{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:24:14Z","timestamp":1767137054887,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030373368","type":"print"},{"value":"9783030373375","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37337-5_15","type":"book-chapter","created":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T21:02:51Z","timestamp":1577998971000},"page":"186-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps"],"prefix":"10.1007","author":[{"given":"Jiaxi","family":"Hu","sequence":"first","affiliation":[]},{"given":"Zhiqiang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. In: Twelfth ACM Symposium on Operating Systems Principles, pp. 1\u201313 (1989)","DOI":"10.1145\/74851.74852"},{"issue":"5","key":"15_CR2","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TDSC.2016.2616876","volume":"15","author":"S Chatterjee","year":"2016","unstructured":"Chatterjee, S., Roy, S., Das, A.K., Chattopadhyay, S., Kumar, N., Vasilakos, A.V.: Secure biometric-based authentication scheme using Chebyshev chaotic map for multi-server environment. IEEE Trans. Dependable Secur. Comput. 15(5), 824\u2013839 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"6","key":"15_CR3","doi-asserted-by":"publisher","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"HM Chen","year":"2012","unstructured":"Chen, H.M., Lo, J.W., Yeh, C.K.: An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6), 3907\u20133915 (2012)","journal-title":"J. Med. Syst."},{"issue":"3","key":"15_CR4","doi-asserted-by":"publisher","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"H Debiao","year":"2012","unstructured":"Debiao, H., Jianhua, C., Rui, Z.: A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3), 1989\u20131995 (2012)","journal-title":"J. Med. Syst."},{"issue":"6","key":"15_CR5","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1016\/j.cnsns.2012.09.032","volume":"18","author":"C Guo","year":"2013","unstructured":"Guo, C., Chang, C.C.: Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6), 1433\u20131440 (2013)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"3391","DOI":"10.1007\/s11277-017-4003-z","volume":"95","author":"L Han","year":"2017","unstructured":"Han, L., Xie, Q., Liu, W., Wang, S.: A new efficient chaotic maps based three factor user authentication and key agreement scheme. Wirel. Pers. Commun. 95, 3391\u20133406 (2017)","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"15_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-012-9919-y","volume":"37","author":"X Hao","year":"2013","unstructured":"Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2), 1\u20137 (2013)","journal-title":"J. Med. Syst."},{"issue":"12","key":"15_CR8","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/JSYST.2016.2633809","volume":"12","author":"D He","year":"2018","unstructured":"He, D., Kumar, N., Khan, M.K., Wang, L., Shen, J.: Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst. J. 12(12), 1621\u20131631 (2018)","journal-title":"IEEE Syst. J."},{"issue":"12","key":"15_CR9","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681\u20132691 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2), 1\u20138 (2014)","journal-title":"J. Med. Syst."},{"issue":"6","key":"15_CR11","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-To-Peer Netw. Appl. 8(6), 1070\u20131081 (2015)","journal-title":"Peer-To-Peer Netw. Appl."},{"issue":"11","key":"15_CR12","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"issue":"1\u20132","key":"15_CR13","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s11071-012-0652-3","volume":"71","author":"CC Lee","year":"2013","unstructured":"Lee, C.C., Hsu, C.W.: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1\u20132), 201\u2013211 (2013)","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"15_CR14","first-page":"194","volume":"103","author":"X Li","year":"2018","unstructured":"Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.R.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103(1), 194\u2013204 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"15_CR15","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.1007\/s11277-014-1829-5","volume":"78","author":"HY Lin","year":"2014","unstructured":"Lin, H.Y.: Chaotic map based mobile dynamic ID authenticated key agreement scheme. Wirel. Pers. Commun. 78(2), 1487\u20131494 (2014)","journal-title":"Wirel. Pers. Commun."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Mason, J.C., Handscomb, D.: Chebyshev polynomials c(8\u20139), pp. 855\u2013857 (2002)","DOI":"10.1201\/9781420036114"},{"issue":"8","key":"15_CR17","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1109\/TKDE.2007.190647","volume":"20","author":"F Seb\u00e9","year":"2007","unstructured":"Seb\u00e9, F., Domingo-Ferrer, J., Martinez-Balleste, A., Deswarte, Y., Quisquater, J.J.: Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data Eng. 20(8), 1034\u20131038 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"15_CR18","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/s10916-014-0158-2","volume":"39","author":"Z Wang","year":"2015","unstructured":"Wang, Z., Huo, Z., Shi, W.: A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems. J. Med. Syst. 39(1), 158 (2015)","journal-title":"J. Med. Syst."},{"issue":"3","key":"15_CR19","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y.: A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3), 1529\u20131535 (2012)","journal-title":"J. Med. Syst."},{"issue":"2","key":"15_CR20","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/JBHI.2016.2517146","volume":"21","author":"L Zhang","year":"2017","unstructured":"Zhang, L., Zhu, S., Tang, S.: Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J. Biomed. Health Inform. 21(2), 465\u2013475 (2017)","journal-title":"IEEE J. Biomed. Health Inform."}],"updated-by":[{"DOI":"10.1007\/978-3-030-37337-5_49","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2020,4,26]],"date-time":"2020-04-26T00:00:00Z","timestamp":1587859200000}}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37337-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T11:07:11Z","timestamp":1587812831000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37337-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030373368","9783030373375"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37337-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"3 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"26 April 2020","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The original version of this chapter was revised. The affiliation of Sherali Zeadally was corrected to \u201cCollege of Communication and Information, University of Kentucky, Lexington, USA.\u201d","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/css2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"235","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}