{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:08:22Z","timestamp":1771700902214,"version":"3.50.1"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319276588","type":"print"},{"value":"9783319276595","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27659-5_16","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T07:33:52Z","timestamp":1451374432000},"page":"221-237","source":"Crossref","is-referenced-by-count":49,"title":["Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards"],"prefix":"10.1007","author":[{"given":"Ding","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-39884-1_24","volume-title":"Financial Cryptography and Data Security","author":"N Asokan","year":"2013","unstructured":"Asokan, N., Ekberg, J.-E., Kostiainen, K.: The untapped potential of trusted execution environments on mobile devices. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 293\u2013294. Springer, Heidelberg (2013)"},{"issue":"11","key":"16_CR2","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., Naccache, D.: Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11), 3056\u20133076 (2012)","journal-title":"Proc. IEEE"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE S&P 1992, pp. 72\u201384. IEEE (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Bilge, L., Dumitras, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of ACM CCS 2012, pp. 833\u2013844. ACM (2012)","DOI":"10.1145\/2382196.2382284"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: Proceedings of IEEE S&P 2012, pp. 538\u2013552. IEEE Computer Society (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/3-540-47719-5_38","volume-title":"Information Security and Privacy","author":"C Boyd","year":"2001","unstructured":"Boyd, C., Montague, P., Nguyen, K.: Elliptic curve based password authenticated key exchange protocols. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, p. 487. Springer, Heidelberg (2001)"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-24632-9_11","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"E Bresson","year":"2004","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: New security results on encrypted key exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 145\u2013158. Springer, Heidelberg (2004)"},{"key":"16_CR8","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-63-1","volume-title":"NIST Special Publication 800\u201363-1: Electronic Authentication Guideline","author":"W Burr","year":"2011","unstructured":"Burr, W., Dodson, D., Perlner, R., Polk, W., Gupta, S., Nabbus, E.: NIST Special Publication 800\u201363-1: Electronic Authentication Guideline. National Institute of Standards and Technology, Gaithersburg (2011)"},{"issue":"3","key":"16_CR9","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1049\/ip-e.1991.0022","volume":"138","author":"CC Chang","year":"1991","unstructured":"Chang, C.C., Wu, T.C.: Remote password authentication with smart cards. IEE Proc. Comput. Digital Tech. 138(3), 165\u2013168 (1991)","journal-title":"IEE Proc. Comput. Digital Tech."},{"issue":"1","key":"16_CR10","first-page":"53","volume":"41","author":"BL Chen","year":"2012","unstructured":"Chen, B.L., Kuo, W.C., Wuu, L.C.: A secure password-based remote user authentication scheme without smart cards. Inf. Technol. Control 41(1), 53\u201359 (2012)","journal-title":"Inf. Technol. Control"},{"issue":"2","key":"16_CR11","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1002\/dac.2368","volume":"27","author":"BL Chen","year":"2014","unstructured":"Chen, B.L., Kuo, W.C., Wuu, L.C.: Robust smart-card-based remote user password authentication scheme. Int. J. Commun. Syst. 27(2), 377\u2013389 (2014)","journal-title":"Int. J. Commun. Syst."},{"issue":"4","key":"16_CR12","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.future.2010.08.007","volume":"27","author":"TH Chen","year":"2011","unstructured":"Chen, T.H., Hsiang, H.C., Shih, W.K.: Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Gener. Comput. Syst. 27(4), 377\u2013380 (2011)","journal-title":"Future Gener. Comput. Syst."