{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T22:25:12Z","timestamp":1743459912553},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[1995,1,1]],"date-time":"1995-01-01T00:00:00Z","timestamp":788918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[1995]]},"DOI":"10.1109\/90.365435","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T19:45:59Z","timestamp":1030218359000},"page":"31-41","source":"Crossref","is-referenced-by-count":52,"title":["The KryptoKnight family of light-weight protocols for authentication and key distribution"],"prefix":"10.1109","volume":"3","author":[{"given":"R.","family":"Bird","sequence":"first","affiliation":[]},{"given":"I.","family":"Gopal","sequence":"additional","affiliation":[]},{"given":"A.","family":"Herzberg","sequence":"additional","affiliation":[]},{"given":"P.","family":"Janson","sequence":"additional","affiliation":[]},{"given":"S.","family":"Kutten","sequence":"additional","affiliation":[]},{"given":"R.","family":"Molva","sequence":"additional","affiliation":[]},{"given":"M.","family":"Yung","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref5b","volume":"576","year":"1991","journal-title":"Lecture Notes in Computer Science"},{"key":"ref13a","author":"janson","year":"1993","journal-title":"Secure and minimal protocols for authenticated key distribution"},{"key":"ref13b","year":"0","journal-title":"Comput Commun J"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/74681.74682"},{"key":"ref11","year":"1988","journal-title":"Banking?Key management (wholesale)"},{"key":"ref12","year":"1988","journal-title":"OSI Directory?Part 8 Authentication framework"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/142854.142872"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/74850.74853"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0013897","article-title":"KryptoKnight authentication and key distribution system","author":"molva","year":"1992","journal-title":"Proc ESORICS 92"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"ref22b","doi-asserted-by":"publisher","DOI":"10.1145\/357980.358017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/24592.24593"},{"key":"ref22a","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref2a","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_21"},{"key":"ref2b","year":"0","journal-title":"Advances in Cryptology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/381906.381946"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/49.223869"},{"key":"ref8","year":"77","journal-title":"Data encryption standard"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/358722.358740"},{"key":"ref9","author":"hcrzberg","year":"0","journal-title":"Designing efficient key exchange protocols"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357373"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/155848.155852"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/24592.24594"},{"key":"ref24","article-title":"Kerberos: An authentication server for open network systems","author":"steiner","year":"1988","journal-title":"Proc Usenix Conf"},{"key":"ref23","article-title":"The MD5 message digest algorithm","author":"rivest","year":"91","journal-title":"Internet draft"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1109\/INFCOM.1992.263477","article-title":"Message authentication with one-way hash functions","author":"tsudik","year":"1992","journal-title":"Proc IEEE INFOCOM 92"},{"key":"ref5a","first-page":"44","article-title":"Systematic design of two-party authentication protocols","author":"bird","year":"1991","journal-title":"Proc Crypto 91"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx4\/90\/8375\/00365435.pdf?arnumber=365435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:17:05Z","timestamp":1638217025000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/365435\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"references-count":29,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/90.365435","relation":{},"ISSN":["1063-6692"],"issn-type":[{"value":"1063-6692","type":"print"}],"subject":[],"published":{"date-parts":[[1995]]}}}