{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:15:14Z","timestamp":1743027314060,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319453774"},{"type":"electronic","value":"9783319453781"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45378-1_59","type":"book-chapter","created":{"date-parts":[[2016,9,8]],"date-time":"2016-09-08T05:04:15Z","timestamp":1473311055000},"page":"682-693","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Three Factor Based Remote User Authentication Protocol for Distributed Networks"],"prefix":"10.1007","author":[{"given":"Ashish","family":"Singh","sequence":"first","affiliation":[]},{"given":"Kakali","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,9]]},"reference":[{"issue":"11","key":"59_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"59_CR2","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Dutta, M.P., Bhunia, C.T.: A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards. In: Proceedings of the 8th International Conference on Security of Information and Networks, pp. 58\u201364. ACM, 8 September 2015","DOI":"10.1145\/2799979.2799984"},{"issue":"6","key":"59_CR3","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"LH Li","year":"2001","unstructured":"Li, L.H., Lin, I.C., Hwang, M.S.: A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural Netw. 12(6), 1498\u20131504 (2001)","journal-title":"IEEE Trans. Neural Netw."},{"key":"59_CR4","doi-asserted-by":"crossref","unstructured":"Yoon, E.J., Yoo, K.Y.: Robust multi-server authentication scheme. In: Sixth IFIP International Conference on Network and Parallel Computing, NPC 2009, pp. 197\u2013203. IEEE, 19 October 2009","DOI":"10.1109\/NPC.2009.42"},{"issue":"2","key":"59_CR5","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li, X., Xiong, Y., Ma, J., Wang, W.: An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2), 763\u2013769 (2012)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"59_CR6","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1016\/j.eswa.2013.08.040","volume":"41","author":"MC Chuang","year":"2014","unstructured":"Chuang, M.C., Chen, M.C.: An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst. Appl. 41(4), 1411\u20131418 (2014)","journal-title":"Expert Syst. Appl."},{"key":"59_CR7","doi-asserted-by":"crossref","unstructured":"Lee, J.H., Lee, D.H.: Efficient and secure remote authenticated key agreement scheme for multi-server using mobile equipment. In: International Conference on Consumer Electronics, ICCE 2008. Digest of Technical Papers, pp. 1\u20132. IEEE, 9 January 2008","DOI":"10.1109\/ICCE.2008.4588089"},{"issue":"3","key":"59_CR8","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.cose.2008.04.001","volume":"27","author":"JL Tsai","year":"2008","unstructured":"Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3), 115\u2013121 (2008)","journal-title":"Comput. Secur."},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"Xie, Q., Chen, D.: Hash function and smart card based multi-server authentication protocol. In: 2010 WASE International Conference on Information Engineering, vol. 4, pp. 17\u201319 (2010)","DOI":"10.1109\/ICIE.2010.292"},{"key":"59_CR10","doi-asserted-by":"crossref","unstructured":"Zhu, H., Liu, T., Liu, J.: Robust and simple multi-server authentication protocol without verification table. In: 2009 Ninth International Conference on Hybrid Intelligent Systems, pp. 51\u201356. IEEE, 12 August 2009","DOI":"10.1109\/HIS.2009.223"},{"key":"59_CR11","doi-asserted-by":"crossref","unstructured":"Chen, T.Y., Hwang, M.S., Lee, C.C., Jan, J.K.: Cryptanalysis of a secure dynamic ID based remote user authentication scheme for multi-server environment. In: 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC), pp. 725\u2013728. IEEE, 7 December 2009","DOI":"10.1109\/ICICIC.2009.152"},{"key":"59_CR12","doi-asserted-by":"crossref","unstructured":"Shao, M.H., Chin, Y.C.: A novel dynamic ID-based remote user authentication and access control scheme for multi-server environment. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 1102\u20131107. IEEE, 29 June 2010","DOI":"10.1109\/CIT.2010.201"},{"key":"59_CR13","first-page":"176","volume":"2009","author":"Y Chen","year":"2009","unstructured":"Chen, Y., Huang, C.H., Chou, J.S.: A novel multi-server authentication protocol. IACR Cryptol. ePrint Arch. 2009, 176 (2009)","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"2","key":"59_CR14","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"ML Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2), 629\u2013631 (2004)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"2","key":"59_CR15","first-page":"98","volume":"18","author":"S Kalra","year":"2013","unstructured":"Kalra, S., Sood, S.: Advanced remote user authentication protocol for multi-server architecture based on ECC. J. Inf. Secur. Appl. 18(2), 98\u2013107 (2013)","journal-title":"J. Inf. Secur. Appl."},{"issue":"6","key":"59_CR16","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","volume":"31","author":"HC Hsiang","year":"2009","unstructured":"Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces. 31(6), 1118\u20131123 (2009)","journal-title":"Comput. Stand. Interfaces."},{"issue":"1","key":"59_CR17","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","volume":"80","author":"K Xue","year":"2014","unstructured":"Xue, K., Hong, P., Ma, C.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1), 195\u2013206 (2014)","journal-title":"J. Comput. Syst. Sci."}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45378-1_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T08:11:23Z","timestamp":1719303083000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45378-1_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319453774","9783319453781"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45378-1_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"9 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Computer Information Systems and Industrial Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vilnius","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisim2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}