iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/S11277-015-3123-6
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T05:08:31Z","timestamp":1694495311134},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,11,21]],"date-time":"2015-11-21T00:00:00Z","timestamp":1448064000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1007\/s11277-015-3123-6","type":"journal-article","created":{"date-parts":[[2015,11,21]],"date-time":"2015-11-21T08:12:42Z","timestamp":1448093562000},"page":"337-356","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client\u2013Client Networks"],"prefix":"10.1007","volume":"88","author":[{"given":"Mohammad","family":"Heydari","sequence":"first","affiliation":[]},{"given":"S. Mohammad Sajad","family":"Sadough","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5821-4237","authenticated-orcid":false,"given":"Mohammad Sabzinejad","family":"Farash","sequence":"additional","affiliation":[]},{"given":"Shehzad Ashraf","family":"Chaudhry","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Mahmood","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,21]]},"reference":[{"issue":"2","key":"3123_CR1","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.compeleceng.2011.02.007","volume":"37","author":"MS Farash","year":"2011","unstructured":"Farash, M. S., Bayat, M., & Attari, M. A. (2011). Vulnerability of two multiple-key agreement protocols. Computers & Electrical Engineering, 37(2), 199\u2013204.","journal-title":"Computers & Electrical Engineering"},{"issue":"3","key":"3123_CR2","doi-asserted-by":"crossref","first-page":"321","DOI":"10.7763\/IJET.2012.V4.374","volume":"4","author":"MS Farash","year":"2012","unstructured":"Farash, M. S., Attari, M. A., & Bayat, M. (2012). A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings. IACSIT International Journal of Engineering and Technology, 4(3), 321\u2013325.","journal-title":"IACSIT International Journal of Engineering and Technology"},{"issue":"2","key":"3123_CR3","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.compeleceng.2012.09.004","volume":"39","author":"MS Farash","year":"2013","unstructured":"Farash, M. S., Attari, M. A., Atani, R. E., & Jami, M. (2013). A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Computers & Electrical Engineering, 39(2), 530\u2013541.","journal-title":"Computers & Electrical Engineering"},{"issue":"1","key":"3123_CR4","first-page":"1","volume":"5","author":"MS Farash","year":"2013","unstructured":"Farash, M. S., & Attari, M. A. (2013). Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. The ISC International Journal of Information Security, 5(1), 1\u201315.","journal-title":"The ISC International Journal of Information Security"},{"issue":"2","key":"3123_CR5","first-page":"143","volume":"16","author":"MS Farash","year":"2014","unstructured":"Farash, M. S., & Attari, M. A. (2014). A pairing-free ID-based key agreement protocol with different PKGs. International Journal of Network Security, 16(2), 143\u2013148.","journal-title":"International Journal of Network Security"},{"issue":"1","key":"3123_CR6","first-page":"53","volume":"41","author":"BL Chen","year":"2012","unstructured":"Chen, B. L., Kuo, W. C., & Wuu, L. C. (2012). A secure password-based remote user authentication scheme without smart cards. Information Technology and Control, 41(1), 53\u201359.","journal-title":"Information Technology and Control"},{"issue":"2","key":"3123_CR7","doi-asserted-by":"crossref","first-page":"150","DOI":"10.5755\/j01.itc.42.2.2079","volume":"42","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Li, G., & Ma, Z. (2013). An improved password-based remote user authentication protocol without smart cards. Information Technology and Control, 42(2), 150\u2013158.","journal-title":"Information Technology and Control"},{"key":"3123_CR8","doi-asserted-by":"crossref","unstructured":"Bayat, M., Farash, M. S., & Movahed, A. (2010). A Novel Secure bilinear pairing based remote user authentication scheme with smart card. In IEEE\/IFIP international conference on embedded and ubiquitous computing (EUC) (pp. 578\u2013582).","DOI":"10.1109\/EUC.2010.93"},{"issue":"4","key":"3123_CR9","doi-asserted-by":"crossref","first-page":"333","DOI":"10.5755\/j01.itc.42.4.2496","volume":"42","author":"MS Farash","year":"2013","unstructured":"Farash, M. S., & Attari, M. A. (2013). An enhanced authenticated key agreement for session initiation protocol. Information Technology and Control, 42(4), 333\u2013342.","journal-title":"Information Technology and Control"},{"key":"3123_CR10","author":"MS Farash","year":"2013","unstructured":"Farash, M. S., & Attari, M. A. (2013). Cryptanalysis and improvement of a chaotic maps-based key agreement protocol using Chebyshev sequence membership testing. Nonlinear Dynamics. doi: 10.1007\/s11071-013-1204-1 .","journal-title":"Nonlinear Dynamics."