{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:48:57Z","timestamp":1742921337446,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642217920"},{"type":"electronic","value":"9783642217937"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21793-7_36","type":"book-chapter","created":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T14:48:21Z","timestamp":1309099701000},"page":"321-329","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment"],"prefix":"10.1007","author":[{"given":"Youngsook","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jeeyeon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","volume-title":"Proceeding of the International Conference on Cyberworlds","author":"C. Chang","year":"2004","unstructured":"Chang, C., Lee, J.S.: An efficient and secure multi-server password authentication scheme using smart cards. In: Proceeding of the International Conference on Cyberworlds, IEEE, Los Alamitos (2004)"},{"key":"36_CR2","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","volume":"31","author":"H.-C. Hsiang","year":"2009","unstructured":"Hsiang, H.-C., Shih, W.-K.: Improvement of the secure dynamic Id based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces\u00a031, 1118\u20131123 (2009)","journal-title":"Computer Standards & Interfaces"},{"issue":"1","key":"36_CR3","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"W.S. Juang","year":"2004","unstructured":"Juang, W.S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. Consum. Electron.\u00a050(1), 251\u2013255 (2004)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"36_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"6","key":"36_CR5","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"L.-H. Li","year":"2001","unstructured":"Li, L.-H., Lin, I.-C., Hwang, M.-S.: A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans.\u00a0on Neural Networks\u00a012(6), 1498\u20131504 (2001)","journal-title":"IEEE Trans.\u00a0on Neural Networks"},{"key":"36_CR6","unstructured":"Liao, Y.-P., Wang, S.-S.: A secure dynamic ID based remote user authentication scheme for multi-server environment, Computer Standards & Interfaces (2007) (article in press)"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","volume":"19","author":"I.-C. Lin","year":"2003","unstructured":"Lin, I.-C., Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme for multi-server internet environments. Future Generation Computer System\u00a019, 13\u201322 (2003)","journal-title":"Future Generation Computer System"},{"issue":"5","key":"36_CR8","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messergers","year":"2002","unstructured":"Messergers, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart card security under the threat of power analysis attacks. IEEE Trans. Comput.\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"36_CR9","first-page":"258","volume":"170","author":"W.-J. Tsuar","year":"2005","unstructured":"Tsuar, W.-J.: An enhanced user authentication scheme for multi-server internet services. Appl. Math. Comput.\u00a0170, 258\u2013266 (2005)","journal-title":"Appl. Math. Comput."},{"key":"36_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-47728-4_18","volume-title":"Networking - ICN 2001","author":"W.-J. Tsuar","year":"2001","unstructured":"Tsuar, W.-J., Wu, C.-C., Lee, W.-B.: A flexible user authentication scheme for multi-server internet services. In: Lorenz, P. (ed.) ICN 2001. LNCS, vol.\u00a02093, pp. 174\u2013183. Springer, Heidelberg (2001)"},{"key":"36_CR11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.csi.2004.03.004","volume":"27","author":"W.-J. Tsaur","year":"2004","unstructured":"Tsaur, W.-J., Wu, C.-C., Lee, W.-B.: A smart card-based remote scheme for password authentication in multi-server Internet services. Computer Standards & Interfaces\u00a027, 39\u201351 (2004)","journal-title":"Computer Standards & Interfaces"},{"issue":"2","key":"36_CR12","first-page":"149","volume":"4","author":"X. Tian","year":"2007","unstructured":"Tian, X., Zhu, R.W., Wong, D.S.: Improved efficient remote user authentication schemes. Int. J. Netw. Secur.\u00a04(2), 149\u2013154 (2007)","journal-title":"Int. J. Netw. Secur."},{"issue":"8","key":"36_CR13","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1016\/j.cose.2004.08.005","volume":"23","author":"Y. Yang","year":"2004","unstructured":"Yang, Y., Wang, S., Bao, F., Wang, J., Deng, R.: New efficient user identification and key distribution scheme providing enhanced security. Comput. Secur.\u00a023(8), 697\u2013704 (2004)","journal-title":"Comput. Secur."}],"container-title":["Lecture Notes in Computer Science","Human Interface and the Management of Information. Interacting with Information"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21793-7_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T22:47:18Z","timestamp":1582411638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21793-7_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642217920","9783642217937"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21793-7_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}