{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:12:53Z","timestamp":1725869573405},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_34","type":"book-chapter","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T03:53:29Z","timestamp":1477886009000},"page":"377-388","source":"Crossref","is-referenced-by-count":1,"title":["Two Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks: Formal Model and Secure Construction"],"prefix":"10.1007","author":[{"given":"Fushan","family":"Wei","sequence":"first","affiliation":[]},{"given":"Ruijie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chuangui","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"6","key":"34_CR1","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929\u2013936 (2014)","journal-title":"J. Internet Technol."},{"issue":"1","key":"34_CR2","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Wang, J., Wang, J., Lee, S.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171\u2013178 (2015)","journal-title":"J. Internet Technol."},{"issue":"1","key":"34_CR3","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11277-014-1748-5","volume":"78","author":"S Xie","year":"2014","unstructured":"Xie, S., Wang, Y.: Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. wirel. Pers. Commun. 78(1), 231\u2013246 (2014)","journal-title":"wirel. Pers. Commun."},{"issue":"1","key":"34_CR4","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"DB He","year":"2015","unstructured":"He, D.B., Kumar, N., Chen, J.H., et al.: Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Syst. 21(1), 49\u201360 (2015)","journal-title":"Multimedia Syst."},{"issue":"3","key":"34_CR5","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086\u20131090 (2009)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"34_CR6","unstructured":"Nyang, D.H., Lee, M.K.: Improvement of Das\u2019s two-factor authentication protocol in wireless sensor networks. Cryptology, ePrint archive. http:\/\/eprint.iacr.org\/2009\/631.pdf"},{"issue":"5","key":"34_CR7","doi-asserted-by":"crossref","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","volume":"32","author":"TH Chen","year":"2010","unstructured":"Chen, T.H., Shih, K.K.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704\u2013712 (2010)","journal-title":"ETRI J."},{"issue":"4","key":"34_CR8","first-page":"1","volume":"10","author":"DJ He","year":"2010","unstructured":"He, D.J., Gao, Y., Chan, S.: An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 10(4), 1\u201311 (2010)","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"issue":"3","key":"34_CR9","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3), 2450\u20132459 (2010)","journal-title":"Sensors"},{"issue":"5","key":"34_CR10","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1007\/s00779-012-0540-3","volume":"17","author":"DZ Sun","year":"2013","unstructured":"Sun, D.Z., Li, J.X., Feng, Z.Y.: On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquit. Comput. 17(5), 895\u2013905 (2013)","journal-title":"Pers. Ubiquit. Comput."},{"key":"34_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"issue":"1","key":"34_CR12","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s11235-013-9755-5","volume":"55","author":"JJ Yuan","year":"2014","unstructured":"Yuan, J.J.: An enhanced two-factor user authentication in wireless sensor networks. Telecommun. Syst. 55(1), 105\u2013113 (2014)","journal-title":"Telecommun. Syst."},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Proceedings of 1990 IEEE Computer Society Symposium Research in Security and Privacy, pp. 234\u2013246 (2009)","DOI":"10.1109\/RISP.1990.63854"},{"issue":"1","key":"34_CR14","first-page":"62","volume":"45","author":"FS Wei","year":"2016","unstructured":"Wei, F.S., Ma, J.F., Jiang, Q., et al.: Cryptanalysis and improvement of an enhanced two-factor user authentication scheme in wireless sensor networks. Inf. Technol. Control 45(1), 62\u201370 (2016)","journal-title":"Inf. Technol. Control"},{"issue":"11","key":"34_CR15","doi-asserted-by":"crossref","first-page":"21023","DOI":"10.3390\/s141121023","volume":"14","author":"J Nam","year":"2014","unstructured":"Nam, J., Kim, M., Paik, J., et al.: A provably-secure ECC-based authentication scheme for wireless sensor networks. Sensors 14(11), 21023\u201321044 (2014)","journal-title":"Sensors"},{"key":"34_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-540-68914-0_17","volume-title":"Applied Cryptography and Network Security","author":"D Pointcheval","year":"2008","unstructured":"Pointcheval, D., Zimmer, S.: Multi-factor authenticated key exchange. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 277\u2013295. Springer, Heidelberg (2008)"},{"key":"34_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139\u2013155. Springer, Heidelberg (2000). doi: 10.1007\/3-540-45539-6_11"},{"issue":"1","key":"34_CR18","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TDSC.2011.24","volume":"9","author":"M Alsaleh","year":"2012","unstructured":"Alsaleh, M., Mannan, M., Van Oorschot, P.C.: Revisiting defenses against large-scale online password guessing attacks. IEEE Trans. Dependable Secure Comput. 9(1), 128\u2013141 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"34_CR19","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang, D., He, D., Wang, P., et al.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4), 428\u2013442 (2015)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"34_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-662-46800-5_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"VT Hoang","year":"2015","unstructured":"Hoang, V.T., Krovetz, T., Rogaway, P.: Robust authenticated-encryption AEZ and the problem that it solves. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 15\u201344. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46800-5_2"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T04:46:18Z","timestamp":1568522778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}