{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:13:20Z","timestamp":1758845600346,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77090-9_67","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T17:19:26Z","timestamp":1196097566000},"page":"728-744","source":"Crossref","is-referenced-by-count":5,"title":["A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem"],"prefix":"10.1007","author":[{"given":"Ren-Chiun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Wen-Shenq","family":"Juang","sequence":"additional","affiliation":[]},{"given":"Chin-Laung","family":"Lei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","unstructured":"Advanced Encryption Standard, http:\/\/csrc.nist.gov\/encryption\/aes\/"},{"key":"67_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated and key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"67_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/11426639_3","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"E. Biham","year":"2005","unstructured":"Biham, E., Chen, R., Joux, A., Carribault, P., Jalby, W., Lemuet, C.: Collisions in SHA-0 and reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 36\u201357. Springer, Heidelberg (2005)"},{"issue":"1","key":"67_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems (TOCS)\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n, L., Staamann, S., Wilhelm, U.: A simple logic for authentication protocol design. In: Proc. of 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, pp. 153\u2013162 (1998)","DOI":"10.1109\/CSFW.1998.683165"},{"issue":"2","key":"67_CR6","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1016\/j.amc.2004.11.004","volume":"169","author":"Y.-C. Chen","year":"2005","unstructured":"Chen, Y.-C., Yeh, L.-Y.: An efficient nonce-based authentication with key agreement. Applied Mathematics and Computation\u00a0169(2), 982\u2013994 (2005)","journal-title":"Applied Mathematics and Computation"},{"issue":"1","key":"67_CR7","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1093\/comjnl\/bxh061","volume":"48","author":"H.-Y. Chien","year":"2005","unstructured":"Chien, H.-Y., Wang, R.-C., Yang, C.-C.: Note on robust and simple authentication protocol. The Computer Journal\u00a048(1), 27\u201329 (2005)","journal-title":"The Computer Journal"},{"key":"67_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. on Information Theory\u00a0IT-22, 644\u2013654 (1976)","journal-title":"IEEE Trans. on Information Theory"},{"issue":"4","key":"67_CR9","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/219282.219298","volume":"29","author":"Y. Ding","year":"1995","unstructured":"Ding, Y., Horster, P.: Undetected on-line password guessing attacks. ACM Operating Systems Review\u00a029(4), 77\u201386 (1995)","journal-title":"ACM Operating Systems Review"},{"key":"67_CR10","series-title":"Lecture Notes in Computer Science","first-page":"527","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"H. Eberle","year":"1993","unstructured":"Eberle, H.: A high-speed DES implement for network applications. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 527\u2013545. Springer, Heidelberg (1993)"},{"key":"67_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Information Theory\u00a0IT-31, 469\u2013472 (1985)","journal-title":"IEEE Trans. on Information Theory"},{"key":"67_CR12","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.cose.2005.03.006","volume":"24","author":"C.-I. Fan","year":"2005","unstructured":"Fan, C.-I, Chan, Y.-C., Zhang, Z.-K.: Robust remote authentication scheme with smart cards. Computers & Security\u00a024, 619\u2013628 (2005)","journal-title":"Computers & Security"},{"issue":"9","key":"67_CR13","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1049\/el:19960545","volume":"32","author":"C.-I. Fan","year":"1996","unstructured":"Fan, C.-I., Lei, C.-L.: Efficient blind signature schemes based on quadratic residues. IEE Electronics Letters\u00a032(9), 811\u2013813 (1996)","journal-title":"IEE Electronics Letters"},{"key":"67_CR14","doi-asserted-by":"crossref","unstructured":"Ghanem, S.M., Wahah, H.A.: A simple XOR-based technique for distributing group key secure multicasting. In: Proc. of 5th IEEE Symposium on Computers and Communications, pp. 166\u2013171 (2000)","DOI":"10.1109\/ISCC.2000.860634"},{"issue":"1","key":"67_CR15","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"W.-S. Juang","year":"2004","unstructured":"Juang, W.-S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. on Consumer Electronics\u00a050(1), 251\u2013255 (2004)","journal-title":"IEEE Trans. on Consumer Electronics"},{"key":"67_CR16","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.cose.2003.11.005","volume":"23","author":"W.-S. Juang","year":"2004","unstructured":"Juang, W.-S.: Efficient password authenticated key agreement using smart cards. Computers & Security\u00a023, 167\u2013173 (2004)","journal-title":"Computers & Security"},{"issue":"2","key":"67_CR17","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/TCE.2004.1309439","volume":"50","author":"W.