{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:12:55Z","timestamp":1725869575494},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_37","type":"book-chapter","created":{"date-parts":[[2016,10,31]],"date-time":"2016-10-31T03:53:29Z","timestamp":1477886009000},"page":"421-431","source":"Crossref","is-referenced-by-count":1,"title":["An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password"],"prefix":"10.1007","author":[{"given":"Xiong","family":"Li","sequence":"first","affiliation":[]},{"given":"Junguo","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Jingqiang","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"6","key":"37_CR1","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Li, B., Lee, S.Y.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929\u2013936 (2014)","journal-title":"J. Internet Technol."},{"issue":"1","key":"37_CR2","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H.W., Wang, J., Wang, J.W., Lee, S.Y.: A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1), 171\u2013178 (2015)","journal-title":"J. Internet Technol."},{"issue":"2","key":"37_CR3","first-page":"317","volume":"16","author":"YJ Ren","year":"2015","unstructured":"Ren, Y.J., Shen, J., Wang, J., Han, J., Lee, S.Y.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317\u2013323 (2015)","journal-title":"J. Internet Technol."},{"issue":"6","key":"37_CR4","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"37_CR5","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1016\/j.jnca.2012.10.001","volume":"36","author":"H Xiong","year":"2013","unstructured":"Xiong, H., Chen, Z., Li, F.: New identity-based three-party authenticated key agreement protocol with provable security. J. Netw. Comput. Appl. 36(2), 927\u2013932 (2013)","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"37_CR6","doi-asserted-by":"crossref","first-page":"1914","DOI":"10.1016\/j.camwa.2012.03.044","volume":"64","author":"D He","year":"2012","unstructured":"He, D., Padhye, S., Chen, J.: An efficient certificateless two-party authenticated key agreement protocol. Comput. Math. Appl. 64(6), 1914\u20131926 (2012)","journal-title":"Comput. Math. Appl."},{"issue":"1","key":"37_CR7","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.jcss.2011.01.002","volume":"78","author":"M H\u00f6lbl","year":"2012","unstructured":"H\u00f6lbl, M., Welzer, T., Brumen, B.: An improved two-party identity-based authenticated key agreement protocol using pairings. J. Comput. Syst. Sci. 78(1), 142\u2013150 (2012)","journal-title":"J. Comput. Syst. Sci."},{"issue":"3","key":"37_CR8","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.inffus.2011.01.001","volume":"13","author":"D He","year":"2012","unstructured":"He, D., Chen, J., Hu, J.: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 13(3), 223\u2013230 (2012)","journal-title":"Inf. Fusion"},{"issue":"4","key":"37_CR9","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1016\/j.ins.2006.07.026","volume":"177","author":"D Xiao","year":"2007","unstructured":"Xiao, D., Liao, X., Deng, S.: A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4), 1136\u20131142 (2007)","journal-title":"Inf. Sci."},{"issue":"3","key":"37_CR10","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.chaos.2007.01.017","volume":"38","author":"S Han","year":"2008","unstructured":"Han, S.: Security of a key agreement protocol based on chaotic maps. Chaos, Solitons Fractals 38(3), 764\u2013768 (2008)","journal-title":"Chaos, Solitons Fractals"},{"issue":"2","key":"37_CR11","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1016\/j.chaos.2007.08.012","volume":"40","author":"T Xiang","year":"2009","unstructured":"Xiang, T., Wong, K.W., Liao, X.: On the security of a novel key agreement protocol based on chaotic maps. Chaos, Solitons Fractals 40(2), 672\u2013675 (2009)","journal-title":"Chaos, Solitons Fractals"},{"issue":"6","key":"37_CR12","doi-asserted-by":"crossref","first-page":"1598","DOI":"10.1016\/j.ins.2007.11.001","volume":"178","author":"D Xiao","year":"2008","unstructured":"Xiao, D., Liao, X., Deng, S.: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Inf. Sci. 178(6), 1598\u20131602 (2008)","journal-title":"Inf. Sci."},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Tseng, H.R., Jan, R.H., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: Proceedings of 2009 IEEE International Conference on Communications (ICC 2009), pp. 1\u20136. IEEE, June 2009","DOI":"10.1109\/ICC.2009.5198581"},{"issue":"4","key":"37_CR14","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"Y Niu","year":"2011","unstructured":"Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986\u20131992 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"7","key":"37_CR15","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1016\/j.cnsns.2011.11.010","volume":"17","author":"EJ Yoon","year":"2012","unstructured":"Yoon, E.J.: Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2735\u20132740 (2012)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"7","key":"37_CR16","doi-asserted-by":"crossref","first-page":"2969","DOI":"10.1016\/j.cnsns.2011.11.025","volume":"17","author":"K Xue","year":"2012","unstructured":"Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969\u20132977 (2012)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"1\u20132","key":"37_CR17","first-page":"79","volume":"69","author":"CC Lee","year":"2012","unstructured":"Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1\u20132), 79\u201387 (2012)","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"37_CR18","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s11071-012-0335-0","volume":"69","author":"D He","year":"2012","unstructured":"He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149\u20131157 (2012)","journal-title":"Nonlinear Dyn."},{"issue":"20","key":"37_CR19","doi-asserted-by":"crossref","first-page":"4069","DOI":"10.1016\/j.ins.2010.06.013","volume":"180","author":"X Guo","year":"2010","unstructured":"Guo, X., Zhang, J.: Secure group key agreement protocol based on chaotic hash. Inf. Sci. 180(20), 4069\u20134074 (2010)","journal-title":"Inf. Sci."},{"issue":"4","key":"37_CR20","doi-asserted-by":"crossref","first-page":"2401","DOI":"10.1007\/s11071-012-0628-3","volume":"70","author":"P Gong","year":"2012","unstructured":"Gong, P., Li, P., Shi, W.: A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dyn. 70(4), 2401\u20132406 (2012)","journal-title":"Nonlinear Dyn."},{"issue":"11","key":"37_CR21","doi-asserted-by":"crossref","first-page":"110503","DOI":"10.1088\/1674-1056\/22\/11\/110503","volume":"22","author":"XY Wang","year":"2013","unstructured":"Wang, X.Y., Luan, D.P.: A secure key agreement protocol based on chaotic maps. Chin. Phys. B 22(11), 110503 (2013)","journal-title":"Chin. Phys. B"},{"issue":"5","key":"37_CR22","doi-asserted-by":"crossref","first-page":"050507","DOI":"10.7498\/aps.63.050507","volume":"63","author":"J Shu","year":"2014","unstructured":"Shu, J.: An authenticated key agreement protocol based on extended chaotic maps. Acta Phys. Sinica 63(5), 050507 (2014)","journal-title":"Acta Phys. Sinica"},{"issue":"3","key":"37_CR23","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3), 669\u2013674 (2008)","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"37_CR24","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1007\/s11071-014-1467-1","volume":"78","author":"A Jabbari","year":"2014","unstructured":"Jabbari, A., Bagherzadeh, J.: A revised key agreement protocol based on chaotic maps. Nonlinear Dyn. 78(1), 669\u2013680 (2014)","journal-title":"Nonlinear Dyn."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T20:34:22Z","timestamp":1657571662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}