{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:18:09Z","timestamp":1742383089654,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319951645"},{"type":"electronic","value":"9783319951652"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95165-2_4","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T10:35:04Z","timestamp":1530614104000},"page":"50-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Taeui","family":"Song","sequence":"first","affiliation":[]},{"given":"Dongwoo","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Jihyeon","family":"Ryu","sequence":"additional","affiliation":[]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.adhoc.2015.05.020","volume":"36","author":"R Amin","year":"2016","unstructured":"Amin, R., Biswas, G.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36, 58\u201380 (2016)","journal-title":"Ad Hoc Netw."},{"issue":"5","key":"4_CR2","doi-asserted-by":"publisher","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","volume":"32","author":"TH Chen","year":"2010","unstructured":"Chen, T.H., Shih, W.K.: A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5), 704\u2013712 (2010)","journal-title":"ETRI J."},{"issue":"6","key":"4_CR3","doi-asserted-by":"publisher","first-page":"10081","DOI":"10.3390\/s140610081","volume":"14","author":"Y Choi","year":"2014","unstructured":"Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., Won, D.: Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6), 10081\u201310106 (2014)","journal-title":"Sensors"},{"issue":"3","key":"4_CR4","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086\u20131090 (2009)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"4","key":"4_CR5","first-page":"361","volume":"10","author":"D He","year":"2010","unstructured":"He, D., Gao, Y., Chan, S., Chen, C., Bu, J.: An enhanced two-factor user authentication scheme in wireless sensor networks. Ad hoc Sens. Wirel. Netw. 10(4), 361\u2013371 (2010)","journal-title":"Ad hoc Sens. Wirel. Netw."},{"issue":"2","key":"4_CR6","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s11277-013-1547-4","volume":"77","author":"WB Hsieh","year":"2014","unstructured":"Hsieh, W.B., Leu, J.S.: A robust user authentication scheme sing dynamic identity in wireless sensor networks. Wirel. Pers. Commun. 77(2), 979\u2013989 (2014)","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"4_CR7","doi-asserted-by":"publisher","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan, M.K., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3), 2450\u20132459 (2010)","journal-title":"Sensors"},{"issue":"177","key":"4_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). \nhttps:\/\/doi.org\/10.1007\/3-540-39799-X_31"},{"issue":"4","key":"4_CR10","doi-asserted-by":"publisher","first-page":"730831","DOI":"10.1155\/2013\/730831","volume":"9","author":"W Shi","year":"2013","unstructured":"Shi, W., Gong, P.: A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw. 9(4), 730831 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovi\u0107","year":"2014","unstructured":"Turkanovi\u0107, M., Brumen, B., H\u00f6lbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 20, 96\u2013112 (2014)","journal-title":"Ad Hoc Netw."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Vaidya, B., Makrakis, D., Mouftah, H.T.: Improved two-factor user authentication in wireless sensor networks. In: 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 600\u2013606. IEEE (2010)","DOI":"10.1109\/WIMOB.2010.5645004"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks, pp. 59\u201364. ACM (2004)","DOI":"10.1145\/1029102.1029113"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2006, vol. 1, pp. 244\u2013251. IEEE (2006)","DOI":"10.1109\/SUTC.2006.1636182"},{"issue":"1","key":"4_CR15","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s12652-016-0345-8","volume":"8","author":"F Wu","year":"2017","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J. Ambient Intell. Humaniz. Comput. 8(1), 101\u2013116 (2017)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.jnca.2016.12.008","volume":"89","author":"F Wu","year":"2017","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X., Shen, J., Choo, K.K.R., Wazid, M., Das, A.K.: An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89, 72\u201385 (2017)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"4_CR17","doi-asserted-by":"publisher","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"HL Yeh","year":"2011","unstructured":"Yeh, H.L., Chen, T.H., Liu, P.C., Kim, T.H., Wei, H.W.: A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 11(5), 4767\u20134779 (2011)","journal-title":"Sensors"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95165-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T10:36:53Z","timestamp":1530614213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-95165-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319951645","9783319951652"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95165-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}