{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:19:44Z","timestamp":1743099584170,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319420912"},{"type":"electronic","value":"9783319420929"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42092-9_8","type":"book-chapter","created":{"date-parts":[[2016,6,30]],"date-time":"2016-06-30T06:02:55Z","timestamp":1467266575000},"page":"87-99","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis and Improvement User Authentication Scheme for Multi-server Environment"],"prefix":"10.1007","author":[{"given":"Dongwoo","family":"Kang","sequence":"first","affiliation":[]},{"given":"Jongho","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Donghoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,1]]},"reference":[{"issue":"12","key":"8_CR1","doi-asserted-by":"crossref","first-page":"e0145263","DOI":"10.1371\/journal.pone.0145263","volume":"10","author":"J Moon","year":"2015","unstructured":"Moon, J., et al.: An improvement of robust biometrics-based authentication and key agreement scheme for multi-server environments using smart cards. PloS one 10(12), e0145263 (2015)","journal-title":"PloS one"},{"key":"8_CR2","first-page":"1","volume":"2014","author":"Y Choi","year":"2014","unstructured":"Choi, Y., et al.: Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics. Sci. World J. 2014, 1\u201315 (2014)","journal-title":"Sci. World J."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Moon, J., et al.: Improvement of biometrics and smart cards-based authentication scheme for multi-server environments. In: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. ACM (2016)","DOI":"10.1145\/2857546.2857554"},{"issue":"4","key":"8_CR4","first-page":"1","volume":"7","author":"W Jeon","year":"2013","unstructured":"Jeon, W., Lee, Y., Won, D.: An efficient user authentication scheme with smart cards for wireless communications. Int. J. Secur. Appl. 7(4), 1\u20135 (2013)","journal-title":"Int. J. Secur. Appl."},{"issue":"5","key":"8_CR5","first-page":"1819","volume":"95","author":"S Kyungho","year":"2012","unstructured":"Kyungho, S., DongGuk, H., Dongho, W.: A privacy-protecting authentication scheme for roaming services with smart cards. IEICE Trans. Commun. 95(5), 1819\u20131821 (2012)","journal-title":"IEICE Trans. Commun."},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Jung, J., et al.: Cryptanalysis and improvement of efficient password-based user authentication scheme using hash function. In: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. ACM (2016)","DOI":"10.1145\/2857546.2857570"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Ford, W., Kaliski Jr., B.S.: Server-assisted generation of a strong secret from a password. In: Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, (WET ICE 2000). IEEE (2000)","DOI":"10.1109\/ENABL.2000.883724"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/3-540-45353-9_26","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"DP Jablon","year":"2001","unstructured":"Jablon, D.P.: Password authentication using multiple servers. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 344\u2013360. Springer, Heidelberg (2001)"},{"issue":"1","key":"8_CR9","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","volume":"19","author":"I-C Lin","year":"2003","unstructured":"Lin, I.-C., Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme for multi-server architecture. Future Gener. Comput. Syst. 19(1), 13\u201322 (2003)","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Hu, L., Niu, X., Yang, Y.: An efficient multi-server password authenticated key agreement scheme using smart cards. In: International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. IEEE (2007)","DOI":"10.1109\/MUE.2007.70"},{"issue":"3","key":"8_CR11","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.cose.2008.04.001","volume":"27","author":"J-L Tsai","year":"2008","unstructured":"Tsai, J.-L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3), 115\u2013121 (2008)","journal-title":"Comput. Secur."},{"issue":"1","key":"8_CR12","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"Y-P Liao","year":"2009","unstructured":"Liao, Y.-P., Wang, S.-S.: A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(1), 24\u201329 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"1","key":"8_CR13","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","volume":"58","author":"X Li","year":"2013","unstructured":"Li, X., et al.: A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(1), 85\u201395 (2013)","journal-title":"Math. Comput. Model."},{"issue":"1","key":"8_CR14","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","volume":"80","author":"K Xue","year":"2014","unstructured":"Xue, K., Hong, P., Ma, C.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1), 195\u2013206 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"8_CR15","first-page":"16","volume":"2015","author":"Y Lu","year":"2015","unstructured":"Lu, Y., et al.: A lightweight ID based authentication, key agreement protocol for multiserver architecture. Int. J. Distrib. Sens. Netw. 2015, 16 (2015)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"8_CR16","unstructured":"Amin, R.: Cryptanalysis, efficient dynamic ID based remote user authentication scheme in multi-server environment using smart card. Int. J. Netw. Secur. 18(1), 172\u2013181"},{"issue":"04","key":"8_CR17","first-page":"326","volume":"3","author":"SK Sood","year":"2012","unstructured":"Sood, S.K.: Dynamic identity based authentication protocol for two-server architecture. J. Inf. Secur. 3(04), 326 (2012)","journal-title":"J. Inf. Secur."},{"issue":"2","key":"8_CR18","first-page":"261","volume":"6","author":"C-T Li","year":"2012","unstructured":"Li, C.-T., Weng, C.Y., Fan, C.I.: Two-factor user authentication in multi-server networks. Int. J. Secur. Appl. 6(2), 261\u2013267 (2012)","journal-title":"Int. J. Secur. Appl."},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"PC Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"5","key":"8_CR20","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42092-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T13:31:37Z","timestamp":1498311097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42092-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319420912","9783319420929"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42092-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}