{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:09Z","timestamp":1740099189732,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000141"},{"type":"electronic","value":"9783030000158"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_46","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T12:14:23Z","timestamp":1536754463000},"page":"531-542","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Biometrics-Based Remote User Authentication Scheme Using Smart Cards"],"prefix":"10.1007","author":[{"given":"Jianming","family":"Cui","sequence":"first","affiliation":[]},{"given":"Rongquan","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hengzhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"17","key":"46_CR1","doi-asserted-by":"publisher","first-page":"3219","DOI":"10.1002\/sec.1246","volume":"8","author":"Y-R Lu","year":"2015","unstructured":"Lu, Y.-R., Li, L.-X., Peng, H.-P.: A biometrics and smart cards-based authentication scheme for multi-server environments. Secur. Commun. Netw. 8(17), 3219\u20133228 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"12","key":"46_CR2","doi-asserted-by":"publisher","first-page":"e0145263","DOI":"10.1371\/journal.pone.0145263","volume":"10","author":"J Moon","year":"2015","unstructured":"Moon, J., Choi, Y., Jung, J., Won, D.: An improvement of robust biometrics-based authentication and key agreement scheme for multi-server environments using smart cards. PloS One 10(12), e0145263 (2015)","journal-title":"PloS One"},{"issue":"2","key":"46_CR3","doi-asserted-by":"publisher","first-page":"e0149173","DOI":"10.1371\/journal.pone.0149173","volume":"11","author":"C Wang","year":"2016","unstructured":"Wang, C., Zhang, X., Zheng, Z.: Cryptanalysis and improvement of a biometricbased multi-server authentication and key agreement scheme. PloS One 11(2), e0149173 (2016)","journal-title":"PloS One"},{"issue":"1","key":"46_CR4","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1186\/s40064-016-2725-0","volume":"5","author":"Q Xie","year":"2016","unstructured":"Xie, Q., Tang, Z.-X.: Biometrics based authentication scheme for session initiation protocol. Springerplus 5(1), 1045 (2016)","journal-title":"Springerplus"},{"issue":"12","key":"46_CR5","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"J-K Lee","year":"2002","unstructured":"Lee, J.-K., Ryu, S.-R., Yoo, K.-Y.: Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 38(12), 554\u2013555 (2002)","journal-title":"Electron. Lett."},{"issue":"1","key":"46_CR6","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.csi.2006.01.002","volume":"29","author":"M-K Khan","year":"2007","unstructured":"Khan, M.-K., Zhang, J.-S.: Improving the security of \u2018a exible biometrics remote user authentication scheme\u2019. Comput. Stand. Interfaces 29(1), 82\u201385 (2007)","journal-title":"Comput. Stand. Interfaces"},{"issue":"4","key":"46_CR7","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TIFS.2009.2031942","volume":"4","author":"C-I Fan","year":"2009","unstructured":"Fan, C.-I., Lin, Y.-H.: Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. Trans. Inf. Forensics Secur. 4(4), 933\u2013945 (2009)","journal-title":"Trans. Inf. Forensics Secur."},{"issue":"1","key":"46_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C-T Li","year":"2010","unstructured":"Li, C.-T., Hwang, M.-S.: An efficient biometrics-based remote user authentication scheme using smartcards. J. Netw. Comput. Appl. 33(1), 1\u20135 (2010)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"46_CR9","first-page":"13","volume":"3","author":"A-K Das","year":"2011","unstructured":"Das, A.-K.: Cryptanalysis and further improvement of a biometricbased remote user authentication scheme using smart cards. Int. J. Netw. Secur. Appl. 3(2), 13\u201328 (2011)","journal-title":"Int. J. Netw. Secur. Appl."},{"issue":"6","key":"46_CR10","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","volume":"31","author":"H-C Hsiang","year":"2009","unstructured":"Hsiang, H.-C.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(6), 1118\u20131123 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"2","key":"46_CR11","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.jnca.2010.11.011","volume":"34","author":"S-K Sood","year":"2011","unstructured":"Sood, S.-K., Sarje, A.-K., Singh, K.: A secure dynamic identity based authentication protocol for multi-server architecture. J. Netw. Comput. Appl. 34(2), 609\u2013618 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"46_CR12","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J.-W., Ma, J., Wang, W.-D., Liu, C.-L.: Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1), 76\u201379 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"46_CR13","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","volume":"80","author":"K-P Xue","year":"2014","unstructured":"Xue, K.-P., Hong, P.-L., Ma, C.-S.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1), 195\u2013206 (2014)","journal-title":"J. Comput. Syst. Sci."},{"issue":"3","key":"46_CR14","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D-B He","year":"2015","unstructured":"He, D.-B., Wang, D.: Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3), 816\u2013823 (2015)","journal-title":"IEEE Syst. J."},{"issue":"9","key":"46_CR15","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A.-K., Goswami, A.: A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 10(9), 1953\u20131966 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T12:37:50Z","timestamp":1536755870000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}