},{"issue":"3","key":"3123_CR11","first-page":"231","volume":"42","author":"Q Xie","year":"2013","unstructured":"Xie, Q., Dong, N., Tan, X., Wong, D. S., & Wang, G. (2013). Improvement of a three-party password-based key exchange protocol with formal verification. Information Technology and Control, 42(3), 231\u2013237.","journal-title":"Information Technology and Control"},{"issue":"8","key":"3123_CR12","doi-asserted-by":"crossref","first-page":"2069","DOI":"10.1007\/s13369-013-0543-z","volume":"38","author":"T Liu","year":"2013","unstructured":"Liu, T., Pu, Q., Zhao, Y., & Wu, S. (2013). ECC-based password-authenticated key exchange in the three-party setting. Arabian Journal for Science and Engineering, 38(8), 2069\u20132077.","journal-title":"Arabian Journal for Science and Engineering"},{"issue":"6","key":"3123_CR13","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1093\/comjnl\/bxn070","volume":"52","author":"HY Chien","year":"2009","unstructured":"Chien, H. Y., & Wu, T. C. (2009). Provably secure password-based three-party key exchange with optimal message steps. Computer Journal, 52(6), 646\u2013655.","journal-title":"Computer Journal"},{"issue":"4","key":"3123_CR14","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1016\/j.camwa.2009.02.039","volume":"58","author":"TF Lee","year":"2009","unstructured":"Lee, T. F., Liu, J. L., Sung, M. J., Yang, S. B., & Chen, C. M. (2009). Communication-efficient three-party protocols for authentication and key agreement. Computers & Mathematics with Applications, 58(4), 641\u2013648.","journal-title":"Computers & Mathematics with Applications"},{"issue":"1","key":"3123_CR15","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ins.2013.02.004","volume":"235","author":"H Xiong","year":"2013","unstructured":"Xiong, H., Chen, Y., Guan, Z., & Chen, Z. (2013). Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys. Information Sciences, 235(1), 329\u2013340.","journal-title":"Information Sciences"},{"issue":"1\u20132","key":"3123_CR16","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.csi.2007.08.010","volume":"30","author":"HB Chen","year":"2008","unstructured":"Chen, H. B., Chen, T. H., Lee, W. B., & Chang, C. C. (2008). Security enhancement for a three-party encrypted key exchange protocol against undectectable on-line password guessing attacks. Computer Standards & Interfaces, 30(1\u20132), 95\u201399.","journal-title":"Computer Standards & Interfaces"},{"issue":"1","key":"3123_CR17","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1016\/j.ins.2011.07.015","volume":"184","author":"J Zhao","year":"2012","unstructured":"Zhao, J., & Gu, D. (2012). Provably secure three-party password-based authenticated key. Information Sciences, 184(1), 310\u2013323.","journal-title":"Information Sciences"},{"issue":"2","key":"3123_CR18","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.jss.2011.08.024","volume":"85","author":"JH Yang","year":"2012","unstructured":"Yang, J. H., & Cao, T. J. (2012). Provably secure three-party password authenticated key exchange protocol in the standard model. Journal of Systems and Software, 85(2), 340\u2013350.","journal-title":"Journal of Systems and Software"},{"issue":"1","key":"3123_CR19","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.compeleceng.2008.05.007","volume":"35","author":"HS Kim","year":"2009","unstructured":"Kim, H. S., & Choi, J. Y. (2009). Enhanced password-based simple three-party key exchange protocol. Computers & Electrical Engineering, 35(1), 107\u2013114.","journal-title":"Computers & Electrical Engineering"},{"issue":"3","key":"3123_CR20","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/LCOMM.2009.081609","volume":"13","author":"J Nam","year":"2009","unstructured":"Nam, J., Paik, J., Kang, H. K., Kim, U. M., & Won, D. (2009). An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communications Letters, 13(3), 205\u2013207.","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"3123_CR21","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1016\/j.ins.2010.09.011","volume":"181","author":"J Nam","year":"2011","unstructured":"Nam, J., Paik, J., & Won, D. (2011). A security weakness in Abdalla et al.