{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:18Z","timestamp":1725808398542},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_4","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"29-37","source":"Crossref","is-referenced-by-count":2,"title":["DNA Encryption Based Dual Server Password Authentication"],"prefix":"10.1007","author":[{"given":"P. V. S. N.","family":"Raju","sequence":"first","affiliation":[]},{"given":"Pritee","family":"Parwekar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"4_CR1","first-page":"36","volume":"3","author":"G. Jacob","year":"2013","unstructured":"Jacob, G., Murugan, A.: DNA based Cryptography: An Overview and Analysis. Int. J. Emerg. Sci.\u00a03(1), 36\u201342 (2013) ISSN: 2222-4254","journal-title":"Int. J. Emerg. Sci."},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L.M. Adleman","year":"1994","unstructured":"Adleman, L.M.: Molecular computation of solutions to combinational problems. Science\u00a0266, 1021\u20131024 (1994)","journal-title":"Science"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0303-2647(00)00083-6","volume":"57","author":"A. Leier","year":"2000","unstructured":"Leier, A., Richter, C., Banzhaf, W.: Cryptography with DNA binary strands. Biosystems\u00a057, 13\u201322 (2000)","journal-title":"Biosystems"},{"key":"4_CR4","unstructured":"Naveen, J.K., Karthigaikumar, P., Sivamangai, N.M.: Hardware implementation of DNA based cryptography. In: Proceedings of 2013 IEEE Conference on Information and Communication Technologies, ICT 2013 (2013)"},{"issue":"5","key":"4_CR5","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"Gong, L., Lomas, T.M.A., Needham, R.M., Saltzer, J.H.: Protecting Poorly-Chosen Secret from Guessing Attacks. IEEE J. Selected Areas in Comm.\u00a011(5), 648\u2013656 (1993)","journal-title":"IEEE J. Selected Areas in Comm."},{"key":"4_CR6","unstructured":"Brainard, J., Jueles, A., Kaliski, B.S., Szydlo, M.: A New Two-Server Approach for Authentication with Short Secret. In: Proc. 12th Conf. USENIX Security Symp., pp. 201\u2013214 (2003)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11496137_1","volume-title":"Applied Cryptography and Network Security","author":"J. Katz","year":"2005","unstructured":"Katz, J., MacKenzie, P., Taban, G., Gligor, V.: Two-Server Password-Only Authenticated Key Exchange. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 1\u201316. Springer, Heidelberg (2005)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Yang, Y., Bao, F., Deng, R.H.: A New Architecture for Authentication and Key Exchange Using Password for Federated Enterprise. In: Proc. 20th IFIP Int\u2019l Information Security Conf. (SEC 2005), pp. 95\u2013111 (2005)","DOI":"10.1007\/0-387-25660-1_7"},{"issue":"2","key":"4_CR9","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/TDSC.2006.16","volume":"3","author":"Y. Yang","year":"2006","unstructured":"Yang, Y., Deng, R.H., Bao, F.: A Practical Password-Based Two-Server Authentication and key Exchange System. IEEE Trans. Dependable and Secure Computing\u00a03(2), 105\u2013114 (2006)","journal-title":"IEEE Trans. Dependable and Secure Computing"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Yi, X., Ling, S., Wang, H.: Efficient Two-Server Password-Only Authenticated Key Exchange. IEEE Transactions on Parallel and Distributed Systems\u00a024(9) (2013)","DOI":"10.1109\/TPDS.2012.282"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Mukesh, R., Damodaram, A., Subbiah Bharathi, V.: A robust fingerprint based twoserver authentication and key exchange system. In: 3rd International Conference on Communication Systems Software and Middleware and Workshops, Bangalore, pp. 167\u2013174 (2008)","DOI":"10.1109\/COMSWA.2008.4554400"},{"key":"4_CR12","unstructured":"Kaliski, B., Szydlo, M., Brainard, J., Juels, A.: Nightingale: A new two-server approach for authentication with short secrets. In: Proceedings of the 12th USENIX Workshop on Security, pp. 1\u20132. IEEE Computer Society (2003)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Yang, D., Yang, B.: A Novel Two-Server Password Authentication Scheme with Provable Security. In: IEEE Transaction 2010 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010)","DOI":"10.1109\/CIT.2010.284"},{"key":"4_CR14","unstructured":"Wang, X., Zhang, Q.: DNA computing-based cryptography. Key Laboratory of Advanced Design and Intelligent computing (Dalian university), Ministry of Education, Dalian, 116622, China"},{"key":"4_CR15","series-title":"AISC","first-page":"21","volume-title":"Proc. of the 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 2014","author":"G. Madhulika","year":"2015","unstructured":"Madhulika, G., Rao, C.S.: Generating digital signature using DNA coding. In: Satapathy, S.C., Biswal, B.N., Udgata, S.K., Mandal, J.K. (eds.) Proc. of the 3rd Int. Conf. on Front. of Intell. Comput. (FICTA) 2014. AISC, vol.\u00a0328, pp. 21\u201328. Springer, Heidelberg (2015)"},{"key":"4_CR16","unstructured":"BruteForceAttacks, \n http:\/\/www.password-depot.com\/know-how\/bruteforceattacks.htm"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T09:24:00Z","timestamp":1674552240000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_4","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}