{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:17:17Z","timestamp":1725560237288},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283232"},{"type":"electronic","value":"9783540318538"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11539087_149","type":"book-chapter","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T22:26:10Z","timestamp":1279664770000},"page":"1117-1120","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Remote User Authentication Scheme Using Interacting Neural Network"],"prefix":"10.1007","author":[{"given":"Tieming","family":"Chen","sequence":"first","affiliation":[]},{"given":"Jiamei","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"149_CR1","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/TCE.2003.1261225","volume":"49","author":"A.K. Awasthi","year":"2003","unstructured":"Awasthi, A.K., Lal, S.: A remote user authentication scheme using smarts cards with forward secrecy. IEEE Trans. Consumer Electronic\u00a049(4), 1246\u20131248 (2003)","journal-title":"IEEE Trans. Consumer Electronic"},{"issue":"4","key":"149_CR2","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"H.Y. Chien","year":"2002","unstructured":"Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: smart card. Computer & Security\u00a021(4), 372\u2013375 (2002)","journal-title":"Computer & Security"},{"issue":"4","key":"149_CR3","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/583800.583803","volume":"36","author":"C.C. Lee","year":"2002","unstructured":"Lee, C.C., Li, L.H., Hwang, M.S.: A remote user authentication scheme using hash functions. ACM Operating Systems Review\u00a036(4), 23\u201329 (2002)","journal-title":"ACM Operating Systems Review"},{"issue":"3","key":"149_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/567331.567335","volume":"36","author":"C.C. Lee","year":"2002","unstructured":"Lee, C.C., Hwang, M.S., Yang, W.P.: A flexible remote user authentication scheme using smart cards. ACM Operating Systems Review\u00a036(3), 46\u201352 (2002)","journal-title":"ACM Operating Systems Review"},{"issue":"1","key":"149_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M.S. Hwang","year":"2000","unstructured":"Hwang, M.S., Li, L.H.: A new remote user authentication schemeusing smart cards. IEEE Trans. Consumer Electronic\u00a046(1), 28\u201330 (2000)","journal-title":"IEEE Trans. Consumer Electronic"},{"issue":"2","key":"149_CR6","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1109\/TCE.2004.1309427","volume":"50","author":"S.W. Lee","year":"2004","unstructured":"Lee, S.W., Kim, H.S., Yoo, K.Y.: Comment on a remote user authentication scheme using smart cards with forward secrecy. IEEE Trans. Consumer Electronic\u00a050(2), 576\u2013577 (2004)","journal-title":"IEEE Trans. Consumer Electronic"},{"issue":"3","key":"149_CR7","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1109\/TCE.2003.1261224","volume":"49","author":"K.C. Leung","year":"2003","unstructured":"Leung, K.C., Cheng, L.M., Fong, A.S., Chen, C.K.: Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans.Consumer Electronic\u00a049(3), 1243\u20131245 (2003)","journal-title":"IEEE Trans.Consumer Electronic"},{"key":"149_CR8","unstructured":"Awasthi, A.K., Lal, S.: Security analysis of a dynamic ID-based remote user authentication scheme"},{"key":"149_CR9","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.1103\/PhysRevE.62.2555","volume":"62","author":"R. Metzler","year":"2000","unstructured":"Metzler, R., Kinzel, W.: Interacting neural networks. Phys. Rev. E\u00a062, 2555\u20132562 (2000)","journal-title":"Phys. Rev. E"},{"key":"149_CR10","doi-asserted-by":"crossref","unstructured":"Kinzel, W., Kanter, I.: Interacting neural network and cryptography. In: Advances in Solid State Physics, vol.\u00a042, pp. 383\u2013391 (2002)","DOI":"10.1007\/3-540-45618-X_30"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11539087_149.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:14:21Z","timestamp":1605644061000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11539087_149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283232","9783540318538"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11539087_149","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}