{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:50:36Z","timestamp":1729648236695,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csfw.2005.26","type":"proceedings-article","created":{"date-parts":[[2005,7,6]],"date-time":"2005-07-06T22:49:21Z","timestamp":1120690161000},"page":"126-139","source":"Crossref","is-referenced-by-count":6,"title":["Temporal Rank Functions for Forward Secrecy"],"prefix":"10.1109","author":[{"given":"R.","family":"Delicata","sequence":"first","affiliation":[]},{"given":"S.","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Modelling and Security Analysis of Authenticated Group Key Agreement Protocols","year":"2003","author":"pereira","key":"19"},{"key":"17","article-title":"Some new key agreement protocols providing mutual implicit authentication","author":"menezes","year":"1995","journal-title":"Workshop in Selected Areas in Cryptography- SAC"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-46588-1_29"},{"key":"15","article-title":"SIGMA: The 'SIGn and MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols","volume":"2729","author":"krawczyk","year":"1996","journal-title":"Lectures Notes in Computer Science"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1996.492418"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2000.856932"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0034833","article-title":"Authenticated multi-party key agreement","volume":"1163","author":"just","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"11","article-title":"Key compromise, strand spaces, and the authentication tests","volume":"47","author":"guttman","year":"2001","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2002.1021810"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310729"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930137"},{"journal-title":"The Theory and Practice of Concurrency","year":"1997","author":"roscoe","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596775"},{"journal-title":"Concurrent and Real-Time Systems The CSP Approach","year":"2000","author":"schneider","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35496-5_2"},{"key":"26","article-title":"Performance comparison of public-key cryptosystems","volume":"4","author":"wiener","year":"1998","journal-title":"CryptoBytes"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","author":"boyd","year":"2003","journal-title":"Protocols for Authentication and Key Establishment"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1992.213269"},{"key":"10","article-title":"An identity-based key-exchange protocol","volume":"434","author":"gu?nther","year":"1989","journal-title":"Lecture Notes in Computer Science"},{"key":"1","article-title":"Authenticated group key agreement and friends","author":"ateniese","year":"2000","journal-title":"Proceedings of the 5th ACM Conference on Computer and Communication Security"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"6","article-title":"Towards the rank function verification of protocols that use temporary secrets","author":"delicata","year":"2004","journal-title":"Proceedings of the Workshop on Issues in the Theory of Security WITS '04"},{"key":"5","article-title":"A formal model of Diffie-Hellman using CSP and rank functions","volume":"csd tr 3 5","author":"delicata","year":"2003","journal-title":"Technical Report"},{"key":"4","article-title":"Dynamic group Diffie-Hellman key exchange under standard assumptions","volume":"2332","author":"bresson","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Investigating Security Through Proof","year":"2003","author":"evans","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"}],"event":{"name":"18th IEEE Computer Security Foundations Workshop (CSFW'05)","location":"Aix-en-Provence, France"},"container-title":["18th IEEE Computer Security Foundations Workshop (CSFW'05)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9853\/31038\/01443202.pdf?arnumber=1443202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T20:59:48Z","timestamp":1497646788000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1443202\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csfw.2005.26","relation":{},"subject":[]}}