{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:17Z","timestamp":1740099077941,"version":"3.37.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319951614"},{"type":"electronic","value":"9783319951621"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95162-1_37","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T04:15:34Z","timestamp":1530591334000},"page":"541-557","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improvement on a Biometric-Based Key Agreement and Authentication Scheme for the Multi-server Environments"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9557-0430","authenticated-orcid":false,"given":"Jongho","family":"Moon","sequence":"first","affiliation":[]},{"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Hyungkyu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hakjun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sewan","family":"Ha","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"issue":"11","key":"37_CR1","doi-asserted-by":"publisher","first-page":"2508","DOI":"10.1007\/s11432-012-4646-z","volume":"55","author":"X Zhang","year":"2012","unstructured":"Zhang, X., Li, W., Zheng, Z.M., Guo, B.H.: Optimized statistical analysis of software trustworthiness attributes. Sci. China Inf. Sci. 55(11), 2508\u20132520 (2012)","journal-title":"Sci. China Inf. Sci."},{"issue":"11","key":"37_CR2","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"issue":"7","key":"37_CR3","doi-asserted-by":"publisher","first-page":"2505","DOI":"10.1587\/transcom.E95.B.2505","volume":"95","author":"W Jeon","year":"2012","unstructured":"Jeon, W., Kim, J., Nam, J., Lee, Y., Won, D.: An enhanced secure authentication scheme with anonymity for wireless environments. IEICE Trans. Commun. 95(7), 2505\u20132508 (2012)","journal-title":"IEICE Trans. Commun."},{"issue":"4","key":"37_CR4","doi-asserted-by":"publisher","first-page":"6443","DOI":"10.3390\/s140406443","volume":"14","author":"J Kim","year":"2014","unstructured":"Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4), 6443\u20136462 (2014)","journal-title":"Sensors"},{"issue":"6","key":"37_CR5","doi-asserted-by":"publisher","first-page":"2284","DOI":"10.1109\/TIE.2009.2016508","volume":"56","author":"DZ Sun","year":"2009","unstructured":"Sun, D.Z., Huai, J.P., Sun, J.Z., Li, J.X., Zhang, J.W., Feng, Z.Y.: Improvements of Juang\u2019s password authenticated key agreement scheme using smart cards. IEEE Trans. Ind. Electron. 56(6), 2284\u20132291 (2009)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"1","key":"37_CR6","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.csi.2006.01.002","volume":"29","author":"MK Khan","year":"2007","unstructured":"Khan, M.K., Zhang, J.: Improving the security of \u2018a flexible biometrics remote user authentication scheme\u2019. Comput. Stand. Interfaces 29(1), 82\u201385 (2007)","journal-title":"Comput. Stand. Interfaces"},{"issue":"4","key":"37_CR7","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TCE.2013.6689693","volume":"59","author":"D He","year":"2013","unstructured":"He, D., Kumar, N., Khan, M.K., Lee, J.H.: Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans. Consum. Electron. 59(4), 811\u2013817 (2013)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"12","key":"37_CR8","first-page":"1","volume":"10","author":"J Moon","year":"2015","unstructured":"Moon, J., Choi, Y., Jung, J., Won, D.: An Improvement of robust biometrics-based authentication and key agreement scheme for multi-server environments using smart cards. PLoS ONE 10(12), 1\u201315 (2015)","journal-title":"PLoS ONE"},{"issue":"3","key":"37_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0422-0","volume":"40","author":"J Moon","year":"2016","unstructured":"Moon, J., Choi, Y., Kim, J., Won, D.: An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J. Med. Syst. 40(3), 1\u201311 (2016)","journal-title":"J. Med. Syst."},{"issue":"3","key":"37_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0221-7","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Peng, H., Yang, Y.: An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3), 1\u20138 (2015)","journal-title":"J. Med. Syst."},{"key":"37_CR11","first-page":"1","volume":"2014","author":"Younsung Choi","year":"2014","unstructured":"Choi, Y., Nam, J., Lee, D., Kim, J., Jung, J., Won, D.: Security enhanced anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Sci. World J. Article ID 281305, 1\u201315 (2014)","journal-title":"The Scientific World Journal"},{"issue":"3\u20134","key":"37_CR12","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.cose.2008.04.001","volume":"27","author":"JL Tsai","year":"2008","unstructured":"Tsai, J.L.: Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3\u20134), 115\u2013121 (2008)","journal-title":"Comput. Secur."