{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:20:07Z","timestamp":1759134007892,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T00:00:00Z","timestamp":1521158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,16]]},"DOI":"10.1145\/3199478.3199508","type":"proceedings-article","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T16:26:42Z","timestamp":1531240002000},"page":"110-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["DNA-X"],"prefix":"10.1145","author":[{"given":"Haiyou","family":"Sun","sequence":"first","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, China"}]},{"given":"Sheng","family":"Xiao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, China"}]}],"member":"320","published-online":{"date-parts":[[2018,3,16]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Park N. Kim M. and Bang H. C. 2015. Symmetric Key-Based Authentication and the Session Key Agreement Scheme in IoT Environment. In Computer Science and its Applications. Springer Berlin Heidelberg 379--384.  Park N. Kim M. and Bang H. C. 2015. Symmetric Key-Based Authentication and the Session Key Agreement Scheme in IoT Environment. In Computer Science and its Applications. Springer Berlin Heidelberg 379--384.","key":"e_1_3_2_1_1_1","DOI":"10.1007\/978-3-662-45402-2_58"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1007\/s11277-015-2699-1"},{"volume-title":"Information Science and Technology (ICIST), 2014 4th IEEE International Conference, 225--229","author":"Uymatiao M. L. T.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/SP.2012.12"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1504\/IJSN.2012.053461"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/JPROC.2003.819611"},{"unstructured":"P. D. MacKenzie and R. Swaminathan. 1999. Secure Network Authentication with Password Identification. Submitted to the IEEE P1363 Working Group.  P. D. MacKenzie and R. Swaminathan. 1999. Secure Network Authentication with Password Identification. Submitted to the IEEE P1363 Working Group.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/j.csi.2008.09.006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1007\/3-540-49380-8_8"},{"issue":"4","key":"e_1_3_2_1_10_1","first-page":"69","article-title":"One-Time Password Authentication Techniques Survey","volume":"9","author":"Samy M. A.","year":"2017","journal-title":"Data Mining and Knowledge Engineering"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.12720\/jcm.8.11.780-787"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/35.312841"},{"unstructured":"Adams C. and Lloyd S. 2003. Understanding PKI: concepts standards and deployment considerations. Addison-Wesley Professional.   Adams C. and Lloyd S. 2003. Understanding PKI: concepts standards and deployment considerations. Addison-Wesley Professional.","key":"e_1_3_2_1_13_1"},{"volume-title":"INFOCOM, 2010 Proceedings IEEE, 1--9.","author":"Xiao S.","key":"e_1_3_2_1_14_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/SP.2012.44"},{"volume-title":"Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy (Vol. 13)","author":"Anati I.","key":"e_1_3_2_1_16_1"}],"event":{"sponsor":["Wuhan Univ. Wuhan University, China","University of Electronic Science and Technology of China University of Electronic Science and Technology of China"],"acronym":"ICCSP 2018","name":"ICCSP 2018: 2018 the 2nd International Conference on Cryptography, Security and Privacy","location":"Guiyang China"},"container-title":["Proceedings of the 2nd International Conference on Cryptography, Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3199478.3199508","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3199478.3199508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:51Z","timestamp":1750210791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3199478.3199508"}},"subtitle":["Dynamic Network Authentication using SGX"],"short-title":[],"issued":{"date-parts":[[2018,3,16]]},"references-count":16,"alternative-id":["10.1145\/3199478.3199508","10.1145\/3199478"],"URL":"https:\/\/doi.org\/10.1145\/3199478.3199508","relation":{},"subject":[],"published":{"date-parts":[[2018,3,16]]},"assertion":[{"value":"2018-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}