{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:15:18Z","timestamp":1743138918233,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723945"},{"type":"electronic","value":"9783319723952"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72395-2_45","type":"book-chapter","created":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T09:56:41Z","timestamp":1512727001000},"page":"489-496","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Security on \u201cA Lightweight Authentication Scheme with User Untraceability\u201d"],"prefix":"10.1007","author":[{"given":"Niranchana","family":"Radhakrishnan","sequence":"first","affiliation":[]},{"given":"Marimuthu","family":"Karuppiah","sequence":"additional","affiliation":[]},{"given":"Vijayakumar","family":"Pandi","sequence":"additional","affiliation":[]},{"given":"Md Zakirul Alam","family":"Bhuiyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,9]]},"reference":[{"issue":"13","key":"45_CR1","first-page":"43","volume":"75","author":"R Amin","year":"2013","unstructured":"Amin, R.: Cryptanalysis and an efficient secure ID-based remote user authentication using smart card. Int. J. Comput. Appl. 75(13), 43\u201348 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Amin, R., Biswas, G.P.: Anonymity preserving secure hash function based authentication scheme for consumer USB mass storage device. In: 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT), pp. 1\u20136. IEEE, February 2015","DOI":"10.1109\/C3IT.2015.7060190"},{"issue":"1","key":"45_CR3","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2015","unstructured":"Giri, D., Maitra, T., Amin, R., Srivastava, P.D.: An efficient and robust RSA-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1), 145 (2015)","journal-title":"J. Med. Syst."},{"key":"45_CR4","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credentia-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321, 263\u2013277 (2015)","journal-title":"Inf. Sci."},{"key":"45_CR5","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.ins.2015.03.050","volume":"312","author":"SH Islam","year":"2015","unstructured":"Islam, S.H.: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf. Sci. 312, 104\u2013130 (2015)","journal-title":"Inf. Sci."},{"issue":"1","key":"45_CR6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.12785\/isl\/030105","volume":"3","author":"SH Islam","year":"2014","unstructured":"Islam, S.H., Biswas, G.P., Choo, K.K.R.: Cryptanalysis of an improved smartcard-based remote password authentication scheme. Inf. Sci. Lett. 3(1), 35 (2014)","journal-title":"Inf. Sci. Lett."},{"issue":"12","key":"45_CR7","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/s10916-016-0629-8","volume":"40","author":"X Li","year":"2016","unstructured":"Li, X., Niu, J., Karuppiah, M., Kumari, S., Wu, F.: Secure and efficient two-factor user authentication scheme with user anonymity for network based e-health care applications. J. Med. Syst. 40(12), 268 (2016)","journal-title":"J. Med. Syst."},{"issue":"2\u20133","key":"45_CR8","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1504\/IJIPT.2016.079548","volume":"9","author":"M Karuppiah","year":"2016","unstructured":"Karuppiah, M.: Remote user authentication scheme using smart card: a review. Int. J. Internet Protoc. Technol. 9(2\u20133), 107\u2013120 (2016)","journal-title":"Int. J. Internet Protoc. Technol."},{"key":"45_CR9","doi-asserted-by":"publisher","unstructured":"Kumari, S., Karuppiah, M., Das, A.K., Li, X., Wu, F., Kumar, N.: A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput. 1\u201326 (2017). https:\/\/doi.org\/10.1007\/s11227-017-2048-0","DOI":"10.1007\/s11227-017-2048-0"},{"key":"45_CR10","doi-asserted-by":"publisher","unstructured":"Ali, R., Pal, A.K., Kumari, S., Karuppiah, M., Conti, M.: A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gen. Comput. Syst. (2017). https:\/\/doi.org\/10.1016\/j.future.2017.06.018","DOI":"10.1016\/j.future.2017.06.018"},{"key":"45_CR11","doi-asserted-by":"crossref","unstructured":"Guo, C., Luo, N., Jie, Y., Bhuiyan, M.Z.A., Chen, Y., Alam, M.: Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage. In: 14th International Symposium on Pervasive Systems, Algorithms, and Networks (I-SPAN 2017), Exeter, UK, 23\u201327 June 2017 (2017)","DOI":"10.1109\/ISPAN-FCST-ISCC.2017.43"},{"issue":"11","key":"45_CR12","doi-asserted-by":"crossref","first-page":"3430","DOI":"10.1002\/dac.2552","volume":"27","author":"YF