},{"key":"16_CR13","unstructured":"Constantin, L.: Sony stresses that PSN passwords were hashed. Online news (2011). http:\/\/news.softpedia.com\/news\/Sony-Stresses-PSN-Passwords-Were-Hashed-198218.shtml"},{"issue":"3","key":"16_CR14","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086\u20131090 (2009)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"2","key":"16_CR15","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M Das","year":"2004","unstructured":"Das, M., Saxena, A., Gulati, V.: A dynamic id-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2), 629\u2013631 (2004)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"16_CR16","unstructured":"Dazzlepod Inc.: CSDN cleartext passwords. Online news (2013). http:\/\/dazzlepod.com\/csdn\/"},{"issue":"3","key":"16_CR17","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSP.2010.200","volume":"9","author":"JP Degabriele","year":"2011","unstructured":"Degabriele, J.P., Paterson, K., Watson, G.: Provable security in the real world. IEEE Secur. Priv. 9(3), 33\u201341 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Dell\u2019Amico, M., Michiardi, P., Roudier, Y.: Password strength: an empirical analysis. In: Proceedings of INFOCOM 2010, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5461951"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Drimer, S., Murdoch, S.J., Anderson, R.: Thinking inside the box: system-level failures of tamper proofing. In: Proceedings IEEE S&P 2008, pp. 281\u2013295. IEEE (2008)","DOI":"10.1109\/SP.2008.16"},{"issue":"8","key":"16_CR20","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.cose.2005.03.006","volume":"24","author":"C Fan","year":"2005","unstructured":"Fan, C., Chan, Y., Zhang, Z.: Robust remote authentication scheme with smart cards. Comput. Secur. 24(8), 619\u2013628 (2005)","journal-title":"Comput. Secur."},{"key":"16_CR21","unstructured":"Focus Technology Co., Ltd: Prices for 1GB Usb Flash Drive (2013). http:\/\/www.made-in-china.com\/products-search\/hot-china-products\/1gb_Usb_Flash_Drive.html"},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-14577-3_33","volume-title":"Financial Cryptography and Data Security","author":"F Hao","year":"2010","unstructured":"Hao, F.: On robust key agreement based on public key authentication. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 383\u2013390. Springer, Heidelberg (2010)"},{"issue":"3","key":"16_CR23","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., Bu, J.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367\u2013374 (2011)","journal-title":"Comput. Commun."},{"issue":"4","key":"16_CR24","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1016\/j.comcom.2008.11.019","volume":"32","author":"H Hsiang","year":"2009","unstructured":"Hsiang, H., Shih, W.: Weaknesses and improvements of the yoon-ryu-yoo remote user authentication scheme using smart cards. Comput. Commun. 32(4), 649\u2013652 (2009)","journal-title":"Comput. Commun."},{"issue":"6","key":"16_CR25","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.cose.2012.06.001","volume":"31","author":"W Hsieh","year":"2012","unstructured":"Hsieh, W., Leu, J.: Exploiting hash functions to intensify the remote user authentication scheme. Comput. Secur. 31(6), 791\u2013798 (2012)","journal-title":"Comput. Secur."},{"issue":"6","key":"16_CR26","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1109\/TIE.2008.921677","volume":"55","author":"WS Juang","year":"2008","unstructured":"Juang, W.S., Chen, S.T., Liaw, H.T.: Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Industr. Electron. 55(6), 2551\u20132556 (2008)","journal-title":"IEEE Trans. Industr. Electron."},{"issue":"1","key":"16_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1613676.1613679","volume":"57","author":"J Katz","year":"2009","unstructured":"Katz, J., Ostrovsky, R., Yung, M.: Efficient and secure authenticated key exchange using weak passwords. J. ACM 57(1), 1\u201341 (2009)","journal-title":"J. ACM"},{"issue":"3","key":"16_CR28","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"M Khan","year":"2011","unstructured":"Khan, M., Kim, S.: Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Comput. Commun. 34(3), 305\u2013309 (2011)","journal-title":"Comput. Commun."},{"issue":"12","key":"16_CR29","doi-asserted-by":"publisher","first-page":"2899","DOI":"10.1016\/j.jss.2012.06.063","volume":"85","author":"TH Kim","year":"2012","unstructured":"Kim, T.H., Kim, C., Park, I.: Side channel analysis attacks using am demodulation on commercial smart cards with seed. J. Syst. Soft. 85(12), 2899\u20132908 (2012)","journal-title":"J. Syst. Soft."