{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:54:13Z","timestamp":1743072853084,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319462974"},{"type":"electronic","value":"9783319462981"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46298-1_4","type":"book-chapter","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T22:40:37Z","timestamp":1474324837000},"page":"47-61","source":"Crossref","is-referenced-by-count":1,"title":["Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications"],"prefix":"10.1007","author":[{"given":"Chang-Shiun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Li","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Limei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Min-Chi","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Shih-Ya","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Hung-Min","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,21]]},"reference":[{"issue":"2","key":"4_CR1","first-page":"99","volume":"4","author":"C Guo","year":"2013","unstructured":"Guo, C., Chang, C.C., Sun, C.Y.: Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications. J. Inf. Hiding Multimedia Sig. Process. 4(2), 99\u2013109 (2013)","journal-title":"J. Inf. Hiding Multimedia Sig. Process."},{"issue":"3","key":"4_CR2","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., Jiajun, B.: A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3), 367\u2013374 (2011)","journal-title":"Comput. Commun."},{"key":"4_CR3","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.ipl.2010.10.011","volume":"111","author":"RM Campello de Souzac","year":"2010","unstructured":"Campello de Souzac, R.M., Limaa, J.B., Panariob, D.: Public-key encryption based on chebyshev polynomials over gf(q). Inf. Process. Lett. 111, 51\u201356 (2010)","journal-title":"Inf. Process. Lett."},{"key":"4_CR4","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.jcss.2015.08.001","volume":"82","author":"E Jebek","year":"2016","unstructured":"Jebek, E.: Integer factoring and modular square roots. J. Comput. Syst. Sci. 82, 380\u2013394 (2016)","journal-title":"J. Comput. Syst. Sci."},{"issue":"5","key":"4_CR5","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"CC Lee","year":"2006","unstructured":"Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron. 53(5), 1683\u20131687 (2006)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"4_CR6","unstructured":"Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization. Technical report, Cambridge, MA, USA (1979)"},{"issue":"12","key":"4_CR7","doi-asserted-by":"crossref","first-page":"4052","DOI":"10.1016\/j.cnsns.2010.02.014","volume":"15","author":"X Wang","year":"2010","unstructured":"Wang, X., Zhao, J.: An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(12), 4052\u20134057 (2010)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"6","key":"4_CR8","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1109\/TIT.1980.1056264","volume":"26","author":"HC Williams","year":"1980","unstructured":"Williams, H.C.: A modification of the rsa public-key encryption procedure (corresp.). IEEE Trans. Inf. Theory 26(6), 726\u2013729 (1980)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"4_CR9","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.comcom.2010.04.041","volume":"34","author":"X Jing","year":"2011","unstructured":"Jing, X., Zhu, W.T., Feng, D.G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3), 319\u2013325 (2011)","journal-title":"Comput. Commun."},{"issue":"6","key":"4_CR10","doi-asserted-by":"crossref","first-page":"2383","DOI":"10.1016\/j.cnsns.2010.09.021","volume":"16","author":"EJ Yoon","year":"2011","unstructured":"Yoon, E.J., Jeon, I.S.: An efficient and secure diffie-hellman key agreement protocol based on chebyshev chaotic map. Commun. Nonlinear Sci. Numer. Simul. 16(6), 2383\u20132389 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"3","key":"4_CR11","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3), 669\u2013674 (2008)","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"4_CR12","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.comnet.2010.08.008","volume":"55","author":"T Zhou","year":"2011","unstructured":"Zhou, T., Jing, X.: Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Comput. Netw. 55(1), 205\u2013213 (2011)","journal-title":"Comput. Netw."}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46298-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:11:54Z","timestamp":1498331514000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46298-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319462974","9783319462981"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46298-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}