014,8,15]]}},"container-title":["Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7036233\/7051718\/07051926.pdf?arnumber=7051926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T11:49:05Z","timestamp":1566388145000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7051926\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iri.2014.7051926","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}