{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:05:22Z","timestamp":1772643922571,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319184661","type":"print"},{"value":"9783319184678","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18467-8_32","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T08:12:03Z","timestamp":1431072723000},"page":"479-494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment"],"prefix":"10.1007","author":[{"given":"Toan-Thinh","family":"Truong","sequence":"first","affiliation":[]},{"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Anh-Duc","family":"Duong","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,9]]},"reference":[{"issue":"11","key":"32_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"issue":"4","key":"32_CR2","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.1016\/j.jnca.2010.11.005","volume":"34","author":"TH Chen","year":"2011","unstructured":"Chen, T.H., Chen, Y.C., Shih, W.K., Wei, H.W.: An efficient anonymous authentication protocol for mobile pay-tv. Journal of Network and Computer Applications 34(4), 1131\u20131137 (2011)","journal-title":"Journal of Network and Computer Applications"},{"issue":"13","key":"32_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5772\/50912","volume":"9","author":"S Shin","year":"2012","unstructured":"Shin, S., Kim, K., Kim, K.-H., Yeh, H.: A remote user authentication scheme with anonymity for mobile devices. International Journal of Advanced Robotic Systems 9(13), 1\u20137 (2012)","journal-title":"International Journal of Advanced Robotic Systems"},{"key":"32_CR4","unstructured":"Liao, I.E., Lee, C.C., Hwang, M.S.: Security enhancement for a dynamic id-based remote user authentication scheme. In: International Conference on Next Generation Web Services Practices, vol. 6(2), pp. 517\u2013522 (2005)"},{"key":"32_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/11915034_73","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"E-J Yoon","year":"2006","unstructured":"Yoon, E.-J., Yoo, K.-Y.: Improving the dynamic ID-based remote mutual authentication scheme. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 499\u2013507. Springer, Heidelberg (2006)"},{"issue":"2","key":"32_CR6","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"issue":"3\u20134","key":"32_CR7","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"J-H Yang","year":"2009","unstructured":"Yang, J.-H., Chang, C.-C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security 28(3\u20134), 138\u2013143 (2009)","journal-title":"Computers and Security"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Yoon, E.-J., Yoo, K.-Y.: Robust ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. In: IEEE International Conference on Computational Science and Engineering, vol. 2, pp. 633\u2013640 (2009)","DOI":"10.1109\/CSE.2009.363"},{"issue":"11","key":"32_CR9","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1016\/j.jss.2011.06.061","volume":"84","author":"SH Islam","year":"2011","unstructured":"Islam, S.H., Biswas, G.P.: A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software 84(11), 1892\u20131898 (2011)","journal-title":"Journal of Systems and Software"},{"issue":"2","key":"32_CR10","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.physleta.2006.05.038","volume":"360","author":"K Wang","year":"2006","unstructured":"Wang, K., Pei, W.J., Zou, L.H., Cheung, Y.M., He, Z.Y.: Security of public key encryption technique based on multiple chaotic system. Journal of Physics Letters A 360(2), 259\u2013262 (2006)","journal-title":"Journal of Physics Letters A"},{"issue":"3","key":"32_CR11","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Journal of Chaos, Solitons & Fractals 37(3), 669\u2013674 (2008)","journal-title":"Journal of Chaos, Solitons & Fractals"},{"issue":"2","key":"32_CR12","first-page":"99","volume":"4","author":"C Guo","year":"2013","unstructured":"Guo, C., Chang, C.-C., Sun, C.-Y.: Chaotic maps-based mutual authentication and key agreement using smartcards for wireless communications. Journal of Information Hiding and Multimedia Signal Processing 4(2), 99\u2013109 (2013)","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"7","key":"32_CR13","first-page":"122","volume":"1","author":"K Prasadh","year":"2009","unstructured":"Prasadh, K., Ramar, K., Gnanajeyaraman, R.: Public key cryptosystems based on chaotic chebyshev polynomials. Journal of Engineering and Technology Research 1(7), 122\u2013128 (2009)","journal-title":"Journal of Engineering and Technology Research"},{"issue":"2","key":"32_CR14","first-page":"86","volume":"18","author":"L Zhi-Hui","year":"2010","unstructured":"Zhi-Hui, L., Yi-Dong, C., Hui-Min, X.: Fast algorithms of public key cryptosystem based on chebyshev polynomials over finite field. The Journal of China Universities of Posts and Telecommunications 18(2), 86\u201393 (2010)","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"issue":"2","key":"32_CR15","first-page":"139","volume":"15","author":"C-C Chang","year":"2013","unstructured":"Chang, C.-C., Lee, C.-Y.: A smart card-based authentication scheme using user identify cryptography. International Journal of Network Security 15(2), 139\u2013147 (2013)","journal-title":"International Journal of Network Security"},{"key":"32_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer System 8, 18\u201336 (1990)","journal-title":"ACM Transactions on Computer System"},{"issue":"4","key":"32_CR17","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1016\/S0960-0779(04)00387-X","volume":"23","author":"D Xiao","year":"2005","unstructured":"Xiao, D., Liao, X., Wong, K.: An efficient entire chaos-based scheme for deniable authentication. Journal of Chaos, Solitons & Fractals 23(4), 1327\u20131331 (2005)","journal-title":"Journal of Chaos, Solitons & Fractals"},{"issue":"7","key":"32_CR18","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo, P., Arco, P., Santis, A., Kocarev, L.: Security of public key encryption technique based on multiple chaotic system. IEEE Transactions on Circuits and Systems I 52(7), 1382\u20131393 (2005)","journal-title":"IEEE Transactions on Circuits and Systems I"},{"issue":"2","key":"32_CR19","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"ML Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50(2), 629\u2013631 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"32_CR20","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"YY Wang","year":"2009","unstructured":"Wang, Y.Y., Kiu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 32(4), 583\u2013585 (2009)","journal-title":"Computer Communications"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18467-8_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T20:29:17Z","timestamp":1559161757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18467-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184661","9783319184678"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18467-8_32","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}