{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:53:04Z","timestamp":1725915184090},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685410"},{"type":"electronic","value":"9783319685427"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68542-7_16","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T15:23:50Z","timestamp":1509549830000},"page":"189-200","source":"Crossref","is-referenced-by-count":3,"title":["A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing"],"prefix":"10.1007","author":[{"given":"Fan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Lili","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"issue":"7","key":"16_CR1","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo, P., D\u2019Arco, P., De Santis, A., Kocarev, L.: Security of public-key cryptosystems based on chebyshev polynomials. IEEE Trans. Circ. Syst. I: Regul. Pap. 52(7), 1382\u20131393 (2005)","journal-title":"IEEE Trans. Circ. Syst. I: Regul. Pap."},{"issue":"3","key":"16_CR2","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1049\/ip-e.1991.0022","volume":"138","author":"CC Chang","year":"1991","unstructured":"Chang, C.C., Wu, T.C.: Remote password authentication with smart cards. IEE Proc.-Comput. Digit. Tech. 138(3), 165\u2013168 (1991)","journal-title":"IEE Proc.-Comput. Digit. Tech."},{"issue":"9","key":"16_CR3","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546\u20132559 (2016)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"12","key":"16_CR4","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706\u20132716 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"16_CR5","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1016\/j.cnsns.2012.09.032","volume":"18","author":"C Guo","year":"2013","unstructured":"Guo, C., Chang, C.C.: Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6), 1433\u20131440 (2013)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"2","key":"16_CR6","doi-asserted-by":"crossref","first-page":"9919","DOI":"10.1007\/s10916-012-9919-y","volume":"37","author":"X Hao","year":"2013","unstructured":"Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2), 9919 (2013)","journal-title":"J. Med. Syst."},{"issue":"3","key":"16_CR7","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., Wang, D.: Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3), 816\u2013823 (2015)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"16_CR8","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1007\/s11071-014-1467-1","volume":"78","author":"A Jabbari","year":"2014","unstructured":"Jabbari, A., Bagherzadeh, J.: A revised key agreement protocol based on chaotic maps. Nonlinear Dyn. 78(1), 669\u2013680 (2014)","journal-title":"Nonlinear Dyn."},{"issue":"10","key":"16_CR9","doi-asserted-by":"crossref","first-page":"3826","DOI":"10.1007\/s11227-015-1610-x","volume":"72","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D.: A privacy preserving three-factor authentication protocol for e-health clouds. J. Supercomput. 72(10), 3826\u20133849 (2016)","journal-title":"J. Supercomput."},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-319-48671-0_28","volume-title":"Cloud Computing and Security","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Li, B., Ma, J., Tian, Y., Yang, Y.: Cryptanalysis and improvement of a smart card based mutual authentication scheme in cloud computing. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 311\u2013321. Springer, Cham (2016). doi:\n10.1007\/978-3-319-48671-0_28"},{"issue":"2","key":"16_CR11","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2), 12 (2014)","journal-title":"J. Med. Syst."},{"key":"16_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20542-2","volume-title":"Chaos-Based Cryptography: Theory, Algorithms and Applications","author":"L Kocarev","year":"2011","unstructured":"Kocarev, L., Lian, S.: Chaos-Based Cryptography: Theory, Algorithms and Applications, vol. 354. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-20542-2"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Kocarev, L., Tasev, Z.: Public-key encryption based on Chebyshev maps. In: Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS 2003, vol. 3, pp. 28\u201331. IEEE (2003)","DOI":"10.1109\/ISCAS.2003.1204947"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 1999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). doi:\n10.1007\/3-540-48405-1_25"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-319-48671-0_37","volume-title":"Cloud Computing and Security","author":"X Li","year":"2016","unstructured":"Li, X., Liao, J., Liang, W., Zhao, J.: An extended chaotic maps based authenticated key agreement protocol without using password. In: Sun, X., Liu, A., Chao, H.-C., Bertino, E. (eds.) ICCCS 2016. LNCS, vol. 10039, pp. 421\u2013431. Springer, Cham (2016). doi:\n10.1007\/978-3-319-48671-0_37"},{"issue":"2","key":"16_CR16","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1016\/j.cnsns.2014.05.027","volume":"20","author":"HY Lin","year":"2015","unstructured":"Lin, H.Y.: Improved chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 20(2), 482\u2013488 (2015)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"17","key":"16_CR17","doi-asserted-by":"crossref","first-page":"4002","DOI":"10.1002\/sec.1582","volume":"9","author":"Q Liu","year":"2016","unstructured":"Liu, Q., Cai, W., Shen, J., Fu, Z., Liu, X., Linge, N.: A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment. Secur. Commun. Netw. 9(17), 4002\u20134012 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"16_CR18","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"16_CR19","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"Y Niu","year":"2011","unstructured":"Niu, Y., Wang, X.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4), 1986\u20131992 (2011)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"1\u20132","key":"16_CR20","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s11071-012-0715-5","volume":"72","author":"Z Tan","year":"2013","unstructured":"Tan, Z.: A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72(1\u20132), 311\u2013320 (2013)","journal-title":"Nonlinear Dyn."},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Tseng, H.R., Jan, R.H., Yang, W.: A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International Conference on Communications, ICC 2009, pp. 1\u20136. IEEE (2009)","DOI":"10.1109\/ICC.2009.5198581"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Wang, D., Gu, Q., Cheng, H., Wang, P.: The request for better measurement: a comparative evaluation of two-factor authentication schemes. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 475\u2013486. ACM (2016)","DOI":"10.1145\/2897845.2897916"},{"issue":"4","key":"16_CR23","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang, D., He, D., Wang, P., Chu, C.H.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secur. Comput. 12(4), 428\u2013442 (2015)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"16_CR24","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-319-23829-6_11","volume-title":"International Conference on Security and Privacy in Communication Networks","author":"D Wang","year":"2015","unstructured":"Wang, D., Wang, P.: On the usability of two-factor authentication. In: Tian, J., Jing, J., Srivatsa, M. (eds.) SecureComm 2014. LNICSSITE, vol. 152, pp. 141\u2013150. Springer, Cham (2015). doi:\n10.1007\/978-3-319-23829-6_11"},{"key":"16_CR25","doi-asserted-by":"publisher","unstructured":"Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secur. Comput. (2016). doi:\n10.1109\/TDSC.2016.2605087","DOI":"10.1109\/TDSC.2016.2605087"},{"issue":"11","key":"16_CR26","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594\u20132608 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"16_CR27","doi-asserted-by":"crossref","first-page":"2969","DOI":"10.1016\/j.cnsns.2011.11.025","volume":"17","author":"K Xue","year":"2012","unstructured":"Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969\u20132977 (2012)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"6","key":"16_CR28","doi-asserted-by":"crossref","first-page":"9993","DOI":"10.1007\/s10916-013-9993-9","volume":"37","author":"WC Yau","year":"2013","unstructured":"Yau, W.C., Phan, R.C.W.: Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(6), 9993 (2013)","journal-title":"J. Med. Syst."},{"issue":"3","key":"16_CR29","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3), 669\u2013674 (2008)","journal-title":"Chaos, Solitons Fractals"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68542-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T15:28:34Z","timestamp":1509550114000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68542-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685410","9783319685427"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68542-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}