},{"key":"16_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/11535218_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"H Krawczyk","year":"2005","unstructured":"Krawczyk, H.: HMQV: A high-performance secure Diffie-Hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546\u2013566. Springer, Heidelberg (2005)"},{"issue":"2","key":"16_CR31","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1109\/TIE.2009.2028351","volume":"57","author":"X Li","year":"2010","unstructured":"Li, X., Qiu, W., Zheng, D., Chen, K., Li, J.: Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57(2), 793\u2013800 (2010)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"16_CR32","volume-title":"No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing","author":"J Long","year":"2011","unstructured":"Long, J.: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. Syngress, Burlington (2011)"},{"issue":"10","key":"16_CR33","doi-asserted-by":"publisher","first-page":"2215","DOI":"10.1002\/dac.2468","volume":"27","author":"CG Ma","year":"2014","unstructured":"Ma, C.G., Wang, D., Zhao, S.: Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst. 27(10), 2215\u20132227 (2014)","journal-title":"Int. J. Commun. Syst."},{"issue":"4","key":"16_CR34","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1016\/j.jnca.2012.01.007","volume":"35","author":"R Madhusudhan","year":"2012","unstructured":"Madhusudhan, R., Mittal, R.: Dynamic id-based remote user password authentication schemes using smart cards: a review. J. Netw. Comput. Appl. 35(4), 1235\u20131248 (2012)","journal-title":"J. Netw. Comput. Appl."},{"key":"16_CR35","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"issue":"1","key":"16_CR36","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1515\/JMC.2007.004","volume":"1","author":"A Menezes","year":"2007","unstructured":"Menezes, A.: Another look at HMQV. J. Math. Cryptol. 1(1), 47\u201364 (2007)","journal-title":"J. Math. Cryptol."},{"key":"16_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-642-29011-4_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"A Menezes","year":"2012","unstructured":"Menezes, A.: Another look at provable security. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 8\u20138. Springer, Heidelberg (2012)"},{"issue":"5","key":"16_CR38","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"16_CR39","doi-asserted-by":"crossref","unstructured":"Moradi, A., Barenghi, A., Kasper, T., Paar, C.: On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs. In: Proceedings of ACM CCS 2011, pp. 111\u2013124. ACM (2011)","DOI":"10.1145\/2046707.2046722"},{"key":"16_CR40","doi-asserted-by":"crossref","unstructured":"Murdoch, S.J., Drimer, S., Anderson, R., Bond, M.: Chip and pin is broken. In: Proceedings of IEEE Security & Privacy 2010, pp. 433\u2013446. IEEE Computer Society (2010)","DOI":"10.1109\/SP.2010.33"},{"key":"16_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11734727_1","volume-title":"Information Security and Cryptology - ICISC 2005","author":"D Naccache","year":"2006","unstructured":"Naccache, D.: National security, forensics and mobile communications. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 1\u20131. Springer, Heidelberg (2006)"},{"key":"16_CR42","unstructured":"Nohl, K., Evans, D., Starbug, S., Pl\u00f6tz, H.: Reverse-engineering a cryptographic rfid tag. In: Proceedings of USENIX Security 2008, pp. 185\u2013193. USENIX Association (2008)"},{"key":"16_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-642-30057-8_23","volume-title":"Public Key Cryptography \u2013 PKC 2012","author":"D Pointcheval","year":"2012","unstructured":"Pointcheval, D.: Password-based authenticated key exchange. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 390\u2013397. Springer, Heidelberg (2012)"},{"issue":"1","key":"16_CR44","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.csi.2007.11.017","volume":"31","author":"HS Rhee","year":"2009","unstructured":"Rhee, H.S., Kwon, J.O., Lee, D.H.: A remote user authentication scheme without using smart cards. Comput. Stan. Interfaces 31(1), 6\u201313 (2009)","journal-title":"Comput. Stan. Interfaces"},{"key":"16_CR45","unstructured":"Scott, M.: Replacing username\/password with software-only two-factor authentication. Technical report, Cryptology ePrint Archive, Report 2012\/148 (2012). http:\/\/eprint.iacr.org\/2012\/148.pdf"},{"key":"16_CR46","unstructured":"Shamus Software Ltd.: Miracl library (2013). http:\/\/www.shamus.ie\/index.php?page=home"},{"key":"16_CR47","unstructured":"Smart Card Alliance: Philips Advances Smart Card Security for Mobile Applications (2013). http:\/\/www.ceic-cn.org\/files\/NXP2006zcard.pdf"},{"issue":"5","key":"16_CR48","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.1587\/transcom.E95.B.1819","volume":"95","author":"K Son","year":"2012","unstructured":"Son, K., Han, D., Won, D.: A privacy-protecting authentication scheme for roaming services with smart cards. IEICE Trans. Commun. 95(5), 1819\u20131821 (2012)","journal-title":"IEICE Trans. Commun."