{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:05:24Z","timestamp":1725505524657},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540785811"},{"type":"electronic","value":"9783540785828"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78582-8_86","type":"book-chapter","created":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T20:15:40Z","timestamp":1207080940000},"page":"850-857","source":"Crossref","is-referenced-by-count":5,"title":["Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards"],"prefix":"10.1007","author":[{"given":"Youngsook","family":"Lee","sequence":"first","affiliation":[]},{"given":"Junghyun","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"86_CR1","unstructured":"Anti-Phishing Working Group, \n                    \n                      http:\/\/www.antiphishing.org"},{"issue":"5","key":"86_CR2","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/49.223869","volume":"11","author":"R. Bird","year":"1993","unstructured":"Bird, R., Gopal, I., Herzberg, A., Janson, P.A., Kutten, S., Molva, R., Yung, M.: Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications\u00a011(5), 679\u2013693 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"86_CR3","doi-asserted-by":"crossref","unstructured":"Carlsen, U.: Cryptographic protocol flaws: know your enemy. In: Proceedings of the 7th IEEE Computer Security Foundations Workshop, pp. 192\u2013200 (1994)","DOI":"10.1109\/CSFW.1994.315934"},{"issue":"3","key":"86_CR4","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1049\/ip-e.1991.0022","volume":"138","author":"C.-C. Chang","year":"1991","unstructured":"Chang, C.-C., Wu, T.-C.: Remote password authentication with smart cards. IEE Proceedings E - Computers and Digital Techniques\u00a0138(3), 165\u2013168 (1991)","journal-title":"IEE Proceedings E - Computers and Digital Techniques"},{"issue":"4","key":"86_CR5","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"H.-Y. Chien","year":"2002","unstructured":"Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: An efficient and practical solution to remote authentication: smart card. Computers & Security\u00a021(4), 372\u2013375 (2002)","journal-title":"Computers & Security"},{"issue":"2","key":"86_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchange. Designs, Codes and Cryptography\u00a02(2), 107\u2013125 (1992)","journal-title":"Designs, Codes and Cryptography"},{"issue":"3","key":"86_CR7","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/S0920-5489(03)00094-1","volume":"26","author":"C.-L. Hsu","year":"2004","unstructured":"Hsu, C.-L.: Security of Chien et al.\u2019s remote user authentication scheme using smart cards. Computer Standards and Interfaces\u00a026(3), 167\u2013169 (2004)","journal-title":"Computer Standards and Interfaces"},{"issue":"1","key":"86_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M.-S. Hwang","year":"2000","unstructured":"Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme using smart cards. IEEE Trans.\u00a0on Consumer Electronics\u00a046(1), 28\u201330 (2000)","journal-title":"IEEE Trans.\u00a0on Consumer Electronics"},{"key":"86_CR9","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/S0895-7177(02)00106-1","volume":"36","author":"M.-S. Hwang","year":"2002","unstructured":"Hwang, M.-S., Li, L.-H., Tang, Y.-L.: A simple remote user authentication. Mathematical and Computer Modelling\u00a036, 103\u2013107 (2002)","journal-title":"Mathematical and Computer Modelling"},{"key":"86_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO 1999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"8","key":"86_CR11","doi-asserted-by":"publisher","first-page":"3451","DOI":"10.1093\/ietcom\/e88-b.8.3451","volume":"E88-B","author":"W.-C. Ku","year":"2005","unstructured":"Ku, W.-C., Chang, S.-T., Chiang, M.-H.: Weaknesses of a remote user authentication scheme using smart cards for multi-server architecture. IEICE Trans.\u00a0on Commmunications\u00a0E88-B(8), 3451\u20133454 (2005)","journal-title":"IEICE Trans.\u00a0on Commmunications"},{"issue":"11","key":"86_CR12","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"86_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/11915034_74","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"Y. Lee","year":"2006","unstructured":"Lee, Y., Nam, J., Won, D.: Security enhancement of a remote user authentication scheme using smart cards. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol.\u00a04277, pp. 508\u2013516. Springer, Heidelberg (2006)"},{"issue":"3","key":"86_CR14","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters\u00a056(3), 131\u2013133 (1995)","journal-title":"Information Processing Letters"},{"issue":"5","key":"86_CR15","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.-S. Messerges","year":"2002","unstructured":"Messerges, T.-S., Dabbish, E.-A., Sloan, R.-H.: Examining smart card security under the threat of power analysis attacks. IEEE Trans. on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. on Computers"},{"issue":"1","key":"86_CR16","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1093\/ietfec\/e90-a.1.299","volume":"E90-A","author":"J. Nam","year":"2007","unstructured":"Nam, J., Kim, S., Park, S., Won, D.: Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Trans.\u00a0on Fundamentals of Electronics, Communications and Computer Sciences\u00a0E90-A(1), 299\u2013302 (2007)","journal-title":"IEICE Trans.\u00a0on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"4","key":"86_CR17","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H.-M. Sun","year":"2000","unstructured":"Sun, H.-M.: An efficient remote user authentication scheme using smart cards. IEEE Trans.\u00a0on Consumer Electronics\u00a046(4), 958\u2013961 (2000)","journal-title":"IEEE Trans.\u00a0on Consumer Electronics"},{"issue":"8","key":"86_CR18","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/S0167-4048(99)80136-9","volume":"18","author":"W.-H. Yang","year":"1999","unstructured":"Yang, W.-H., Shieh, S.-P.: Password authentication schemes with smart card. Computers & Security\u00a018(8), 727\u2013733 (1999)","journal-title":"Computers & Security"},{"key":"86_CR19","series-title":"Lecture Notes in Computer Science","first-page":"90","volume-title":"Trust, Privacy, and Security in Digital Business","author":"E.-J. Yoon","year":"2005","unstructured":"Yoon, E.-J., Kim, W.-H., Yoo, K.-Y.: Security enhancement for password authentication schemes with smart cards. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol.\u00a03592, pp. 90\u201399. Springer, Heidelberg (2005)"},{"issue":"1","key":"86_CR20","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.cose.2004.06.004","volume":"24","author":"E.-J. Yoon","year":"2005","unstructured":"Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: An improvement of Hwang-Lee-Tang\u2019s simple remote user authentication scheme. Computers & Security\u00a024(1), 50\u201356 (2005)","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Agent and Multi-Agent Systems: Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78582-8_86.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:14:27Z","timestamp":1619522067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78582-8_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540785811","9783540785828"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78582-8_86","relation":{},"subject":[]}}