iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-540-69848-7_38
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:06:01Z","timestamp":1725516361415},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540698401"},{"type":"electronic","value":"9783540698487"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69848-7_38","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"458-467","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalytic Flaws in Oh et al.\u2019s ID-Based Authenticated Key Agreement Protocol"],"prefix":"10.1007","author":[{"given":"Meng-Hui","family":"Lim","sequence":"first","affiliation":[]},{"given":"Sanggon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hoonjae","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/3-540-48892-8_26","volume-title":"Selected Areas in Cryptography","author":"S. Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman Key Agreement Protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 339\u2013361. Springer, Heidelberg (1999)"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Proceedings of the 6th IMA International Conference on Cryptography and Coding. LNCS, vol.\u00a01355, pp. 30\u201345 (1997)","DOI":"10.1007\/BFb0024447"},{"key":"38_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"38_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/11554868_17","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"C. Boyd","year":"2005","unstructured":"Boyd, C., Choo, K.-K.R.: Security of Two-Party Identity-Based Key Agreement. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 229\u2013243. Springer, Heidelberg (2005)"},{"key":"38_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/10722028_23","volume-title":"Proceedings of the 4th International Algorithmic Number Theory Symposium (ANTS-IV)","author":"A. Joux","year":"2000","unstructured":"Joux, A.: A One-round Protocol for Tripartite Diffie-Hellman. In: Proceedings of the 4th International Algorithmic Number Theory Symposium (ANTS-IV). LNCS, vol.\u00a01838, pp. 385\u2013394. Springer, Heidelberg (2000)"},{"key":"38_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/978-3-540-30574-3_18","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"N. McCullagh","year":"2005","unstructured":"McCullagh, N., Barreto, P.S.L.M.: A New Two-Party Identity-Based Authenticated Key Agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol.\u00a03376, pp. 262\u2013274. Springer, Heidelberg (2005)"},{"key":"38_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-540-74742-0_41","volume-title":"Parallel and Distributed Processing and Applications","author":"J.-B. Oh","year":"2007","unstructured":"Oh, J.-B., Yoon, E.-J., Yoo, K.-Y.: An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings. In: Stojmenovic, I., Thulasiram, R.K., Yang, L.T., Jia, W., Guo, M., de Mello, R.F. (eds.) ISPA 2007. LNCS, vol.\u00a04742, pp. 446\u2013456. Springer, Heidelberg (2007)"},{"key":"38_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1458","DOI":"10.1007\/978-3-540-24693-0_135","volume-title":"NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications","author":"E.-K. Ryu","year":"2004","unstructured":"Ryu, E.-K., Yoon, E.-J., Yoo, K.-Y.: An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol.\u00a03042, pp. 1458\u20131463. Springer, Heidelberg (2004)"},{"issue":"8","key":"38_CR9","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1049\/el:20030448","volume":"39","author":"K. Shim","year":"2003","unstructured":"Shim, K.: Efficient ID-based Authenticated Key Agreement Protocol based on Weil Pairing. Electronics Letters\u00a039(8), 653\u2013654 (2003)","journal-title":"Electronics Letters"},{"key":"38_CR10","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"N.P. Smart","year":"2002","unstructured":"Smart, N.P.: An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing. Electronics Letters\u00a038, 630\u2013632 (2002)","journal-title":"Electronics Letters"},{"key":"38_CR11","unstructured":"Sun, H.M., Hsieh, B.T.: Security Analysis of Shim\u2019s Authenticated Key Agreement Protocols from Pairings, Cryptology ePrint Archive: Report (113) (2003)"},{"key":"38_CR12","unstructured":"Yuan, Q., Li, S.P.: A New Efficient ID-Based Authenticated Key Agreement Protocol, Cryptology ePrint Archive: Report (309) (2005)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69848-7_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:09:52Z","timestamp":1620014992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69848-7_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540698401","9783540698487"],"references-count":12,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-540-69848-7_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}