{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:54:24Z","timestamp":1743022464870,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_49","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"495-504","source":"Crossref","is-referenced-by-count":1,"title":["Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol"],"prefix":"10.1007","author":[{"given":"Adela","family":"Georgescu","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"49_CR1","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.cose.2005.03.006","volume":"24","author":"C.I. Fan","year":"2005","unstructured":"Fan, C.I., Chan, Y.C., Zhang, Z.K.: Robust remote authentication scheme with smart cards. Computers & Security\u00a024(8), 619\u2013628 (2005)","journal-title":"Computers & Security"},{"issue":"1","key":"49_CR2","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.amc.2004.06.111","volume":"167","author":"S.W. Lee","year":"2005","unstructured":"Lee, S.W., Kim, H.S., Yoo, K.Y.: Efficient nonce-based remote user authentication scheme using smart cards. Applied Mathematics and Computation\u00a0167(1), 355\u2013361 (2005)","journal-title":"Applied Mathematics and Computation"},{"issue":"1","key":"49_CR3","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"W.S. Juang","year":"2004","unstructured":"Juang, W.S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics\u00a050(1), 251\u2013255 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"1","key":"49_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","volume":"19","author":"I.C. Lin","year":"2003","unstructured":"Lin, I.C., Hwang, M.S., Li, L.H.: A new remote user authentication scheme for multi-server architecture. Future Generation Computer Systems\u00a019(1), 13\u201322 (2003)","journal-title":"Future Generation Computer Systems"},{"issue":"3","key":"49_CR5","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.cose.2008.04.001","volume":"27","author":"J.L. Tsai","year":"2008","unstructured":"Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers & Security\u00a027(3), 115\u2013121 (2008)","journal-title":"Computers & Security"},{"issue":"3","key":"49_CR6","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1002\/sec.332","volume":"5","author":"C.H. Huang","year":"2012","unstructured":"Huang, C.H., Chou, J.S., Chen, Y., Wun, S.Y.: Improved multi-server authentication protocol. Security and Communication Networks\u00a05(3), 331\u2013341 (2012)","journal-title":"Security and Communication Networks"},{"issue":"8","key":"49_CR7","first-page":"4589","volume":"7","author":"C.C. Chang","year":"2011","unstructured":"Chang, C.C., Cheng, T.F.: A robust and efficient smart card based remote login mechanism for multi-server architecture. International Journal of Innovative Computing, Information and Control\u00a07(8), 4589\u20134602 (2011)","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"49_CR8","unstructured":"Li, C.T., Weng, C.Y., Fan, C.I.: Two-factor user authentication in multi-server networks. International Journal of Security & Its Applications\u00a06(2) (2012)"},{"key":"49_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"49_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013474. Springer, Heidelberg (2001)"},{"key":"49_CR11","unstructured":"The AVISPA project, \n                    http:\/\/www.avispa-project.org\/"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T10:12:44Z","timestamp":1710843164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_49","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}