{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:08Z","timestamp":1750306808847,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,24]],"date-time":"2014-03-24T00:00:00Z","timestamp":1395619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Brain Korea 21 Plus"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,24]]},"DOI":"10.1145\/2554850.2555045","type":"proceedings-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T15:08:30Z","timestamp":1406041710000},"page":"699-705","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks"],"prefix":"10.1145","author":[{"given":"Eun-Jun","family":"Yoon","sequence":"first","affiliation":[{"name":"Kyungil University, Kyungsangpuk-Do, South Korea"}]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[{"name":"Kyungpook National University, Daegu, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2014,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.814918"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029102.1029113"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1136649.1137101"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.17"},{"issue":"2","key":"e_1_3_2_1_5_1","first-page":"61","article-title":"Authenticated encryption schemes: Current status and key issues","volume":"1","author":"M S","year":"2005","unstructured":"Hwang M S , Liu C Y . Authenticated encryption schemes: Current status and key issues . International Journal of Network Security , 2005 , 1 ( 2 ): 61 -- 73 . Hwang M S, Liu C Y. Authenticated encryption schemes: Current status and key issues. International Journal of Network Security, 2005, 1(2): 61--73.","journal-title":"International Journal of Network Security"},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"77","article-title":"A simple attack on a recently introduced hash-based strong-password authentication scheme","volume":"1","author":"C","year":"2005","unstructured":"Kim M, Koc C K . A simple attack on a recently introduced hash-based strong-password authentication scheme . International Journal of Network Security , 2005 , 1 ( 2 ): 77 -- 80 . Kim M, Koc C K. A simple attack on a recently introduced hash-based strong-password authentication scheme. International Journal of Network Security, 2005, 1(2): 77--80.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2004.06.001"},{"issue":"3","key":"e_1_3_2_1_8_1","first-page":"137","article-title":"The advanced encryption standard","volume":"26","author":"R","year":"2001","unstructured":"Daemen J, Rijndael R V . The advanced encryption standard . Dr. Dobb's Journal , 2001 , 26 ( 3 ): 137 -- 139 . Daemen J, Rijndael R V. The advanced encryption standard. Dr. Dobb's Journal, 2001, 26(3): 137--139.","journal-title":"Dr. Dobb's Journal"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.01.002"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.05.061"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020380"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2004.03.003"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"IACR Cryptology ePrint Archive","author":"He D.","year":"2012","unstructured":"D. He , Robust biometric-based user authentication scheme for wireless sensor networks , IACR Cryptology ePrint Archive 2012 , vol. 203 , pp. 1 -- 15 , 2012. D. He, Robust biometric-based user authentication scheme for wireless sensor networks, IACR Cryptology ePrint Archive 2012, vol. 203, pp. 1--15, 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-010-0318-2"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2011.47"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_2_1_18_1","first-page":"417","volume-title":"Lecture notes in computer science","author":"Miller V.","year":"1986","unstructured":"V. Miller , \"Uses of elliptic curves in cryptography,\" In : Proc of CRYPTO'85 , Lecture notes in computer science , vol. 218 , Springer , Berlin , pp. 417 -- 426 , 1986 . V. Miller, \"Uses of elliptic curves in cryptography,\" In: Proc of CRYPTO'85, Lecture notes in computer science, vol. 218, Springer, Berlin, pp. 417--426, 1986."},{"key":"e_1_3_2_1_19_1","volume-title":"Guide to elliptic curve cryptography,\" Lecture notes in computer science","author":"Hankerson D.","year":"2004","unstructured":"D. Hankerson , A. Menezes , and S. Vanstone , \" Guide to elliptic curve cryptography,\" Lecture notes in computer science , Springer , Berlin , 2004 . D. Hankerson, A. Menezes, and S. Vanstone, \"Guide to elliptic curve cryptography,\" Lecture notes in computer science, Springer, Berlin, 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_21_1","volume-title":"Handbook of applied cryptography","author":"Menezes A. J.","year":"1997","unstructured":"A. J. Menezes , P. C. Oorschot , and S. A. Vanstone , Handbook of applied cryptography , CRC Press New York , 1997 . A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of applied cryptography, CRC Press New York, 1997."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_82"}],"event":{"name":"SAC 2014: Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Gyeongju Republic of Korea","acronym":"SAC 2014"},"container-title":["Proceedings of the 29th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2554850.2555045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2554850.2555045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:03Z","timestamp":1750232103000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2554850.2555045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,24]]},"references-count":22,"alternative-id":["10.1145\/2554850.2555045","10.1145\/2554850"],"URL":"https:\/\/doi.org\/10.1145\/2554850.2555045","relation":{},"subject":[],"published":{"date-parts":[[2014,3,24]]},"assertion":[{"value":"2014-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}