},{"issue":"1","key":"37_CR13","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"YP Liao","year":"2009","unstructured":"Liao, Y.P., Wang, S.S.: A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(1), 24\u201329 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"6","key":"37_CR14","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","volume":"31","author":"HC Hsiang","year":"2009","unstructured":"Hsiang, H.C., Shih, W.K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Stand. Interfaces 31(6), 1118\u20131123 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"1\u20132","key":"37_CR15","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","volume":"58","author":"X Li","year":"2013","unstructured":"Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J.: A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(1\u20132), 85\u201395 (2013)","journal-title":"Math. Comput. Model."},{"issue":"1","key":"37_CR16","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","volume":"80","author":"KP Xue","year":"2013","unstructured":"Xue, K.P., Hong, P.L., Ma, C.S.: A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server arahitecture. J. Comput. Syst. Sci. 80(1), 195\u2013206 (2013)","journal-title":"J. Comput. Syst. Sci."},{"issue":"3","key":"37_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/635890","volume":"11","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Peng, H., Yang, X., Yang, Y.: A lightweight ID based authentication and key agreement protocol for multi-server architecture. Int. J. Distrib. Sens. Netw. 11(3), 1\u20139 (2015). 635890","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"4","key":"37_CR18","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1016\/j.eswa.2013.08.040","volume":"41","author":"MC Chuang","year":"2014","unstructured":"Chuang, M.C., Chen, M.C.: An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst. Appl. 41(4), 1411\u20131418 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"18","key":"37_CR19","doi-asserted-by":"publisher","first-page":"8129","DOI":"10.1016\/j.eswa.2014.07.004","volume":"41","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Das, A.K., Mukhopadhyay, S.: A secure user anonymity-preserving biometric-based multiserver authenticated key agreement scheme using smart cards. Expert Syst. Appl. 41(18), 8129\u20138143 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"37_CR20","first-page":"1","volume":"10","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Yang, X., Yang, Y.: Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards. PLoS ONE 10(5), 1\u201313 (2015)","journal-title":"PLoS ONE"},{"issue":"2","key":"37_CR21","first-page":"1","volume":"11","author":"C Wang","year":"2016","unstructured":"Wang, C., Zhang, X., Zheng, Z.: Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme. PLoS ONE 11(2), 1\u201325 (2016)","journal-title":"PLoS ONE"},{"issue":"2","key":"37_CR22","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"37_CR23","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"P Kocher","year":"2011","unstructured":"Kocher, P., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. J. Cryptogr. Eng. 1(1), 5\u201327 (2011)","journal-title":"J. Cryptogr. Eng."},{"issue":"1","key":"37_CR24","first-page":"1","volume":"30","author":"AK Das","year":"2015","unstructured":"Das, A.K.: A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. 30(1), 1\u201325 (2015)","journal-title":"Int. J. Commun. Syst."},{"issue":"9","key":"37_CR25","doi-asserted-by":"publisher","first-page":"6207","DOI":"10.1109\/TIT.2012.2200290","volume":"58","author":"Y Dodis","year":"2012","unstructured":"Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. IEEE Trans. Inf. Theory 58(9), 6207\u20136222 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"37_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523\u2013540. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_31"},{"key":"37_CR27","doi-asserted-by":"crossref","unstructured":"RFC 4306: Internet key exchange (IKEv2) protocol (2005)","DOI":"10.17487\/rfc4739"},{"issue":"1\u20132","key":"37_CR28","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s13119-012-0009-8","volume":"2","author":"AK Das","year":"2013","unstructured":"Das, A.K.: A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci. 2(1\u20132), 12\u201327 (2013)","journal-title":"Netw. Sci."},{"key":"37_CR29","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A.K., Paul, N.R., Tripathy, L.: Cryptanalysis and improvement of an access control in user hieraRAhy based on elliptic curve cryptosystem. Inf. Sci. 209, 80\u201392 (2012)","journal-title":"Inf. Sci."},{"key":"37_CR30","unstructured":"von Oheimb, D.: The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proceedings of the Applied Semantics 2005 Workshop, Frauenchiemsee, Germany, pp. 1\u201317 (2005)"},{"issue":"7","key":"37_CR31","doi-asserted-by":"publisher","first-page":"2969","DOI":"10.1016\/j.cnsns.2011.11.025","volume":"17","author":"K Xue","year":"2012","unstructured":"Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7), 2969\u20132977 (2012)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95162-1_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T04:10:56Z","timestamp":1571544656000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95162-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319951614","9783319951621"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95162-1_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}