{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:24Z","timestamp":1750307904840,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,1,31]],"date-time":"2008-01-31T00:00:00Z","timestamp":1201737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,1,31]]},"DOI":"10.1145\/1352793.1352862","type":"proceedings-article","created":{"date-parts":[[2008,3,25]],"date-time":"2008-03-25T15:57:23Z","timestamp":1206460643000},"page":"329-333","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Security design for three-party encrypted key exchange protocol using smart cards"],"prefix":"10.1145","author":[{"given":"Chin-Chen","family":"Chang","sequence":"first","affiliation":[{"name":"Feng Chia University, Taichung, Taiwan, R.O.C."}]},{"given":"Jung-San","family":"Lee","sequence":"additional","affiliation":[{"name":"National Chung Cheng University, Chiayi, Taiwan, R.O.C."}]},{"given":"Ting-Fang","family":"Cheng","sequence":"additional","affiliation":[{"name":"National Tsing-Hua University, Hsinchu, Taiwan, R.O.C."}]}],"member":"320","published-online":{"date-parts":[[2008,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"471","volume":"26","author":"Chang C. C.","year":"2004","unstructured":"Chang , C. C. , Chang , Y. F. : A Novel Three -party Encrypted Key Exchange Protocol. Computer Standards &amp; Interfaces , vol. 26 , ( 2004 ), pp. 471 -- 476 Chang, C. C., Chang, Y. F.: A Novel Three-party Encrypted Key Exchange Protocol. Computer Standards &amp; Interfaces, vol. 26, (2004), pp. 471--476","journal-title":"Interfaces"},{"key":"e_1_3_2_1_2_1","first-page":"3088","volume-title":"Liu","author":"Chang Y. F.","year":"2004","unstructured":"Chang , Y. F. , Chang , C. C. , Liu , Y. L. : Password Authentication without the Server Public Key. IEICE Transactions on Communications , vol. E87-B, no. 10 , ( 2004 ), pp. 3088 -- 3091 Chang, Y. F., Chang, C. C., Liu, Y. L.: Password Authentication without the Server Public Key. IEICE Transactions on Communications, vol. E87-B, no. 10, (2004), pp. 3088--3091"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/882488.884178"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1309439"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/506106.506108"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/4234.974498"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.007"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.08.005"},{"key":"e_1_3_2_1_9_1","volume-title":"Effing","author":"Rankl W.","year":"2000","unstructured":"Rankl , W. , Effing , W. : Smart Card Handbook, John Wiley and Sons , 2 nd Edition ( 2000 ) Rankl, W., Effing, W.: Smart Card Handbook, John Wiley and Sons, 2nd Edition (2000)","edition":"2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2003.11.017"},{"key":"e_1_3_2_1_11_1","first-page":"15","volume-title":"Protocols, Algorithms, and Source Code in C","author":"Schneier B.","year":"1996","unstructured":"Schneier , B. : Applied Cryptography , Protocols, Algorithms, and Source Code in C , John Wiley and Sons Inc ., 2 nd Edition, New York, U.S.A., pp. 15 ( 1996 ) Schneier, B.: Applied Cryptography, Protocols, Algorithms, and Source Code in C, John Wiley and Sons Inc., 2nd Edition, New York, U.S.A., pp. 15 (1996)","edition":"2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/206826.206834"}],"event":{"name":"ICUIMC08: The Second International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGMOD ACM Special Interest Group on Management of Data"],"location":"Suwon Korea","acronym":"ICUIMC08"},"container-title":["Proceedings of the 2nd international conference on Ubiquitous information management and communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352793.1352862","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1352793.1352862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:40Z","timestamp":1750258060000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352793.1352862"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,31]]},"references-count":12,"alternative-id":["10.1145\/1352793.1352862","10.1145\/1352793"],"URL":"https:\/\/doi.org\/10.1145\/1352793.1352862","relation":{},"subject":[],"published":{"date-parts":[[2008,1,31]]},"assertion":[{"value":"2008-01-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}