{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:13:54Z","timestamp":1742933634091,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685267"},{"type":"electronic","value":"9783319685274"}],"license":[{"start":{"date-parts":[[2017,9,24]],"date-time":"2017-09-24T00:00:00Z","timestamp":1506211200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-68527-4_9","type":"book-chapter","created":{"date-parts":[[2017,9,23]],"date-time":"2017-09-23T02:39:20Z","timestamp":1506134360000},"page":"79-87","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards"],"prefix":"10.1007","author":[{"given":"Tsu-Yang","family":"Wu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weicheng","family":"Fang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eric Ke","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Chai, Z., Cao, Z., Lu, R.: Efficient password-based authentication and key exchange scheme preserving user privacy. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 467\u2013477. Springer (2006)","DOI":"10.1007\/11814856_45"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Viet, D.Q., Yamamura, A., Tanaka, H.: Anonymous password-based authenticated key exchange. In: International Conference on Cryptology in India, pp. 244\u2013257. Springer (2005)","DOI":"10.1007\/11596219_20"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Kim, S., Rhee, H.S., Chun, J.Y., Lee, D.H.: Anonymous and traceable authentication scheme using smart cards. In: International Conference on Information Security and Assurance, ISA 2008, pp. 162\u2013165. IEEE (2008)","DOI":"10.1109\/ISA.2008.52"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhao, Z., Li, H., Luo, Q., Yang, Y.: An efficient remote user authentication scheme with strong anonymity. In: 2008 International Conference on Cyberworlds, pp. 180\u2013185. IEEE (2008)","DOI":"10.1109\/CW.2008.23"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Shao, S., Li, H., Niu, X., Yang, Y.: A remote user authentication scheme preserving user anonymity and traceability. In: 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2009, pp. 1\u20134. IEEE (2009)","DOI":"10.1109\/WICOM.2009.5301900"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Yang, Y., Zhou, J., Weng, J., Bao, F.: A new approach for anonymous password authentication. In: Annual Computer Security Applications Conference, ACSAC 2009, pp. 199\u2013208. IEEE (2009)","DOI":"10.1109\/ACSAC.2009.26"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Yang, Y., Zhou, J., Wong, J.W., Bao, F.: Towards practical anonymous password authentication. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 59\u201368. ACM (2010)","DOI":"10.1145\/1920261.1920271"},{"issue":"12","key":"9_CR8","doi-asserted-by":"crossref","first-page":"1379","DOI":"10.1002\/sec.501","volume":"5","author":"H Qian","year":"2012","unstructured":"Qian, H., Gong, J., Zhou, Y.: Anonymous password-based key exchange with low resources consumption and better user-friendliness. Secur. Commun. Netw. 5(12), 1379\u20131393 (2012)","journal-title":"Secur. Commun. Netw."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lu, H., Liu, J.K., Weng, J., Zhang, Y., Zhou, J.: Credential wrapping: from anonymous password authentication to anonymous biometric authentication. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 141\u2013151. ACM (2016)","DOI":"10.1145\/2897845.2897854"},{"key":"9_CR10","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1587\/transfun.E100.A.639","volume":"100","author":"S Shin","year":"2017","unstructured":"Shin, S., Kobara, K.: Simple anonymous password-based authenticated key exchange (SAPAKE), reconsidered. IEICE Trans. Fundam. Electron. Commun. Compu. Sci. 100, 639\u2013652 (2017)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Compu. Sci."},{"key":"9_CR11","unstructured":"Shin, S., Kobara, K.: A secure anonymous password-based authentication protocol with control of authentication numbers. In: 2016 International Symposium on Information Theory and its Applications (ISITA), pp. 325\u2013329. IEEE (2016)"},{"issue":"1","key":"9_CR12","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1587\/transcom.E98.B.160","volume":"98","author":"K Son","year":"2015","unstructured":"Son, K., Han, D.G., Won, D.: Simple and provably secure anonymous authenticated key exchange with a binding property. IEICE Trans. Commun. 98(1), 160\u2013170 (2015)","journal-title":"IEICE Trans. Commun."},{"key":"9_CR13","doi-asserted-by":"crossref","first-page":"3410","DOI":"10.1109\/ACCESS.2017.2675163","volume":"5","author":"CM Chen","year":"2017","unstructured":"Chen, C.M., Li, C.T., Liu, S., Wu, T.Y., Pan, J.S.: A provable secure private data delegation scheme for mountaineering events in emergency system. IEEE Access 5, 3410\u20133422 (2017)","journal-title":"IEEE Access"},{"issue":"3","key":"9_CR14","doi-asserted-by":"crossref","first-page":"2073","DOI":"10.1007\/s11071-016-3171-9","volume":"87","author":"CM Chen","year":"2017","unstructured":"Chen, C.M., Fang, W., Wang, K.H., Wu, T.Y.: Comments on an improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dyn. 87(3), 2073\u20132075 (2017)","journal-title":"Nonlinear Dyn."},{"key":"9_CR15","first-page":"61","volume":"2","author":"CM Chen","year":"2016","unstructured":"Chen, C.M., Xu, L., Wu, T.Y., Li, C.R.: On the security of a chaotic maps-based three-party authenticated key agreement protocol. J. Netw. Intell. 2, 61\u201365 (2016)","journal-title":"J. Netw. Intell."},{"key":"9_CR16","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.ins.2015.01.037","volume":"321","author":"HM Sun","year":"2015","unstructured":"Sun, H.M., He, B.Z., Chen, C.M., Wu, T.Y., Lin, C.H., Wang, H.: A provable authenticated group key agreement protocol for mobile environment. Inf. Sci. 321, 224\u2013237 (2015)","journal-title":"Inf. Sci."},{"issue":"8","key":"9_CR17","doi-asserted-by":"crossref","first-page":"1318","DOI":"10.1109\/TIFS.2013.2270106","volume":"8","author":"CM Chen","year":"2013","unstructured":"Chen, C.M., Wang, K.H., Wu, T.Y., Pan, J.S., Sun, H.M.: A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Trans. Inf. Forensics Secur. 8(8), 1318\u20131330 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Yang, J., Zhang, Z.: A new anonymous password-based authenticated key exchange protocol. In: International Conference on Cryptology in India, pp. 200\u2013212. Springer (2008)","DOI":"10.1007\/978-3-540-89754-5_16"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Shin, S.H., Kobara, K., Imai, H.: Very-efficient anonymous password-authenticated key exchange and its extensions. In: International Symposium on Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes, pp. 149\u2013158. Springer (2009)","DOI":"10.1007\/978-3-642-02181-7_16"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Yang, K., Hu, X., Wang, Y.: Practical anonymous password authentication and TLS with anonymous client authentication. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1179\u20131191. ACM (2016)","DOI":"10.1145\/2976749.2978354"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68527-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T06:08:47Z","timestamp":1506492527000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68527-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,24]]},"ISBN":["9783319685267","9783319685274"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68527-4_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,9,24]]}}}