{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:30:14Z","timestamp":1743006614434,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221903"},{"type":"electronic","value":"9783642221910"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22191-0_38","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:22:53Z","timestamp":1309220573000},"page":"437-447","source":"Crossref","is-referenced-by-count":2,"title":["Remote User Authentication Scheme with Hardware-Based Attestation"],"prefix":"10.1007","author":[{"given":"Fazli Bin","family":"Mat Nor","sequence":"first","affiliation":[]},{"given":"Kamarularifin","family":"Abd Jalil","sequence":"additional","affiliation":[]},{"given":"Jamalul-lail","family":"Ab Manan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"38_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"38_CR2","unstructured":"Wu, T.: The Secure Remote Password protocol. In: Internet Society Network and Distributed Systems Security Symposium (NDSS), San Diego, pp. 97\u2013111 (1998)"},{"key":"38_CR3","first-page":"120","volume":"7","author":"W.S. Juang","year":"2008","unstructured":"Juang, W.S., Wu, J.L.: Efficient user authentication and key agreement with user privacy protection. International Journal of Network Security\u00a07, 120\u2013129 (2008)","journal-title":"International Journal of Network Security"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, L., Zhang, Z.: Trusted channels with password-based authentication and TPM-based attestation. In: International Conference on Communications and Mobile Computing, pp. 223\u2013227 (2010)","DOI":"10.1109\/CMC.2010.232"},{"issue":"1","key":"38_CR5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/LCOMM.2003.822506","volume":"8","author":"M. Zhang","year":"2004","unstructured":"Zhang, M.: Analysis of the SPEKE password-authenticated key exchange protocol. IEEE Communications Letters\u00a08(1), 63\u201365 (2004)","journal-title":"IEEE Communications Letters"},{"key":"38_CR6","unstructured":"Ali, T.: Incorporating remote attestation for end-to-end protection in web communication paradigm. In: International Conference on Internet Technologies and Applications, Wales, UK (2009)"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, S., Bing, L., Yang, X., Yixian, Y., Zhongxian, L., Han, Y.: A security-enhanced remote platform integrity attestation scheme. In: Wireless Communications, Networking and Mobile Computing (WiCom 2009), vol.\u00a04, pp. 24\u201326 (2009)","DOI":"10.1109\/WICOM.2009.5302068"},{"key":"38_CR8","unstructured":"Stumpf, F., Tafreschi, O., R\u00f6der, P., Eckert, C.: A robust integrity reporting protocol for remote attestation. In: Proceedings of the Workshop on Advances in Trusted Computing, WATC (2006)"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. SIGCOMM Computing Communication\u00a026(5) (1996)","DOI":"10.1145\/242896.242897"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Hu, L., Yang, Y., Niu, X.: Improved remote user authentication scheme preserving user anonymity. In: Communication Networks and Services Research (CNSR 2007), pp. 323\u2013328 (2007)","DOI":"10.1109\/CNSR.2007.38"},{"issue":"1","key":"38_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"Y.P. Liao","year":"2009","unstructured":"Liao, Y.P., Wang, S.-S.: A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces\u00a031(1), 24\u201329 (2009)","journal-title":"Computer Standards & Interfaces"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Chien, H.-Y., Chen, C.-H.: A remote authentication scheme preserving user anonymity. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), Washington, USA, vol.\u00a02, pp. 245\u2013248 (2005)","DOI":"10.1109\/AINA.2005.54"},{"key":"38_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/11814856_45","volume-title":"Wireless Algorithms, Systems, and Applications","author":"Z. Chai","year":"2006","unstructured":"Chai, Z., Cao, Z.-F., Lu, R.: Efficient password-based authentication and key exchange scheme preserving user privacy. In: Cheng, X., Li, W., Znati, T. (eds.) WASA 2006. LNCS, vol.\u00a04138, pp. 467\u2013477. Springer, Heidelberg (2006)"},{"key":"38_CR14","unstructured":"Trusted Computing Group: TCG specification architecture overview, specification revision 1.4 (2007)"},{"key":"38_CR15","unstructured":"TrustedGrub, http:\/\/www.sirrix.com\/content\/pages\/trustedgrub.htm"},{"key":"38_CR16","unstructured":"Kinney, S.: Trusted Platform Module Basics: Using TPM in Embedded System. NEWNES (2006)"},{"key":"38_CR17","unstructured":"Challener, D., Yoder, K., Catherman, R., Safford, D., Doorn, L.V.: A Practical Guide to Trusted Computing. IBM Press (2008)"},{"key":"38_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-77566-9_9","volume-title":"SOFSEM 2008: Theory and Practice of Computer Science","author":"A.-R. Sadeghi","year":"2008","unstructured":"Sadeghi, A.-R.: Trusted Computing \u2014 Special Aspects and Challenges. In: Geffert, V., Karhum\u00e4ki, J., Bertoni, A., Preneel, B., N\u00e1vrat, P., Bielikov\u00e1, M. (eds.) SOFSEM 2008. LNCS, vol.\u00a04910, pp. 98\u2013117. Springer, Heidelberg (2008)"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22191-0_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T19:23:31Z","timestamp":1741289011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22191-0_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221903","9783642221910"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22191-0_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}