{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:35:32Z","timestamp":1725564932714},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340799"},{"type":"electronic","value":"9783540340805"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751649_94","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T10:07:52Z","timestamp":1147342072000},"page":"858-866","source":"Crossref","is-referenced-by-count":6,"title":["Two Efficient and Secure Authentication Schemes Using Smart Cards"],"prefix":"10.1007","author":[{"given":"Youngsook","family":"Lee","sequence":"first","affiliation":[]},{"given":"Junghyun","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"94_CR1","unstructured":"Anti-Phishing Working Group, http:\/\/www.antiphishing.org"},{"issue":"5","key":"94_CR2","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/381906.381946","volume":"20","author":"S.M. Bellovin","year":"1990","unstructured":"Bellovin, S.M., Merritt, M.: Limitations of the Kerberos authentication system. ACM Computer Communication Review\u00a020(5), 119\u2013132 (1990)","journal-title":"ACM Computer Communication Review"},{"issue":"5","key":"94_CR3","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/49.223869","volume":"11","author":"R. Bird","year":"1993","unstructured":"Bird, R., Gopal, I., Herzberg, A., Janson, P.A., Kutten, S., Molva, R., Yung, M.: Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications\u00a011(5), 679\u2013693 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"94_CR4","doi-asserted-by":"crossref","unstructured":"Carlsen, U.: Cryptographic protocol flaws: know your enemy. In: Proceedings of the 7th IEEE Computer Security Foundations Workshop, pp. 192\u2013200 (1994)","DOI":"10.1109\/CSFW.1994.315934"},{"issue":"3","key":"94_CR5","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1049\/ip-e.1991.0022","volume":"138","author":"C.-C. Chang","year":"1991","unstructured":"Chang, C.-C., Wu, T.-C.: Remote password authentication with smart cards. IEE Proceedings E - Computers and Digital Techniques\u00a0138(3), 165\u2013168 (1991)","journal-title":"IEE Proceedings E - Computers and Digital Techniques"},{"issue":"4","key":"94_CR6","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"H.-Y. Chien","year":"2002","unstructured":"Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: An efficient and practical solution to remote authentication: smart card. Computers & Security\u00a021(4), 372\u2013375 (2002)","journal-title":"Computers & Security"},{"issue":"2","key":"94_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchange. Designs, Codes and Cryptography\u00a02(2), 107\u2013125 (1992)","journal-title":"Designs, Codes and Cryptography"},{"issue":"1","key":"94_CR8","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/130704.130709","volume":"26","author":"L. Gong","year":"1992","unstructured":"Gong, L.: A security risk of depending on synchronized clocks. ACM SIGOPS Operating Systems Review\u00a026(1), 49\u201353 (1992)","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"3","key":"94_CR9","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/S0920-5489(03)00094-1","volume":"26","author":"C.-L. Hsu","year":"2004","unstructured":"Hsu, C.-L.: Security of Chien et al.\u2019s remote user authentication scheme using smart cards. Computer Standards and Interfaces\u00a026(3), 167\u2013169 (2004)","journal-title":"Computer Standards and Interfaces"},{"issue":"1","key":"94_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M.-S. Hwang","year":"2000","unstructured":"Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme using smart cards. IEEE Trans.\u00a0on Consumer Electronics\u00a046(1), 28\u201330 (2000)","journal-title":"IEEE Trans.\u00a0on Consumer Electronics"},{"key":"94_CR11","doi-asserted-by":"crossref","unstructured":"Ku, W.-C., Chang, S.-T., Chiang, M.-H.: Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture. IEICE Trans. on Commmunications\u00a0E88-B(8), 3451\u20133454 (2005)","DOI":"10.1093\/ietcom\/e88-b.8.3451"},{"issue":"11","key":"94_CR12","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"issue":"3","key":"94_CR13","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters\u00a056(3), 131\u2013133 (1995)","journal-title":"Information Processing Letters"},{"issue":"4","key":"94_CR14","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H.-M. Sun","year":"2000","unstructured":"Sun, H.-M.: An efficient remote user authentication scheme using smart cards. IEEE Trans.\u00a0on Consumer Electronics\u00a046(4), 958\u2013961 (2000)","journal-title":"IEEE Trans.\u00a0on Consumer Electronics"},{"issue":"8","key":"94_CR15","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/S0167-4048(99)80136-9","volume":"18","author":"W.-H. Yang","year":"1999","unstructured":"Yang, W.-H., Shieh, S.-P.: Password authentication schemes with smart card. Computers & Security\u00a018(8), 727\u2013733 (1999)","journal-title":"Computers & Security"},{"key":"94_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/11537878_10","volume-title":"Trust, Privacy, and Security in Digital Business","author":"E.-J. Yoon","year":"2005","unstructured":"Yoon, E.-J., Kim, W.-H., Yoo, K.-Y.: Security enhancement for password authentication schemes with smart cards. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol.\u00a03592, pp. 90\u201399. Springer, Heidelberg (2005)"},{"issue":"1","key":"94_CR17","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.cose.2004.06.004","volume":"24","author":"E.-J. Yoon","year":"2005","unstructured":"Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: An Improvement of Hwang-Lee-Tang\u2019s simple remote user authentication scheme. Computers & Security\u00a024(1), 50\u201356 (2005)","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751649_94.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:02:10Z","timestamp":1619492530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751649_94"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340799","9783540340805"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11751649_94","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}