{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T17:30:29Z","timestamp":1676568629648},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2012,4,1]],"date-time":"2012-04-01T00:00:00Z","timestamp":1333238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Lett."],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1109\/lcomm.2012.022112.112421","type":"journal-article","created":{"date-parts":[[2012,2,22]],"date-time":"2012-02-22T22:13:32Z","timestamp":1329948812000},"page":"554-556","source":"Crossref","is-referenced-by-count":6,"title":["Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols"],"prefix":"10.1109","volume":"16","author":[{"given":"Kyung-Ah","family":"Shim","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"231","article-title":"On the security of the Okamoto-Tanaka ID-based key exchange protocol against active attacks","volume":"e84a","author":"kim","year":"2001","journal-title":"IEICE Trans Fundamentals of Electron Commun and Computer Sciences"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77086-2_6"},{"key":"ref12","first-page":"77","article-title":"A note on the complexity of breaking Okamoto-Tanaka IDbased key exchange scheme","volume":"e82a","author":"mambo","year":"1999","journal-title":"IEICE Trans Fundamentals of Electron Commun and Computer Sciences"},{"key":"ref13","first-page":"262","article-title":"A new two-party identitybased authenticated key agreement","author":"mccullagh","year":"2005","journal-title":"CT-RSA'05"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/49.17711"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/el:20001091"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0030433"},{"key":"ref18","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Advances in Cryptology-CRYPTO?98"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"125","DOI":"10.15388\/Informatica.2007.168","article-title":"An efficient two-party identity-based key exchange protocol","volume":"18","author":"tseng","year":"2007","journal-title":"Informatica"},{"key":"ref4","first-page":"39","article-title":"ID-based one-pass authenticated key establishment","author":"gorantla","year":"0","journal-title":"Proc 2008 Australasian Conference on Information Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.09.032"},{"key":"ref5","first-page":"29","article-title":"An identity-based key-exchange protocol","author":"g\u00fcnther","year":"1990","journal-title":"Advances in Crvotoloev-Eurocrvot'Od"},{"key":"ref8","first-page":"41","article-title":"An improvement of Saeednia's identity-based key exchange protocol","author":"hsieh","year":"0","journal-title":"Information Security Conference 2002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.024"},{"key":"ref2","first-page":"154","article-title":"Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement protocols","volume":"1","author":"choo","year":"0","journal-title":"International Journal of Security and Networks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0011-9"},{"key":"ref9","year":"2006"},{"key":"ref20","first-page":"17","article-title":"Cryptanalysis and improvement of an identity based key exchange protocol","volume":"14","author":"tseng","year":"2002","journal-title":"J Computers"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.09.020"},{"key":"ref21","first-page":"38","article-title":"An ID-based noninter-active tripartite key agreement protocol with k-resilience","author":"tso","year":"0","journal-title":"Proc 2005 International Conference on Communications and Computer Networks"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.02.021"}],"container-title":["IEEE Communications Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4234\/6180057\/06156507.pdf?arnumber=6156507","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:30:30Z","timestamp":1638217830000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6156507\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":23,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/lcomm.2012.022112.112421","relation":{},"ISSN":["1089-7798"],"issn-type":[{"value":"1089-7798","type":"print"}],"subject":[],"published":{"date-parts":[[2012,4]]}}}