-S. Juang","year":"2004","unstructured":"Juang, W.-S.: Efficient three-party key exchange using smart cards. IEEE Trans. on Consumer Electronics\u00a050(2), 619\u2013624 (2004)","journal-title":"IEEE Trans. on Consumer Electronics"},{"key":"67_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/11751632_43","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"W.-S. Juang","year":"2006","unstructured":"Juang, W.-S.: Efficient User Authentication and Key Agreement in Ubiquitous Computing. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagan\u00e0, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol.\u00a03983, pp. 396\u2013405. Springer, Heidelberg (2006)"},{"issue":"5","key":"67_CR19","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1093\/ietcom\/e88-b.5.2165","volume":"E88-B","author":"W.-C. Ku","year":"2005","unstructured":"Ku, W.-C., Chang, S.-T.: Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Trans. on communications\u00a0E88-B(5), 2165\u20132167 (2005)","journal-title":"IEICE Trans. on communications"},{"issue":"8","key":"67_CR20","first-page":"2374","volume":"E87-B","author":"W.-C. Ku","year":"2004","unstructured":"Ku, W.-C., Tsai, H.-C., Tsaur, M.-J.: Stolen-verifier attack on an efficient smart card-based one-time password authentication scheme. IEICE Trans. on communications\u00a0E87-B(8), 2374\u20132376 (2004)","journal-title":"IEICE Trans. on communications"},{"key":"67_CR21","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024, 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"67_CR22","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.mcm.2006.01.015","volume":"44","author":"H.-T. Liaw","year":"2006","unstructured":"Liaw, H.-T., Lin, J.-F., Wu, W.-C.: An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling\u00a044, 223\u2013228 (2006)","journal-title":"Mathematical and Computer Modelling"},{"issue":"12","key":"67_CR23","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1093\/ietcom\/e89-b.12.3425","volume":"E89-B","author":"C.-L. Lin","year":"2006","unstructured":"Lin, C.-L., Hung, C.-P.: Impersonation attack on two-gene-relation password authentication protocol 2GR. IEICE Trans. on communications\u00a0E89-B(12), 3425\u20133427 (2006)","journal-title":"IEICE Trans. on communications"},{"issue":"4","key":"67_CR24","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1134\/S1064230706040137","volume":"45","author":"C.-W. Lin","year":"2006","unstructured":"Lin, C.-W., Tsai, C.-S., Hwang, M.-S.: A new strong-password authenticaton scheme using one-way hash functions. International Journal of Computer and Systems Sciences\u00a045(4), 623\u2013626 (2006)","journal-title":"International Journal of Computer and Systems Sciences"},{"key":"67_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: One-way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 428\u2013446. Springer, Heidelberg (1990)"},{"key":"67_CR26","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1016\/j.comcom.2005.07.025","volume":"29","author":"M. Peyravian","year":"2006","unstructured":"Peyravian, M., Jeffries, C.: Secure remote user access over insecure networks. Computers Communications\u00a029, 660\u2013667 (2006)","journal-title":"Computers Communications"},{"key":"67_CR27","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signature and public key cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"67_CR28","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.cose.2005.09.008","volume":"25","author":"W.-G. Shieh","year":"2006","unstructured":"Shieh, W.-G., Wang, J.-M.: Efficient remote mutual authentication and key agreement. Computers & Security\u00a025, 72\u201377 (2006)","journal-title":"Computers & Security"},{"key":"67_CR29","first-page":"1682","volume":"E86-B","author":"W.-C. Ku","year":"2003","unstructured":"Ku, W.-C., Chen, C.-M., Lee, H.-L.: Cryptanalysis of a variant of Peyravian-Zunic\u2019s password authentication scheme. IEICE Trans. on Communications\u00a0E86-B, 1682\u20131684 (2003)","journal-title":"IEICE Trans. on Communications"},{"issue":"1","key":"67_CR30","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"W.-C. Ku","year":"2004","unstructured":"Ku, W.-C., Chen, S.-M.: Weakness and improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics\u00a050(1), 204\u2013207 (2004)","journal-title":"IEEE Trans. on Consumer Electronics"},{"issue":"5","key":"67_CR31","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart card security under the threat of power analysis attacks. IEEE Trans. on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. on Computers"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77090-9_67.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T22:20:33Z","timestamp":1737584433000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77090-9_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770893"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77090-9_67","relation":{},"subject":[]}}