{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:44:59Z","timestamp":1725597899146},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227134"},{"type":"electronic","value":"9783642227141"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22714-1_65","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T12:01:51Z","timestamp":1311595311000},"page":"628-635","source":"Crossref","is-referenced-by-count":6,"title":["Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment"],"prefix":"10.1007","author":[{"given":"S. K.","family":"Hafizul Islam","sequence":"first","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature protocol based on discrete logarithms. IEEE Trans. on Info.\u00a031, 469\u2013472 (1985)","journal-title":"IEEE Trans. on Info."},{"issue":"2","key":"65_CR2","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Comm. of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Comm. of the ACM"},{"key":"65_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"issue":"177","key":"65_CR4","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystem. J. of Math. of Comp.\u00a048(177), 203\u2013209 (1987)","journal-title":"J. of Math. of Comp."},{"issue":"3","key":"65_CR5","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.cose.2005.09.002","volume":"25","author":"M.L. Das","year":"2006","unstructured":"Das, M.L., Saxena, A., Gulati, V.P., Phatak, D.B.: A novel remote client authentication protocol using bilinear pairings. Comp. & Secu.\u00a025(3), 184\u2013189 (2006)","journal-title":"Comp. & Secu."},{"issue":"2","key":"65_CR6","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M.L. Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Trans. on Cons. Elec.\u00a050(2), 629\u2013631 (2004)","journal-title":"IEEE Trans. on Cons. Elec."},{"key":"65_CR7","unstructured":"Chou, J.S., Chen, Y., Lin, J.Y.: Improvement of Das et al.\u2019s remote user authentication scheme (2005), http:\/\/eprint.iacr.org\/2005\/450.pdf"},{"key":"65_CR8","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.csi.2007.11.016","volume":"31","author":"T. Goriparthi","year":"2009","unstructured":"Goriparthi, T., Das, M.L., Saxena, A.: An improved bilinear pairing based remote user authentication scheme. Comp. Stan. & Inte.\u00a031, 181\u2013185 (2009)","journal-title":"Comp. Stan. & Inte."},{"issue":"2","key":"65_CR9","doi-asserted-by":"crossref","first-page":"285","DOI":"10.15388\/Informatica.2008.214","volume":"19","author":"Y.M. Tseng","year":"2008","unstructured":"Tseng, Y.M., Wu, T.Y., Wu, J.D.: A pairing-based client authentication protocol for wireless clients with smart cards. Informatica\u00a019(2), 285\u2013302 (2008)","journal-title":"Informatica"},{"key":"65_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"65_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"65_CR12","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"Y.Y. Wang","year":"2009","unstructured":"Wang, Y.Y., Kiu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Comp. Comm.\u00a032, 583\u2013585 (2009)","journal-title":"Comp. Comm."},{"issue":"3","key":"65_CR13","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"M.K. Khan","year":"2011","unstructured":"Khan, M.K.: Cryptanalysis and security enhancement of a \u2018more efficient & secure dynamic ID-based remote user authentication scheme\u2019. Comp. Comm.\u00a034(3), 305\u2013309 (2011)","journal-title":"Comp. Comm."},{"issue":"3","key":"65_CR14","first-page":"138","volume":"28","author":"J.H. Yang","year":"2011","unstructured":"Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comp. & Secu.\u00a028(3), 138\u2013143 (2011)","journal-title":"Comp. & Secu."},{"key":"65_CR15","doi-asserted-by":"crossref","unstructured":"Yoon, E., Yoo, K.: Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: 2009 International Conference on Computational Science and Engineering, Vancouver, Canada, pp. 633\u2013640 (2009)","DOI":"10.1109\/CSE.2009.363"},{"key":"65_CR16","doi-asserted-by":"crossref","unstructured":"Chen, T.H., Chen, Y.C., Shih, W.K.: An Advanced ECC ID-Based remote mutual authentication scheme for mobile devices. In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 116\u2013120 (2010)","DOI":"10.1109\/UIC-ATC.2010.18"},{"key":"65_CR17","doi-asserted-by":"crossref","unstructured":"Debiao, H., Jianhua, C., Jin, H.: An ID-based client authentication with key agreement protocol for mobile client\u2013server environment on ECC with provable security. Info. Fusi (2011), doi:10.1016\/j.inffus.2011.01.001","DOI":"10.1016\/j.inffus.2011.01.001"},{"key":"65_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"R. Canetti","year":"2001","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 453\u2013472. Springer, Heidelberg (2001)"},{"key":"65_CR19","unstructured":"Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the indistinguishability-based security model of key agreement protocols-simple cases. Cryptology ePrint Archive, Report 2005\/129 (2005)"},{"issue":"1","key":"65_CR20","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/130704.130709","volume":"26","author":"L. Gong","year":"1992","unstructured":"Gong, L.: A security risk of depending on synchronized clocks. ACM SIGOPS Operating System Review\u00a026(1), 49\u201353 (1992)","journal-title":"ACM SIGOPS Operating System Review"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,21]],"date-time":"2020-06-21T12:39:42Z","timestamp":1592743182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22714-1_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227134","9783642227141"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22714-1_65","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}