{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:22:19Z","timestamp":1761708139521},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540423027"},{"type":"electronic","value":"9783540477280"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-47728-4_18","type":"book-chapter","created":{"date-parts":[[2007,11,14]],"date-time":"2007-11-14T01:39:45Z","timestamp":1195004385000},"page":"174-183","source":"Crossref","is-referenced-by-count":16,"title":["A Flexible User Authentication Scheme for Multi-server Internet Services"],"prefix":"10.1007","author":[{"given":"Woei-Jiunn","family":"Tsaur","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,6,22]]},"reference":[{"key":"18_CR1","unstructured":"Davies, D.W., Price, W.L.: Security for Computer Networks \u2014 An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer. 2nd Edition. Wiley, Chichester (1989)"},{"key":"18_CR2","unstructured":"Denning, D.E.R.: Cryptography and Data Security. Addison-Wesley, Reading, MA (1982)"},{"key":"18_CR3","volume-title":"Security in Computing","author":"C.P. Pfleeger","year":"1997","unstructured":"Pfleeger, C.P.: Security in Computing. 2nd Edition. Prentice-Hall, Englewood Cliffs, NJ (1997)","edition":"2nd Edition"},{"key":"18_CR4","volume-title":"Cryptography \u2014 An Introduction to Computer Security","author":"J. Seberry","year":"1989","unstructured":"Seberry, J., Pieprzyk, J.: Cryptography \u2014 An Introduction to Computer Security. Prentice-Hall, Englewood Cliffs, NJ (1989)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Menkus, B.: Understanding the Use of Passwords. Computers & Security 7 (1988) 132\u2013136","DOI":"10.1016\/0167-4048(88)90325-2"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Purdy, G.P.: A High Security Login Procedure. Communications of the ACM 17 (1974)442\u2013445","DOI":"10.1145\/361082.361089"},{"key":"18_CR7","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1145\/361082.361087","volume":"17","author":"A. Evans","year":"1974","unstructured":"Evans, A., Kantrowitz, W., Weiss, E.: A User Authentication Scheme Not Requiring Secrecy in the Computer. Communications of the ACM 17 (1974) 437\u2013442","journal-title":"Communications of the ACM"},{"key":"18_CR8","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/TCOM.1981.1095067","volume":"29","author":"R.E. Lennon","year":"1981","unstructured":"Lennon, R.E., Matyas, S.M., Meyer, C.H.: Cryptographic Authentication of Time-Invariant Quantities. IEEE Transactions on Communications 29 (1981) 773\u2013777","journal-title":"IEEE Transactions on Communications"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM 24 (1981) 770\u2013772","DOI":"10.1145\/358790.358797"},{"key":"18_CR10","unstructured":"Chang, C.C., Wu, T.C.: Remote Password Authentication with Smart Card IEE Proceedings-E 138 (1991) 165\u2013168"},{"key":"18_CR11","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/30.103200","volume":"36","author":"P. Peyret","year":"1990","unstructured":"Peyret, P., Lisimaque, G., Chua, T.Y.: Smart Cards Provide Very High Security and Flexibility in Subscribers Management. IEEE Transactions on Consumer Electronics 36 (1990) 744\u2013752","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"18_CR12","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/6.254020","volume":"29","author":"D. Sternglass","year":"1992","unstructured":"Sternglass, D.: The Future Is in the PC Cards. IEEE Spectrum 29 (1992) 46\u201350","journal-title":"IEEE Spectrum"},{"key":"18_CR13","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1016\/0140-3664(96)81595-7","volume":"18","author":"T.C. Wu","year":"1995","unstructured":"Wu, T.C.: Remote Login Authentication Scheme Based on a Geometric Approach. Computer Communications 18 (1995) 959\u2013963","journal-title":"Computer Communications"},{"key":"18_CR14","unstructured":"Chang, C., Laih, C.S.: Comment on Remote Password Authentication with Smart Cards. IEE Proceedings-E 139(1992) 372\u2013372"},{"key":"18_CR15","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/0898-1221(93)90048-Z","volume":"26","author":"C.C. Chang","year":"1993","unstructured":"Chang, C.C., Hwang, S.J.: Using Smart Cards to Authenticate Remote Passwords. Computers & Mathematics with Applications 26 (1993) 19\u201327","journal-title":"Computers & Mathematics with Applications"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Wang, S.J., Chang, J.F.: Smart Card Based Secure Password Authentication Scheme. Computers & Security 15 (1996) 231\u2013237","DOI":"10.1016\/0167-4048(96)00005-3"},{"key":"18_CR17","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21 (1978) 120\u2013126","journal-title":"Communications of the ACM"},{"key":"18_CR18","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22 (1976) 644\u2013654","journal-title":"IEEE Transactions on Information Theory IT"},{"key":"18_CR19","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. El-gamal","year":"1985","unstructured":"El-gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31 (1985) 469\u2013472","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Networking \u2014 ICN 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47728-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T18:07:45Z","timestamp":1538676465000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47728-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540423027","9783540477280"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-47728-4_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}