{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:11:05Z","timestamp":1743023465839,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242640"},{"type":"electronic","value":"9783030242657"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24265-7_51","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"597-605","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Analysis of a Three-Factor Authentication Scheme and Its Improved Fix"],"prefix":"10.1007","author":[{"given":"Songsong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"99","key":"51_CR1","first-page":"1","volume":"PP","author":"AG Reddy","year":"2017","unstructured":"Reddy, A.G., Yoon, E.J., Das, A.K., et al.: Design of mutually authenticated key agreement scheme resistant to impersonation attacks for multi-server environment. IEEE Access PP(99), 1 (2017)","journal-title":"IEEE Access"},{"issue":"4","key":"51_CR2","first-page":"708","volume":"15","author":"D Wang","year":"2018","unstructured":"Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secur. Comput. 15(4), 708\u2013722 (2018)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"2","key":"51_CR3","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.ins.2013.09.032","volume":"268","author":"D He","year":"2014","unstructured":"He, D., Tian, M., Chen, J.: Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 268(2), 458\u2013462 (2014)","journal-title":"Inf. Sci."},{"issue":"18","key":"51_CR4","doi-asserted-by":"publisher","first-page":"8129","DOI":"10.1016\/j.eswa.2014.07.004","volume":"41","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst. Appl. 41(18), 8129\u20138143 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"51_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11227-010-0512-1","volume":"63","author":"EJ Yoon","year":"2013","unstructured":"Yoon, E.J.: Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J. Supercomput. 63(1), 235\u2013255 (2013)","journal-title":"J. Supercomput."},{"issue":"2","key":"51_CR6","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1981","unstructured":"Dolev, D., Yao, A.C.: On the security of public key schemes. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1981)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"C","key":"51_CR7","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","volume":"73","author":"D Wang","year":"2014","unstructured":"Wang, D., Wang, P.: On the anonymity of two-factor authentication schemes for wireless sensor networks. Comput. Netw. 73(C), 41\u201357 (2014)","journal-title":"Comput. Netw."},{"issue":"4","key":"51_CR8","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang, D., He, D., Wang, P., et al.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secur. Comput. 12(4), 428\u2013442 (2015)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"8","key":"51_CR9","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang, X., Xiang, Y., Chonka, A., et al.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390\u20131397 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"51_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/978-3-642-22792-9_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"N Veyrat-Charvillon","year":"2011","unstructured":"Veyrat-Charvillon, N., Standaert, F.-X.: Generic side-channel distinguishers: improvements and limitations. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 354\u2013372. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-22792-9_20"},{"key":"51_CR11","doi-asserted-by":"crossref","unstructured":"Wang, D., Zhang, Z., Wang, P., et al.: Targeted online password guessing: an underestimated threat. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 1242\u20131254. ACM (2016)","DOI":"10.1145\/2976749.2978339"},{"key":"51_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-319-45744-4_6","volume-title":"Computer Security \u2013 ESORICS 2016","author":"D Wang","year":"2016","unstructured":"Wang, D., Wang, P.: On the implications of Zipf\u2019s law in passwords. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 111\u2013131. Springer, Cham (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-45744-4_6"},{"key":"51_CR13","doi-asserted-by":"crossref","unstructured":"Boyd, C., Mathuria, A.: Schemes for authentication and key establishment. In: Schemes for Authentication and Key Establishment, pp. 3215\u20133230. Springer (2003)","DOI":"10.1007\/978-3-662-09527-0"},{"issue":"3","key":"51_CR14","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., Wang, D.: Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3), 816\u2013823 (2015)","journal-title":"IEEE Syst. J."},{"issue":"24","key":"51_CR15","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(24), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"51_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-47728-4_18","volume-title":"Networking \u2014 ICN 2001","author":"W-J Tsaur","year":"2001","unstructured":"Tsaur, W.-J.: A flexible user authentication scheme for multi-server internet services. