{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:40:20Z","timestamp":1729662020328,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/iscc.2011.5983913","type":"proceedings-article","created":{"date-parts":[[2011,8,16]],"date-time":"2011-08-16T15:24:01Z","timestamp":1313508241000},"page":"652-657","source":"Crossref","is-referenced-by-count":0,"title":["Security analysis and improvement of Smart Card-Based Authenticated Key Exchange protocol with CAPTCHAs for wireless mobile network"],"prefix":"10.1109","author":[{"given":"Maryam","family":"Saeed","sequence":"first","affiliation":[]},{"given":"Hadi Shahriar","family":"Shahhoseini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16342-5_10"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.04.002"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2010.5497354"},{"key":"1","first-page":"2088","article-title":"An Improved Authenticated Key Agreement Protocol with Perfect Forward Secrecy for Wireless Mobile Communication","author":"sui","year":"2005","journal-title":"Proc IEEE Wireless Communications and Networking Conf (WCNC)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.006"},{"key":"6","first-page":"388","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Proc of Advances in Cryptology (CRYPTO99)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2008.4632635"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2009.08.007"},{"key":"9","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-540-30574-3_14","article-title":"Simple password-based encrypted key exchange protocols","volume":"3376","author":"abdalla","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"11","first-page":"294","article-title":"The CAPTCHA: Using Hard AI Problem for Security","volume":"2656","author":"ahn","year":"2003","journal-title":"LNCS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2010.5546794"}],"event":{"name":"2011 IEEE Symposium on Computers and Communications (ISCC)","start":{"date-parts":[[2011,6,28]]},"location":"Corfu, Greece","end":{"date-parts":[[2011,7,1]]}},"container-title":["2011 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5975307\/5983788\/05983913.pdf?arnumber=5983913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T00:48:07Z","timestamp":1497919687000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5983913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iscc.2011.5983913","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}