{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:24:56Z","timestamp":1725560696423},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540300403"},{"type":"electronic","value":"9783540321316"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11582267_63","type":"book-chapter","created":{"date-parts":[[2005,10,18]],"date-time":"2005-10-18T19:00:56Z","timestamp":1129662056000},"page":"723-734","source":"Crossref","is-referenced-by-count":2,"title":["Robust Secret Key Based Authentication Scheme Using Smart Cards"],"prefix":"10.1007","author":[{"given":"Eun-Jun","family":"Yoon","sequence":"first","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"63_CR1","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/30.103200","volume":"36","author":"P. Peyret","year":"1990","unstructured":"Peyret, P., Lisimaque, G., Chua, T.Y.: Smart cards provide very high security and flexibility in subscribers management. IEEE Trans. on Consumer Electronics\u00a036(3), 744\u2013752 (1990)","journal-title":"IEEE Trans. on Consumer Electronics"},{"issue":"6","key":"63_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/6.254020","volume":"29","author":"D. Sternglass","year":"1992","unstructured":"Sternglass, D.: The future is in the PC cards. IEEE Spectrum\u00a029(6), 46\u201350 (1992)","journal-title":"IEEE Spectrum"},{"issue":"6","key":"63_CR3","first-page":"1363","volume":"83","author":"M. Sandirigama","year":"2000","unstructured":"Sandirigama, M., Shimizu, A., Noda, M.T.: Simple and secure password authentication protocol (SAS). IEICE Trans. on Communications\u00a0E83-B(6), 1363\u20131365 (2000)","journal-title":"IEICE Trans. on Communications"},{"issue":"9","key":"63_CR4","first-page":"2622","volume":"84","author":"C.L. Lin","year":"2001","unstructured":"Lin, C.L., Sun, H.M., Hwang, T.: Attacks and solutions on strong-password authentication. IEICE Trans. on Communications\u00a0E84-B(9), 2622\u20132627 (2001)","journal-title":"IEICE Trans. on Communications"},{"issue":"11","key":"63_CR5","first-page":"2519","volume":"85","author":"C.M. Chen","year":"2002","unstructured":"Chen, C.M., Ku, W.C.: Stolen-verifier attack on two new strong-password authentication protocols. IEICE Trans. on Communications\u00a0E85-B(11), 2519\u20132521 (2002)","journal-title":"IEICE Trans. on Communications"},{"issue":"7","key":"63_CR6","first-page":"2182","volume":"86","author":"T. Tsuji","year":"2003","unstructured":"Tsuji, T., Shimizu, A.: An impersonation attack on one-time password authentication protocol OSPA. IEICE Trans. on Communications\u00a0E86-B(7), 2182\u20132185 (2003)","journal-title":"IEICE Trans. on Communications"},{"issue":"2","key":"63_CR7","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/769782.769783","volume":"37","author":"C.W. Lin","year":"2003","unstructured":"Lin, C.W., Shen, J.J., Hwang, M.S.: Security enhancement for optimal strong-password authentication protocol. ACM SIGOPS Operating Systems Review\u00a037(2), 7\u201312 (2003)","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"1","key":"63_CR8","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.csi.2004.02.004","volume":"27","author":"T.H. Chen","year":"2004","unstructured":"Chen, T.H., Lee, W.B., Hornga, G.: Secure SAS-like password authentication schemes. Computer Standards and Interfaces\u00a027(1), 25\u201331 (2004)","journal-title":"Computer Standards and Interfaces"},{"issue":"1","key":"63_CR9","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S0167-4048(03)00114-7","volume":"22","author":"C.L. Lin","year":"2003","unstructured":"Lin, C.L., Hwang, T.: A password authentication scheme with secure password updating. Computer & Security\u00a022(1), 68\u201372 (2003)","journal-title":"Computer & Security"},{"key":"63_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11531371_47","volume-title":"Web Engineering","author":"E.J. Yoon","year":"2005","unstructured":"Yoon, E.J., Kim, W.H., Yoo, K.Y.: Robust and simple authentication protocol for secure communication on the web. In: Lowe, D.G., Gaedke, M. (eds.) ICWE 2005. LNCS, vol.\u00a03579, pp. 352\u2013362. Springer, Heidelberg (2005)"},{"issue":"1","key":"63_CR11","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"W.C. Ku","year":"2004","unstructured":"Ku, W.C., Chen, S.M.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics\u00a050(1), 204\u2013207 (2004)","journal-title":"IEEE Trans. on Consumer Electronics"},{"key":"63_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"5","key":"63_CR13","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smartcard security under the threat of power analysis attacks. IEEE Trans. on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. on Computers"},{"key":"63_CR14","volume-title":"Handbook of applied cryptograph","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptograph. CRC Press, New York (1997)"}],"container-title":["Lecture Notes in Computer Science","Advances in Multimedia Information Processing - PCM 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11582267_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:46:40Z","timestamp":1619506000000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11582267_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540300403","9783540321316"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11582267_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}