{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:03:45Z","timestamp":1743120225058,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_28","type":"book-chapter","created":{"date-parts":[[2016,10,30]],"date-time":"2016-10-30T23:53:29Z","timestamp":1477871609000},"page":"311-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Qi","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Bingyan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Youliang","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Ardagna, A., Asal, R., Damiani, E., et al.: From security to assurance in the cloud: a survey. ACM Comput. Surv. (CSUR) 48(1), 2:1\u201350 (2015)","DOI":"10.1145\/2767005"},{"issue":"3","key":"28_CR2","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/TDSC.2015.2406704","volume":"13","author":"H Li","year":"2015","unstructured":"Li, H., Yang, Y., Luan, T., Liang, X., Zhou, L., Shen, X.: Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 13(3), 312\u2013325 (2015)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"28_CR3","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317\u2013323 (2015)","journal-title":"J. Internet Technol."},{"key":"28_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2428620","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. (2015). doi:\n                      10.1109\/JSYST.2015.2428620","journal-title":"IEEE Syst. J."},{"issue":"3","key":"28_CR5","first-page":"229","volume":"16","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Li, G., Yang, L.: Robust two-factor authentication and key agreement preserving user privacy. Int. J. Netw. Secur. 16(3), 229\u2013240 (2014)","journal-title":"Int. J. Netw. Secur."},{"issue":"6","key":"28_CR6","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8(6), 1070\u20131081 (2015)","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"5","key":"28_CR7","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/JCN.2015.000083","volume":"17","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Moh, S., et al.: Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5), 453\u2013462 (2015)","journal-title":"J. Commun. Netw."},{"issue":"4","key":"28_CR8","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1007\/s11071-015-2467-5","volume":"83","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A.: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83(4), 2085\u20132101 (2016)","journal-title":"Nonlinear Dyn."},{"issue":"2","key":"28_CR9","doi-asserted-by":"publisher","first-page":"195","DOI":"10.5755\/j01.itc.44.2.8197","volume":"44","author":"W Fushan","year":"2015","unstructured":"Fushan, W., Jianfeng, Ma., Aijun, G., Guangsong, L., Chuangui, Ma.: A provably secure three-party password authenticated key exchange protocol without using server\u2019s public-keys and symmetric cryptosystems. ITC 44(2), 195\u2013206 (2015)","journal-title":"ITC"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Choudhury, A.J., et al.: A strong user authentication framework for cloud computing. In: Proceedings of IEEE Asia-Pacific Services Computing Conference, 12\u201315, pp. 110\u2013115 (2011)","DOI":"10.1109\/APSCC.2011.14"},{"issue":"2","key":"28_CR11","doi-asserted-by":"publisher","first-page":"227","DOI":"10.15837\/ijccc.2011.2.2170","volume":"6","author":"Z Hao","year":"2011","unstructured":"Hao, Z., Zhong, S., Yu, N.: A time-bound ticket-based mutual authentication scheme for cloud computing. Int. J. Comput. Commun. Control 6(2), 227\u2013235 (2011)","journal-title":"Int. J. Comput. Commun. Control"},{"issue":"2","key":"28_CR12","first-page":"149","volume":"37","author":"RS Pippal","year":"2013","unstructured":"Pippal, R.S., Jaidhar, C.D., Tapaswi, S.: Enhanced time-bound ticket-based mutual authentication scheme for cloud computing. Informatica 37(2), 149\u2013156 (2013)","journal-title":"Informatica"},{"key":"28_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1610-x","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D.: A privacy preserving three-factor authentication protocol for e-health clouds. J. Supercomput. (2016). doi:\n                      10.1007\/s11227-015-1610-x","journal-title":"J. Supercomput."},{"issue":"5","key":"28_CR14","doi-asserted-by":"publisher","first-page":"410","DOI":"10.4103\/0256-4602.123125","volume":"30","author":"MS Hwang","year":"2013","unstructured":"Hwang, M.S., Sun, T.H.: Using smart card to achieve a single sign-on for multiple cloud services. IETE Tech. Rev. 30(5), 410\u2013416 (2013)","journal-title":"IETE Tech. Rev."},{"issue":"3","key":"28_CR15","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1109\/JSYST.2014.2322973","volume":"9","author":"JL Tsai","year":"2015","unstructured":"Tsai, J.L., Lo, N.W.: A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 9(3), 805\u2013815 (2015)","journal-title":"IEEE Syst. J."},{"key":"28_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2574719","author":"J Qi","year":"2016","unstructured":"Qi, J., Jianfeng, Ma., Fushan, W.: On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. (2016). doi:\n                      10.1109\/JSYST.2016.2574719","journal-title":"IEEE Syst. J."},{"issue":"7","key":"28_CR17","first-page":"2719","volume":"9","author":"H Li","year":"2015","unstructured":"Li, H., Li, F., Song, C., et al.: Towards smart card based mutual authentication schemes in cloud computing. KSII Trans. Internet Inf. Syst. 9(7), 2719\u20132735 (2015)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"28_CR18","series-title":"Springer Professional Computing","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer Professional Computing. Springer, Berlin (2004)"},{"key":"28_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201899","author":"PC Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"5","key":"28_CR20","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."},{"issue":"9","key":"28_CR21","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A.K., Goswami, A.: A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 10(9), 1953\u20131966 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"28_CR22","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1007\/s11277-013-1594-x","volume":"77","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Li, G., et al.: An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wireless Pers. Commun. 77(2), 1489\u20131506 (2014)","journal-title":"Wireless Pers. Commun."},{"issue":"4","key":"28_CR23","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang, D., He, D., Wang, P., Chu, C.H.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4), 428\u2013442 (2015)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"28_CR24","series-title":"LNICS","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-23829-6_11","volume-title":"International Conference on Security and Privacy in Communication Networks","author":"D Wang","year":"2014","unstructured":"Wang, D., Wang, P.: On the usability of two-factor authentication. In: Tian, J., Jing, J., Srivatsa, M. (eds.) International Conference on Security and Privacy in Communication Networks. LNICS, vol. 152, pp. 141\u2013150. Springer, Heidelberg (2014)"},{"issue":"2","key":"28_CR25","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li, X., Xiong, Y., Ma, J., Wang, W.: An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2), 763\u2013769 (2012)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:09:34Z","timestamp":1558476574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"1 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}