{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:00:46Z","timestamp":1742392846842},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735465"},{"type":"electronic","value":"9783540735472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73547-2_32","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:54:52Z","timestamp":1186844092000},"page":"306-312","source":"Crossref","is-referenced-by-count":6,"title":["Novel Remote User Authentication Scheme Using Bilinear Pairings"],"prefix":"10.1007","author":[{"given":"Chen","family":"Yang","sequence":"first","affiliation":[]},{"given":"Wenping","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xinmei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"32_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password Authentication within Secure Communication. Communications of ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of ACM"},{"issue":"4","key":"32_CR2","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/583800.583803","volume":"36","author":"C.C. Lee","year":"2002","unstructured":"Lee, C.C., Li, L.H., Hwang, M.S.: A Remote User Authentication Scheme Using Hash Functions. ACM Operating Systems Review\u00a036(4), 23\u201329 (2002)","journal-title":"ACM Operating Systems Review"},{"issue":"1","key":"32_CR3","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/974104.974107","volume":"38","author":"W.C. Ku","year":"2004","unstructured":"Ku, W.C.: A Hash-based Strong-password Authentication Scheme without Using Smart Cards. ACM Operation Systems Review\u00a038(1), 29\u201334 (2004)","journal-title":"ACM Operation Systems Review"},{"issue":"1","key":"32_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M.S. Hwang","year":"2000","unstructured":"Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme Using Smart Card. IEEE Trans. on Consumer Electronics\u00a046(1), 28\u201330 (2000)","journal-title":"IEEE Trans. on Consumer Electronics"},{"issue":"2","key":"32_CR5","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/TCE.2003.1209534","volume":"49","author":"J.J. Shen","year":"2003","unstructured":"Shen, J.J., Lin, C.W., Hwang, M.S.: A Modified Remote User Authentication Scheme Using Smart Cards. IEEE Trans. on Consumer Electronics\u00a049(2), 414\u2013416 (2003)","journal-title":"IEEE Trans. on Consumer Electronics"},{"issue":"4","key":"32_CR6","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/TCE.2003.1261225","volume":"49","author":"K. Amit","year":"2003","unstructured":"Amit, K., Sunder, L.: A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy. IEEE Trans. on Consumer Electronics\u00a049(4), 1246\u20131248 (2003)","journal-title":"IEEE Trans. on Consumer Electronics"},{"issue":"6","key":"32_CR7","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/S0167-4048(03)00616-3","volume":"22","author":"S.T. Wu","year":"2003","unstructured":"Wu, S.T., Chieu, B.C.: A User Friendly Remote Authentication Scheme with Smart Cards. Computers & Security\u00a022(6), 547\u2013550 (2003)","journal-title":"Computers & Security"},{"issue":"2","key":"32_CR8","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TCE.2004.1309425","volume":"50","author":"E.J. Yoon","year":"2004","unstructured":"Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Efficient Remote User Authentication Scheme based on Generalized ElGamal Signature Scheme. IEEE Trans. on Consumer Electronics\u00a050(2), 568\u2013570 (2004)","journal-title":"IEEE Trans. on Consumer Electronics"},{"key":"32_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based Encryption from the Weil Pairing, 2001. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.cose.2005.09.002","volume":"25","author":"M.L. Das","year":"2006","unstructured":"Das, M.L., Ashutosh, S., Gulati, V.P., Phatak, D.B.: A Novel Remote User Authentication Scheme Using Bilinear Pairings. Computer & Security\u00a025, 184\u2013189 (2006)","journal-title":"Computer & Security"},{"key":"32_CR11","unstructured":"Chou, J.S., Chen, Y., Lin, J.Y.: Improvement of Manik et al.\u2019s Remote User Authentication Scheme. \n                    \n                      http:\/\/eprint.iacr.org\/2005\/450.pdf"},{"key":"32_CR12","unstructured":"Thulasi, G., Das, M.L., Ashutosh, S.: Cryptoanalysis of Recently Proposed Remote User Authentication Scheme. \n                    \n                      http:\/\/eprint.iacr.org\/2006\/028.pdf"},{"key":"32_CR13","unstructured":"Fang,G., Huang,G.: Improved of Recently Proposed Remote User Authentication Schemes. \n                    \n                      http:\/\/eprint.iacr.org\/2006\/200.pdf"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73547-2_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:15:56Z","timestamp":1605762956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73547-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735465","9783540735472"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73547-2_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}