\u2019s generic construction of a group key exchange protocol. Information Sciences, 181(1), 234\u2013238.","journal-title":"Information Sciences"},{"issue":"4","key":"3123_CR22","first-page":"504","volume":"24","author":"DC Lou","year":"2010","unstructured":"Lou, D. C., & Huang, H. F. (2010). Efficient three-party password-based key exchange scheme. International Journal of Communication Systems, 24(4), 504\u2013512.","journal-title":"International Journal of Communication Systems"},{"issue":"7","key":"3123_CR23","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1002\/dac.1002","volume":"22","author":"HF Huang","year":"2009","unstructured":"Huang, H. F. (2009). A simple three-party password-based key exchange protocol. International Journal of Communication Systems, 22(7), 857\u2013862.","journal-title":"International Journal of Communication Systems"},{"issue":"4","key":"3123_CR24","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1002\/dac.1168","volume":"24","author":"EJ Yoon","year":"2011","unstructured":"Yoon, E. J., & Yoo, K. Y. (2011). Cryptanalysis of a simple three-party password-based key exchange protocol. International Journal of Communication Systems, 24(4), 532\u2013542.","journal-title":"International Journal of Communication Systems"},{"issue":"3","key":"3123_CR25","first-page":"215","volume":"10","author":"S Wu","year":"2013","unstructured":"Wu, S., Chen, K., & Zhu, Y. (2013). Enhancements of a three-party password-based authenticated key exchange protocol. International Arab Journal of Information Technology, 10(3), 215.","journal-title":"International Arab Journal of Information Technology"},{"issue":"9","key":"3123_CR26","doi-asserted-by":"crossref","first-page":"1702","DOI":"10.1016\/j.ins.2010.01.005","volume":"180","author":"TF Lee","year":"2010","unstructured":"Lee, T. F., & Hwang, T. (2010). Simple password-based three-party authenticated key exchange without server public keys. Information Sciences, 180(9), 1702\u20131714.","journal-title":"Information Sciences"},{"issue":"1","key":"3123_CR27","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ins.2010.08.032","volume":"181","author":"TY Chang","year":"2011","unstructured":"Chang, T. Y., Hwang, M. S., & Yang, W. P. (2011). A communication-efficient three-party password authenticated key exchange protocol. Information Sciences, 181(1), 217\u2013226.","journal-title":"Information Sciences"},{"issue":"1","key":"3123_CR28","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.ins.2012.06.005","volume":"215","author":"S Wu","year":"2012","unstructured":"Wu, S., Pu, Q., Wang, S., & He, D. (2012). Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol. Information Sciences, 215(1), 83\u201396.","journal-title":"Information Sciences"},{"key":"3123_CR29","author":"R Tso","year":"2013","unstructured":"Tso, R. (2013). Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. The Journal of Supercomputing. doi: 10.1007\/s11227-013-0917-8 .","journal-title":"The Journal of Supercomputing."},{"issue":"4","key":"3123_CR30","first-page":"1487","volume":"27","author":"H Chien","year":"2011","unstructured":"Chien, H. (2011). Secure verifier-based three-party key exchange in the random oracle model. Journal of Information Science and Engineering, 27(4), 1487\u20131501.","journal-title":"Journal of Information Science and Engineering"},{"issue":"1","key":"3123_CR31","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s12083-012-0125-y","volume":"6","author":"Q Pu","year":"2013","unstructured":"Pu, Q., Wang, J., Wu, S., & Fu, J. (2013). Secure verifier-based three-party password-authenticated key exchange. Peer-to-Peer Networking and Applications, 6(1), 15\u201325.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"1","key":"3123_CR32","doi-asserted-by":"crossref","first-page":"15","DOI":"10.5755\/j01.itc.41.1.842","volume":"41","author":"S Tallapally","year":"2012","unstructured":"Tallapally, S. (2012). Security enhancement on simple three-party PAKE protocol. Information Technology and Control, 41(1), 15\u201322.","journal-title":"Information Technology and Control"},{"key":"3123_CR33","author":"MS Farash","year":"2014","unstructured":"Farash, M. S., & Attari, M. A. (2014). An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dynamics. doi: 10.1007\/s11071-014-1304-6 .","journal-title":"Nonlinear Dynamics."},{"issue":"2","key":"3123_CR34","first-page":"1367","volume":"52","author":"TY Youn","year":"2013","unstructured":"Youn, T. Y., Kang, E. S., & Lee, C. (2013). Efficient three-party key exchange protocols with round efficiency. Telecommunication Systems, 52(2), 1367\u20131376.","journal-title":"Telecommunication Systems"},{"key":"3123_CR35","doi-asserted-by":"crossref","unstructured":"Abdalla, M., & Pointcheval, D. (2005). Interactive Diffie\u2013Hellman assumptions with applications to password-based authentication. In Proceedings of FC\u201905, LNCS 3570 (pp. 341\u2013356).","DOI":"10.1007\/11507840_31"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3123-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-3123-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-3123-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:18:31Z","timestamp":1559395111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-3123-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,21]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,5]]}},"alternative-id":["3123"],"URL":"http:\/\/dx.doi.org\/10.1007\/s11277-015-3123-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,21]]}}}