},{"issue":"5","key":"16_CR49","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.csi.2010.03.008","volume":"32","author":"R Song","year":"2010","unstructured":"Song, R.: Advanced smart card based password authentication protocol. Comput. Stand. Interfaces 32(5), 321\u2013325 (2010)","journal-title":"Comput. Stand. Interfaces"},{"issue":"6","key":"16_CR50","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIE.2009.2016508","volume":"56","author":"DZ Sun","year":"2009","unstructured":"Sun, D.Z., Huai, J.P., Sun, J.Z.: Improvements of juang et al\u2019.s password-authenticated key agreement scheme using smart cards. IEEE Trans. Industr. Electron. 56(6), 2284\u20132291 (2009)","journal-title":"IEEE Trans. Industr. Electron."},{"key":"16_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-31540-4_9","volume-title":"Data and Applications Security and Privacy XXVI","author":"D Wang","year":"2012","unstructured":"Wang, D., Ma, C., Wu, P.: Secure password-based remote user authentication scheme with non-tamper resistant smart cards. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 114\u2013121. Springer, Heidelberg (2012)"},{"key":"16_CR52","unstructured":"Wang, D., Ma, C., Wang, P., Chen, Z.: Robust smart card based password authentication scheme against smart card security breach. In: Cryptology ePrint Archive, Report 2012\/439 (2012). http:\/\/eprint.iacr.org\/2012\/439.pdf"},{"issue":"4","key":"16_CR53","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"Y Wang","year":"2009","unstructured":"Wang, Y., Liu, J., Xiao, F., Dan, J.: A more efficient and secure dynamic id-based remote user authentication scheme. Comput. Commun. 32(4), 583\u2013585 (2009)","journal-title":"Comput. Commun."},{"key":"16_CR54","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-642-30436-1_40","volume-title":"Information Security and Privacy Research","author":"Y Wang","year":"2012","unstructured":"Wang, Y.: Password protected smart card and memory stick authentication against off-line dictionary attacks. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 489\u2013500. Springer, Heidelberg (2012)"},{"issue":"2","key":"16_CR55","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1002\/sec.315","volume":"5","author":"SH Wu","year":"2012","unstructured":"Wu, S.H., Zhu, Y.F., Pu, Q.: Robust smart-cards-based user authentication scheme with user anonymity. Secur. Commun. Netw. 5(2), 236\u2013248 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"16_CR56","unstructured":"Wu, T.: A real-world analysis of kerberos password security. In: Proceedings of NDSS 1999, pp. 13\u201322. Internet Society (1999)"},{"issue":"4","key":"16_CR57","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu, J., Zhu, W., Feng, D.: An improved smart card based password authentication scheme with provable security. Comput. Stand. Inter. 31(4), 723\u2013728 (2009)","journal-title":"Comput. Stand. Inter."},{"issue":"1","key":"16_CR58","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","volume":"80","author":"K Xue","year":"2014","unstructured":"Xue, K., Hong, P., Ma, C.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci, 80(1), 195\u2013206 (2014)","journal-title":"J. Comput. Syst. Sci,."},{"issue":"7","key":"16_CR59","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1016\/j.jcss.2008.04.002","volume":"74","author":"G Yang","year":"2008","unstructured":"Yang, G., Wong, D., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7), 1160\u20131172 (2008)","journal-title":"J. Comput. Syst. Sci."},{"issue":"1","key":"16_CR60","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.tcs.2005.11.038","volume":"352","author":"Z Zhao","year":"2006","unstructured":"Zhao, Z., Dong, Z., Wang, Y.G.: Security analysis of a password-based authentication protocol proposed to IEEE 1363. Theoret. Comput. Sci. 352(1), 280\u2013287 (2006)","journal-title":"Theoret. Comput. Sci."},{"key":"16_CR61","unstructured":"Zhao, Z., Wang, Y.G.: Secure communication and authentication against off-line dictionary attacks in smart grid systems (2013). http:\/\/coitweb.uncc.edu\/yonwang\/papers\/smartgridfull.pdf"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27659-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,2]],"date-time":"2019-09-02T21:21:26Z","timestamp":1567459286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27659-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276588","9783319276595"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27659-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}