Chang","year":"2014","unstructured":"Chang, Y.F., Tai, W.L., Chang, H.C.: Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. Int. J. Commun Syst 27(11), 3430\u20133440 (2014)","journal-title":"Int. J. Commun Syst"},{"issue":"4","key":"45_CR13","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1631\/FITEE.1400232","volume":"16","author":"KH Yeh","year":"2015","unstructured":"Yeh, K.H.: A lightweight authentication scheme with user untraceability. Front. Inf. Technol. Electron. Eng. 16(4), 259\u2013271 (2015)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"issue":"2","key":"45_CR14","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s11277-016-3672-3","volume":"93","author":"M Karuppiah","year":"2017","unstructured":"Karuppiah, M., Kumari, S., Li, X., Wu, F., Das, A.K., Khan, M.K., Basu, S.: A dynamic ID-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 93(2), 383\u2013407 (2017)","journal-title":"Wirel. Pers. Commun."},{"issue":"17","key":"45_CR15","doi-asserted-by":"crossref","first-page":"4255","DOI":"10.1002\/sec.1602","volume":"9","author":"S Kumari","year":"2016","unstructured":"Kumari, S., Karuppiah, M., Li, X., Wu, F., Das, A.K., Odelu, V.: An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Secur. Commun. Netw. 9(17), 4255\u20134271 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"17","key":"45_CR16","doi-asserted-by":"crossref","first-page":"4192","DOI":"10.1002\/sec.1598","volume":"9","author":"M Karuppiah","year":"2016","unstructured":"Karuppiah, M., Kumari, S., Das, A.K., Li, X., Wu, F., Basu, S.: A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. Secur. Commun. Netw. 9(17), 4192\u20134209 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"16","key":"45_CR17","doi-asserted-by":"crossref","first-page":"3527","DOI":"10.1002\/sec.1558","volume":"9","author":"F Wu","year":"2016","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X., Das, A.K., Khan, M.K., Karuppiah, M., Baliyan, R.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Netw. 9(16), 3527\u20133542 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"45_CR18","doi-asserted-by":"crossref","first-page":"2055","DOI":"10.1007\/s11277-015-2524-x","volume":"84","author":"M Karuppiah","year":"2015","unstructured":"Karuppiah, M., Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055\u20132078 (2015)","journal-title":"Wirel. Pers. Commun."},{"key":"45_CR19","unstructured":"Wang, D., Ma, C.: On the (in)security of some smart-card-based password authentication schemes for WSN. IACR Cryptology ePrint Archive 2012:581 (2012)"},{"issue":"4\u20135","key":"45_CR20","first-page":"257","volume":"19","author":"M Karuppiah","year":"2014","unstructured":"Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. J. Inf. Secur. Appl. 19(4\u20135), 257\u2013320 (2014)","journal-title":"J. Inf. Secur. Appl."},{"key":"45_CR21","doi-asserted-by":"crossref","unstructured":"Wang, D., Wang, P., Liu, J.: Improved privacy-preserving authentication scheme for roaming service in mobile networks. In: IEEE Wireless Communications and Networking Conference (WCNC), Istanbul, Turkey, pp. 3136\u20133141. IEEE (2014)","DOI":"10.1109\/WCNC.2014.6953015"},{"issue":"5","key":"45_CR22","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1080\/09720529.2015.1013693","volume":"18","author":"M Karuppiah","year":"2015","unstructured":"Karuppiah, M., Saravanan, R.: Cryptanalysis and an improvement of new remote mutual authentication scheme using smart cards. J. Discrete Math. Sci. Cryptogr. 18(5), 623\u2013649 (2015)","journal-title":"J. Discrete Math. Sci. Cryptogr."},{"issue":"4","key":"45_CR23","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu, J., Zhu, W.T., Feng, D.G.: An improved smart card based password authentication scheme with provable security. Comput. Stan. Interfaces 31(4), 723\u2013728 (2009)","journal-title":"Comput. Stan. Interfaces"},{"key":"45_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"issue":"5","key":"45_CR25","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72395-2_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,29]],"date-time":"2024-06-29T14:55:42Z","timestamp":1719672942000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72395-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723945","9783319723952"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72395-2_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}