{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:47:02Z","timestamp":1742950022053,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_7","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"82-91","source":"Crossref","is-referenced-by-count":8,"title":["Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)"],"prefix":"10.1007","author":[{"given":"Guomin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaotie","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C. Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer, Heidelberg (2003)"},{"issue":"4","key":"7_CR2","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"H.Y. Chien","year":"2002","unstructured":"Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: Smart card. Computers and Security\u00a021(4), 372\u2013375 (2002)","journal-title":"Computers and Security"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1145\/322510.322514","volume":"2","author":"S. Halevi","year":"1999","unstructured":"Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. ACM Trans. Inf. Syst. Secur.\u00a02(3), 230\u2013268 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"8","key":"7_CR4","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1016\/S0140-3664(99)00036-5","volume":"22","author":"M.-S. Hwang","year":"1999","unstructured":"Hwang, M.-S.: Cryptanalysis of remote login authentication scheme. Computer Communications\u00a022(8), 742\u2013744 (1999)","journal-title":"Computer Communications"},{"issue":"2","key":"7_CR5","first-page":"297","volume":"12","author":"M.-S. Hwang","year":"2001","unstructured":"Hwang, M.-S., Lee, C.-C., Tang, Y.-L.: An improvement of SPLICE\/AS in WIDE against guessing attack. Internat. J. Inform.\u00a012(2), 297\u2013302 (2001)","journal-title":"Internat. J. Inform."},{"key":"7_CR6","unstructured":"IEEE. P1363.2 \/ D23: Standard Specifications for Password-based Public Key Cryptographic Techniques (March 2006), available at: \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363\/passwdPK\/draft.html"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-540-30564-4_19","volume-title":"Selected Areas in Cryptography","author":"S. Jiang","year":"2004","unstructured":"Jiang, S., Gong, G.: Password based key exchange with mutual authentication. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 267\u2013279. Springer, Heidelberg (2004)"},{"key":"7_CR8","unstructured":"Katz, J., Ostrovsky, R., Yung, M.: Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (to appear, 2006)"},{"issue":"11","key":"7_CR9","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013771 (1981)","journal-title":"Communications of the ACM"},{"issue":"4","key":"7_CR10","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"L. I-En","year":"2006","unstructured":"I-En, L., Cheng-Chi, L., Min-Shiang, H.: A password authentication scheme over insecure networks. J. Comput. Syst. Sci.\u00a072(4), 727\u2013740 (2006)","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"7_CR11","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/991130.991137","volume":"38","author":"M. Scott","year":"2004","unstructured":"Scott, M.: Cryptanalysis of an id-based password authentication scheme using smart cards and fingerprints. SIGOPS Oper. Syst. Rev.\u00a038(2), 73\u201375 (2004)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"7","key":"7_CR12","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/S0167-4048(03)00713-2","volume":"22","author":"B. Wang","year":"2003","unstructured":"Wang, B., Li, J.H., Tong, Z.P.: Cryptanalysis of an enhanced timestamp-based password authentication scheme. Comput. Secur.\u00a022(7), 643\u2013645 (2003)","journal-title":"Comput. Secur."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Yang, G., Wong, D.S., Wang, H., Deng, X.: Formal analysis and systematic construction of two-factor authentication scheme. Cryptology ePrint Archive, Report 2006\/270 (2006)","DOI":"10.1007\/11935308_7"},{"issue":"2","key":"7_CR14","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TCE.2004.1309425","volume":"50","author":"E.J. Yoon","year":"2004","unstructured":"Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Efficient remote user authentication scheme based on generalized elgamal signature scheme. IEEE Transactions on Consumer Electronics\u00a050(2), 568\u2013570 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11599371_13","volume-title":"Cryptology and Network Security","author":"E.-J. Yoon","year":"2005","unstructured":"Yoon, E.-J., Yoo, K.-Y.: New authentication scheme based on a one-way hash function and Diffie-Hellman key exchange. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol.\u00a03810, pp. 147\u2013160. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:07:37Z","timestamp":1566763657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11935308_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}