{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:49:40Z","timestamp":1762004980937,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319894997"},{"type":"electronic","value":"9783319895000"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89500-0_51","type":"book-chapter","created":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T13:35:44Z","timestamp":1523280944000},"page":"595-605","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments"],"prefix":"10.1007","author":[{"given":"Zhiqiang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,10]]},"reference":[{"issue":"8","key":"51_CR1","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Biswas, G.P.: An improved RSA based user authentication and session key agreement protocol usable in TMIS. J. Med. Syst. 39(8), 1\u201314 (2015)","journal-title":"J. Med. Syst."},{"issue":"1","key":"51_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2015","unstructured":"Giri, D., Maitra, T., Amin, R., Srivastava, P.D.: An efficient and robust RSA-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1), 1\u20139 (2015)","journal-title":"J. Med. Syst."},{"key":"51_CR3","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-81-322-2250-7_52","volume-title":"Information Systems Design and Intelligent Applications","author":"R Amin","year":"2015","unstructured":"Amin, R., Biswas, G.P.: Remote access control mechanism using rabin public key cryptosystem. In: Mandal, J.K., Satapathy, S.C., Sanyal, M.K., Sarkar, P.P., Mukhopadhyay, A. (eds.) Information Systems Design and Intelligent Applications. AISC, vol. 339, pp. 525\u2013533. Springer, New Delhi (2015). https:\/\/doi.org\/10.1007\/978-81-322-2250-7_52"},{"issue":"11","key":"51_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13369-015-1743-5","volume":"40","author":"R Amin","year":"2015","unstructured":"Amin, R., Biswas, G.P.: Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card. Arab. J. Sci. Eng. 40(11), 1\u201315 (2015)","journal-title":"Arab. J. Sci. Eng."},{"issue":"1","key":"51_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.12785\/isl\/030105","volume":"3","author":"SKH Islam","year":"2014","unstructured":"Islam, S.K.H., Biswas, G.P., Choo, K.K.R.: Cryptanalysis of an improved smartcard-based remote password authentication scheme. Inf. Sci. Lett. 3(1), 35 (2014)","journal-title":"Inf. Sci. Lett."},{"issue":"3","key":"51_CR6","first-page":"1","volume":"84","author":"SK Hafizul Islam","year":"2015","unstructured":"Hafizul Islam, S.K., Khan, M.K., Obaidat, M.S., Bin Muhaya, F.T.: Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps. Wirel. Pers. Commun. 84(3), 1\u201322 (2015)","journal-title":"Wirel. Pers. Commun."},{"issue":"C","key":"51_CR7","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.ins.2015.03.050","volume":"312","author":"SK Hafizul Islam","year":"2015","unstructured":"Hafizul Islam, S.K.: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf. Sci. Int. J. 312(C), 104\u2013130 (2015)","journal-title":"Inf. Sci. Int. J."},{"issue":"8","key":"51_CR8","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Biswas, G.P.: A secure three-factor user authentication and key agreement protocol for TMIS with user anonymity. J. Med. Syst. 39(8), 1\u201319 (2015)","journal-title":"J. Med. Syst."},{"issue":"11","key":"51_CR9","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1002\/dac.2793","volume":"29","author":"SK Hafizul Islam","year":"2016","unstructured":"Hafizul Islam, S.K.: Design and analysis of an improved smartcard-based remote user password authentication scheme. Int. J. Commun. Syst. 29(11), 1708\u20131719 (2016)","journal-title":"Int. J. Commun. Syst."},{"issue":"3","key":"51_CR10","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1007\/s11277-014-1968-8","volume":"79","author":"SK Hafizul Islam","year":"2014","unstructured":"Hafizul Islam, S.K.: A provably secure id-based mutual authentication and key agreement scheme for mobile multi-server environment without ESL attack. Wirel. Pers. Commun. 79(3), 1975\u20131991 (2014)","journal-title":"Wirel. Pers. Commun."},{"key":"51_CR11","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.adhoc.2015.05.020","volume":"36","author":"R Amin","year":"2016","unstructured":"Amin, R., Biswas, G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36, 58\u201380 (2016)","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"51_CR12","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"Y-P Liao","year":"2009","unstructured":"Liao, Y.-P., Wang, S.-S.: A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(1), 24\u201329 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"6","key":"51_CR13","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","volume":"31","author":"H-C Hsiang","year":"2009","unstructured":"Hsiang, H.-C., Shih, W.-K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(6), 1118\u20131123 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"11","key":"51_CR14","first-page":"13863","volume":"38","author":"C-C Lee","year":"2011","unstructured":"Lee, C.