{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T19:40:28Z","timestamp":1739216428030,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642024566"},{"type":"electronic","value":"9783642024573"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02457-3_16","type":"book-chapter","created":{"date-parts":[[2009,7,7]],"date-time":"2009-07-07T13:54:56Z","timestamp":1246974896000},"page":"182-190","source":"Crossref","is-referenced-by-count":3,"title":["Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments"],"prefix":"10.1007","author":[{"given":"Wansuck","family":"Yi","sequence":"first","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"16_CR1","first-page":"15","volume":"1","author":"A.K. Awashti","year":"2004","unstructured":"Awashti, A.K.: Comment on a dynamic ID-based remote user authentication scheme. Transactions on Cryptology\u00a01(2), 15\u201316 (2004)","journal-title":"Transactions on Cryptology"},{"doi-asserted-by":"crossref","unstructured":"Chien, H.Y., Chen, C.H.: A remote authentication scheme preserving user anonymity. In: Intl. Conf. on AINA 2005, vol.\u00a02, pp. 245\u2013248 (March 2005)","key":"16_CR2","DOI":"10.1109\/AINA.2005.54"},{"issue":"3","key":"16_CR3","doi-asserted-by":"crossref","first-page":"289","DOI":"10.15388\/Informatica.2003.022","volume":"14","author":"C.C. Chang","year":"2003","unstructured":"Chang, C.C., Hwang, K.F.: Some forgery attacks on a remote user authentication scheme using smart cards. Informatics\u00a014(3), 289\u2013294 (2003)","journal-title":"Informatics"},{"issue":"2","key":"16_CR4","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M.L. Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics\u00a050(2), 629\u2013631 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"8","key":"16_CR5","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.cose.2005.03.006","volume":"24","author":"C.I. Fan","year":"2005","unstructured":"Fan, C.I., Chan, Y.C., Zhang, Z.K.: Robust remote authentication scheme with smart cards. Computers & Security\u00a024(8), 619\u2013628 (2005)","journal-title":"Computers & Security"},{"issue":"4","key":"16_CR6","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. Gamal El","year":"1985","unstructured":"El Gamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"16_CR7","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/S0920-5489(03)00094-1","volume":"26","author":"C.L. Hsu","year":"2004","unstructured":"Hsu, C.L.: Security of Chien et al.\u2019s remote user authentication scheme using smart cards. Computer Standards and Interfaces\u00a026(3), 167\u2013169 (2004)","journal-title":"Computer Standards and Interfaces"},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M..S. Hwang","year":"2000","unstructured":"Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a046(1), 28\u201330 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"16_CR9","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1109\/TCE.2004.1309433","volume":"50","author":"M. Kumar","year":"2004","unstructured":"Kumar, M.: New remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a050(2), 597\u2013600 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"5","key":"16_CR10","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1093\/ietcom\/e88-b.5.2165","volume":"E88-B","author":"W.C. Ku","year":"2005","unstructured":"Ku, W.C., Chang, S.T.: Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Transactions on Communication\u00a0E88-B(5), 2165\u20132167 (2005)","journal-title":"IEICE Transactions on Communication"},{"doi-asserted-by":"crossref","unstructured":"Ku, W.C., Chang, S.T., Chiang, M.H.: Further cryptanalysis of fingerprint based remote user authentication scheme using smart cards. IEE Electronics Letters\u00a041(5) (2005)","key":"16_CR11","DOI":"10.1049\/el:20047658"},{"issue":"1","key":"16_CR12","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.csi.2006.01.002","volume":"29","author":"M.K. Khan","year":"2007","unstructured":"Khan, M.K., Zhang, J.: Improving the security of a exible biometrics remote user authentication scheme. Computer Standards & Interfaces\u00a029(1), 82\u201385 (2007)","journal-title":"Computer Standards & Interfaces"},{"issue":"11","key":"16_CR13","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"issue":"4","key":"16_CR14","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1109\/TCE.2003.1261224","volume":"49","author":"K.C. Leung","year":"2003","unstructured":"Leung, K.C., Cheng, L.M., Fong, A.S., Chan, C.K.: Cryptanalysis of a modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a049(4), 1243\u20131245 (2003)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"3","key":"16_CR15","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/567331.567335","volume":"36","author":"C.C. Lee","year":"2002","unstructured":"Lee, C.C., Hwang, M.S., Yang, W.P.: A flexible remote user authentication scheme using smart cards. ACM Operating Systems Review\u00a036(3), 46\u201352 (2002)","journal-title":"ACM Operating Systems Review"},{"issue":"1","key":"16_CR16","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"C.H. Lin","year":"2004","unstructured":"Lin, C.H., Lai, Y.Y.: A flexible biometrics remote user authentication scheme. Computer Standard and Interfaces\u00a027(1), 19\u201323 (2004)","journal-title":"Computer Standard and Interfaces"},{"issue":"12","key":"16_CR17","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"J.K. Lee","year":"2002","unstructured":"Lee, J.K., Ryu, S.R., Yoo, K.Y.: Fingerprint-based remote user authentication scheme using smart cards. IEE Electronics Letters\u00a038(12), 554\u2013555 (2002)","journal-title":"IEE Electronics Letters"},{"issue":"4","key":"16_CR18","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H.M. Sun","year":"2000","unstructured":"Sun, H.M.: An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a046(4), 958\u2013961 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"16_CR19","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/TCE.2003.1209534","volume":"49","author":"J.J. Shen","year":"2003","unstructured":"Shen, J.J., Lin, C.W., Hwang, M.S.: A modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a049(2), 414\u2013416 (2003)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"16_CR20","first-page":"1412","volume":"E86-B","author":"H.M. Sun","year":"2003","unstructured":"Sun, H.M., Yeh, H.T.: Further cryptanalysis of a password authentication scheme with smart cards. IEICE Transactions and Communications\u00a0E86-B (4), 1412\u20131415 (2003)","journal-title":"IEICE Transactions and Communications"},{"issue":"3","key":"16_CR21","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/0167-4048(96)00005-3","volume":"15","author":"S.J. Wang","year":"1996","unstructured":"Wang, S.J., Chang, J.F.: Smart card based secure password authentication scheme. Computers & Security\u00a015(3), 231\u2013237 (1996)","journal-title":"Computers & Security"},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.cose.2004.06.004","volume":"24","author":"E.J. Yoon","year":"2005","unstructured":"Yoon, E.J., Ryu, E.K., Yoo, K.Y.: An improvement of Hwang-Lee-Tang\u2019s simple remote user authentication scheme. Computers & Security\u00a024, 50\u201356 (2005)","journal-title":"Computers & Security"},{"issue":"8","key":"16_CR23","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/S0167-4048(99)80136-9","volume":"18","author":"W.H. Yang","year":"1999","unstructured":"Yang, W.H., Shieh, S.P.: Password authentication schemes with smart cards. Computers & Security\u00a018(8), 727\u2013733 (1999)","journal-title":"Computers & Security"},{"key":"16_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/11780991_32","volume-title":"Next Generation Information Technologies and Systems","author":"E.J. Yoon","year":"2006","unstructured":"Yoon, E.J., Yoo, K.Y.: Biometrics Authenticated Key Agreement Scheme. In: Etzion, O., Kuflik, T., Motro, A. (eds.) NGITS 2006. LNCS, vol.\u00a04032, pp. 345\u2013349. Springer, Heidelberg (2006)"},{"issue":"2","key":"16_CR25","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/TCE.2004.1309428","volume":"50","author":"C.C. Yang","year":"2004","unstructured":"Yang, C.C., Yang, H.W., Wang, R.C.: Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a050(2), 578\u2013579 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"16_CR26","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"unstructured":"Guthery, S.B., Jurgensen, T.M.: SmartCard Developer\u2019s Kit. Macmillan Technical Publishing (1998) ISBN 1\u201357870\u2013027\u20132","key":"16_CR27"},{"key":"16_CR28","volume-title":"Smart Card Handbook","author":"W. Rankl","year":"1997","unstructured":"Rankl, W., Effing, W.: Smart Card Handbook. John Wiley & Sons, Chichester (1997)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02457-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,10]],"date-time":"2025-02-10T19:26:37Z","timestamp":1739215597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02457-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642024566","9783642024573"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02457-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}