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol. 2093, pp. 174\u2013183. Springer, Heidelberg (2001). \n                    https:\/\/doi.org\/10.1007\/3-540-47728-4_18"},{"key":"51_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-642-31137-6_30","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2012","author":"H Kim","year":"2012","unstructured":"Kim, H., Jeon, W., Lee, K., Lee, Y., Won, D.: Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. In: Murgante, B., Gervasi, O., Misra, S., Nedjah, N., Rocha, Ana Maria A.C., Taniar, D., Apduhan, Bernady O. (eds.) ICCSA 2012. LNCS, vol. 7335, pp. 391\u2013406. Springer, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-31137-6_30"},{"issue":"5","key":"51_CR18","first-page":"997","volume":"18","author":"MC Chuang","year":"2014","unstructured":"Chuang, M.C., Chen, M.C.: An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Int. J. Netw. Secur. 18(5), 997\u20131000 (2014)","journal-title":"Int. J. Netw. Secur."},{"issue":"3","key":"51_CR19","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1007\/s11277-012-0918-6","volume":"71","author":"JL Tsai","year":"2013","unstructured":"Tsai, J.L., Lo, N.W.: A new password-based multi-server authentication scheme robust to password guessing attacks. Wirel. Pers. Commun. 71(3), 1977\u20131988 (2013)","journal-title":"Wirel. Pers. Commun."},{"key":"51_CR20","unstructured":"Chang, C.C., Lee, J.S.: An efficient and secure multi-server password authentication scheme using smart cards. In: International Conference on Cyberworlds (2004)"},{"issue":"1","key":"51_CR21","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s11277-012-0696-1","volume":"70","author":"D He","year":"2013","unstructured":"He, D.: Security flaws in a smart card based authentication scheme for multi-server environment. Wirel. Pers. Commun. 70(1), 323\u2013329 (2013)","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"51_CR22","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"WS Juang","year":"2004","unstructured":"Juang, W.S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. Consum. Electron. 50(1), 251\u2013255 (2004)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"51_CR23","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/s11704-014-3125-7","volume":"9","author":"P Jiang","year":"2015","unstructured":"Jiang, P., Wen, Q., et al.: An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Front. Comput. Sci. 9(1), 142\u2013156 (2015)","journal-title":"Front. Comput. Sci."},{"issue":"9","key":"51_CR24","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A.K., Goswami, A.: A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 10(9), 1953\u20131966 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"51_CR25","unstructured":"Wan, T., Liu, Z.X., Ma, J.F.: Authentication and key agreement protocol for multi-server architecture. J. Comput. Res. Dev. 53(11), 2446\u20132453 (2016)"},{"issue":"3","key":"51_CR26","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"MK Khan","year":"2011","unstructured":"Khan, M.K., Kim, S.K., Alghathbar, K.: Cryptanalysis and security enhancement of a \u2018more efficient & secure dynamic ID-based remote user authentication scheme\u2019. Comput. Commun. 34(3), 305\u2013309 (2011)","journal-title":"Comput. Commun."},{"key":"51_CR27","doi-asserted-by":"crossref","unstructured":"Shivraj, V.L., Rajan, M.A., Singh, M., et al.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT) (2015)","DOI":"10.1109\/NSITNSW.2015.7176384"},{"issue":"3","key":"51_CR28","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1002\/dac.2858","volume":"29","author":"X Qi","year":"2016","unstructured":"Qi, X., Na, D., Wong, D.S., et al.: Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. Int. J. Commun. Syst. 29(3), 478\u2013487 (2016)","journal-title":"Int. J. Commun. Syst."},{"issue":"3","key":"51_CR29","doi-asserted-by":"publisher","first-page":"621","DOI":"10.32604\/cmc.2018.03706","volume":"57","author":"J Zhong","year":"2018","unstructured":"Zhong, J., Liu, Z., Xu, J.: Analysis and improvement of an efficient controlled quantum secure direct communication and authentication protocol. Comput. Mater. Contin. 57(3), 621\u2013633 (2018)","journal-title":"Comput. Mater. Contin."},{"issue":"2","key":"51_CR30","doi-asserted-by":"publisher","first-page":"297","DOI":"10.32604\/cmc.2018.03808","volume":"57","author":"C Fong Cheang","year":"2018","unstructured":"Fong Cheang, C., Wang, Y., Cai, Z., Xu, G.: Multi-VMs intrusion detection for cloud security using Dempster-Shafer theory. Comput. Mater. Contin. 57(2), 297\u2013306 (2018)","journal-title":"Comput. Mater. Contin."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24265-7_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T02:04:27Z","timestamp":1594346667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24265-7_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242640","9783030242657"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24265-7_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}