-C., Lin, T.-H., Chang, R.-X.: A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Syst. Appl. 38(11), 13863\u201313870 (2011)","journal-title":"Expert Syst. Appl."},{"key":"51_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/978-3-642-39640-3_37","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2013","author":"T-T Truong","year":"2013","unstructured":"Truong, T.-T., Tran, M.-T., Duong, A.-D.: Robust secure dynamic ID based remote user authentication scheme for multi-server environment. In: Murgante, B., Misra, S., Carlini, M., Torre, C.M., Nguyen, H.-Q., Taniar, D., Apduhan, B.O., Gervasi, O. (eds.) ICCSA 2013. LNCS, vol. 7975, pp. 502\u2013515. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39640-3_37"},{"issue":"2","key":"51_CR16","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.jnca.2010.11.011","volume":"34","author":"SK Sood","year":"2011","unstructured":"Sood, S.K., Sarje, A.K., Singh, K.: A secure dynamic identity based authentication protocol for multi-server architecture. J. Netw. Comput. Appl. 34(2), 609\u2013618 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"51_CR17","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li, X., Xiong, Y., Ma, J., Wang, W.: An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2), 763\u2013769 (2012)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"51_CR18","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/s11277-013-1039-6","volume":"72","author":"RS Pippal","year":"2013","unstructured":"Pippal, R.S., Jaidhar, C.D., Tapaswi, S.: Robust smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 72(1), 729\u2013745 (2013)","journal-title":"Wirel. Pers. Commun."},{"issue":"3\/4","key":"51_CR19","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1504\/IJESDF.2013.058669","volume":"5","author":"D He","year":"2013","unstructured":"He, D., Chen, J., Shi, W., Khan, M.K.: On the security of an authentication scheme for multi-server architecture. Int. J. Electr. Secur. Digit. Forensics 5(3\/4), 288\u2013296 (2013)","journal-title":"Int. J. Electr. Secur. Digit. Forensics"},{"issue":"11","key":"51_CR20","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10916-016-0585-3","volume":"40","author":"H Arshad","year":"2016","unstructured":"Arshad, H., Rasoolzadegan, A.: Design of a secure authentication and key agreement scheme preserving user privacy usable in telecare medicine information systems. J. Med. Syst. 40(11), 237 (2016)","journal-title":"J. Med. Syst."},{"key":"51_CR21","doi-asserted-by":"crossref","unstructured":"Amin, R., Islam, S.K., Khan, M.K., et al.: A two-factor RSA-based robust authentication system for multiserver environments. Secur. Commun. Netw. 2017, 15 p. (2017). Article no. 5989151","DOI":"10.1155\/2017\/5989151"},{"issue":"99","key":"51_CR22","first-page":"1","volume":"PP","author":"W Ding","year":"2016","unstructured":"Ding, W., Ping, W.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"51_CR23","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1007\/s11277-014-1948-z","volume":"79","author":"K-H Yeh","year":"2014","unstructured":"Yeh, K.-H.: A provably secure multi-server based authentication scheme. Wirel. Pers. Commun. 79(3), 1621\u20131634 (2014)","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"51_CR24","doi-asserted-by":"publisher","first-page":"2255","DOI":"10.1007\/s11277-014-1636-z","volume":"77","author":"J Wei","year":"2014","unstructured":"Wei, J., Liu, W., Hu, X.: Cryptanalysis and improvement of a robust smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 77(3), 2255\u20132269 (2014)","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"51_CR25","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s11277-014-2002-x","volume":"80","author":"X Li","year":"2015","unstructured":"Li, X., Niu, J., Kumari, S., Liao, J., Liang, W.: An enhancement of a smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. Int. J. 80(1), 175\u2013192 (2015)","journal-title":"Wirel. Pers. Commun. Int. J."},{"issue":"2","key":"51_CR26","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/s10916-014-0179-x","volume":"39","author":"X Lili","year":"2015","unstructured":"Lili, X., Fan, W.: Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J. Med. Syst. 39(2), 10 (2015)","journal-title":"J. Med. Syst."}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89500-0_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T14:41:15Z","timestamp":1751553675000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-89500-0_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319894997","9783319895000"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89500-0_51","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"10 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icics.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}