{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:46Z","timestamp":1750220686879,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319571850"},{"type":"electronic","value":"9783319571867"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-57186-7_10","type":"book-chapter","created":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T15:29:15Z","timestamp":1492010955000},"page":"116-126","source":"Crossref","is-referenced-by-count":0,"title":["Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems"],"prefix":"10.1007","author":[{"given":"Chun-Ta","family":"Li","sequence":"first","affiliation":[]},{"given":"Chin-Ling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,13]]},"reference":[{"key":"10_CR1","first-page":"1","volume":"2012","author":"Y An","year":"2012","unstructured":"An, Y.: Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. J. Biomed. Biotechnol. 2012, 1\u20136 (2012). Article no. 519723","journal-title":"J. Biomed. Biotechnol."},{"issue":"1","key":"10_CR2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"key":"10_CR3","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203\u2013209 (1987)","journal-title":"Math. Comput."},{"issue":"3","key":"10_CR4","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A.K.: Analysis and improvement on an efficient biometricbased remote user authentication. IET Inf. Secur. 5(3), 145\u2013151 (2011)","journal-title":"IET Inf. Secur."},{"issue":"2","key":"10_CR5","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.jksuci.2014.03.020","volume":"27","author":"AK Das","year":"2015","unstructured":"Das, A.K., Goswami, A.: A robust anonymous biometric-based remote user authentication scheme using smart cards. J. King Saud Univ. Comput. Inf. Sci. 27(2), 193\u2013210 (2015)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"3","key":"10_CR6","first-page":"1","volume":"39","author":"AK Das","year":"2015","unstructured":"Das, A.K.: A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems. J. Med. Syst. 39(3), 1\u201320 (2015). Article no. 30","journal-title":"J. Med. Syst."},{"issue":"3","key":"10_CR7","first-page":"1","volume":"39","author":"D Guo","year":"2015","unstructured":"Guo, D., Wen, Q., Li, W., Zhang, H., Jin, Z.: An improved biometrics-based authentication scheme for telecare medical information systems. J. Med. Syst. 39(3), 1\u201310 (2015). Article no. 20","journal-title":"J. Med. Syst."},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Han, L., Tan, X., Wang, S., Liang, X.: An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems. Peer-to-Peer Netw. Appl. (2016). doi: 10.1007\/s12083-016-0499-3","DOI":"10.1007\/s12083-016-0499-3"},{"issue":"11","key":"10_CR9","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11), 2245\u20132255 (2004)","journal-title":"Pattern Recogn."},{"issue":"1","key":"10_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 1\u20135 (2010)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"10_CR11","first-page":"1","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Peng, H., Yang, Y.: An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3), 1\u20139 (2015). Article no. 32","journal-title":"J. Med. Syst."},{"issue":"8","key":"10_CR12","doi-asserted-by":"crossref","first-page":"8129","DOI":"10.1016\/j.eswa.2014.07.004","volume":"41","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst. Appl. 41(8), 8129\u20138143 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"10_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0422-0","volume":"40","author":"J Moon","year":"2016","unstructured":"Moon, J., Choi, Y., Kim, J., Won, D.: An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J. Med. Syst. 40(3), 1\u201311 (2016). Article no. 70","journal-title":"J. Med. Syst."},{"key":"10_CR14","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.compeleceng.2015.02.015","volume":"45","author":"F Wu","year":"2015","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X.: A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput. Electr. Eng. 45, 274\u2013285 (2015)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"10_CR15","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1049\/iet-ifs.2011.0348","volume":"7","author":"HL Yeh","year":"2013","unstructured":"Yeh, H.L., Chen, T.H., Hu, K.J., Shih, W.K.: Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. IET Inf. Secur. 7(3), 247\u2013252 (2013)","journal-title":"IET Inf. Secur."}],"container-title":["Lecture Notes in Computer Science","Green, Pervasive, and Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-57186-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:07:17Z","timestamp":1750198037000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-57186-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319571850","9783319571867"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-57186-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}