{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:59Z","timestamp":1725889919733},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642240812"},{"type":"electronic","value":"9783642240829"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24082-9_59","type":"book-chapter","created":{"date-parts":[[2011,9,20]],"date-time":"2011-09-20T07:31:55Z","timestamp":1316503915000},"page":"482-487","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of Nonce-Based Mutual Authentication Scheme Using Smart Cards"],"prefix":"10.1007","author":[{"given":"Young-Hwa","family":"An","sequence":"first","affiliation":[]},{"given":"Youngdo","family":"Joo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"59_CR1","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/S0167-4048(99)80136-9","volume":"18","author":"W.H. Yang","year":"1999","unstructured":"Yang, W.H., Shieh, S.P.: Password Authentication with smart cards. Computers and Security\u00a018(8), 727\u2013733 (1999)","journal-title":"Computers and Security"},{"issue":"7","key":"59_CR2","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1016\/S0167-4048(02)01118-5","volume":"21","author":"L. Fan","year":"2002","unstructured":"Fan, L., Li, L.H., Zhu, H.W.: An Enhancement of timestamp-based password Authentication Scheme. Computers and Security\u00a021(7), 665\u2013667 (2002)","journal-title":"Computers and Security"},{"issue":"7","key":"59_CR3","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/S0167-4048(03)00709-0","volume":"22","author":"J.J. Shen","year":"2003","unstructured":"Shen, J.J., Lin, C.W., Hwang, M.S.: Security Enhancement for the timestamp-based password Authentication Scheme Using Smart Cards. Computers and Security\u00a022(7), 591\u2013595 (2003)","journal-title":"Computers and Security"},{"issue":"2","key":"59_CR4","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M.L. Das","year":"2004","unstructured":"Das, M.L., Sxena, A., Gulathi, V.P.: A Dynamic ID-based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics\u00a050(2), 629\u2013631 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"59_CR5","unstructured":"Chien, H.Y., Chen, C.H.: A Remote Password Authentication Preserving User Anonymity. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications, AINA 2005 (2005)"},{"issue":"1","key":"59_CR6","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1093\/ietfec\/E88-A.1.319","volume":"E88-A","author":"E.J. Yoon","year":"2005","unstructured":"Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Attack on the Shen et al.\u2019s Timestamp-based Password Authentication Scheme Using Smart Cards. IEICE Transactions on Fundamentals\u00a0E88-A(1), 319\u2013321 (2005)","journal-title":"IEICE Transactions on Fundamentals"},{"issue":"4","key":"59_CR7","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1134\/S1064230706040137","volume":"45","author":"C.W. Lin","year":"2006","unstructured":"Lin, C.W., Tsai, C.S., Hwang, M.S.: A New Strong-Password Authentication Scheme Using One-Way Hash Functions. Journal of Computer and Systems Sciences International\u00a045(4), 623\u2013626 (2006)","journal-title":"Journal of Computer and Systems Sciences International"},{"issue":"3","key":"59_CR8","first-page":"62","volume":"8","author":"C.S. Bindu","year":"2008","unstructured":"Bindu, C.S., Reddy, P.C.S., Satyanarayana, B.: Improved Remote User Authentication Scheme Preserving User Anonymity. International Journal of Computer Science and Network Security\u00a08(3), 62\u201366 (2008)","journal-title":"International Journal of Computer Science and Network Security"},{"key":"59_CR9","doi-asserted-by":"publisher","first-page":"2205","DOI":"10.1016\/j.comcom.2008.02.002","volume":"31","author":"J.Y. Liu","year":"2008","unstructured":"Liu, J.Y., Zhou, A.M., Gao, M.X.: A New Mutual Authentication Scheme based on Nonce and Smart Cards. Computer Communications\u00a031, 2205\u20132209 (2008)","journal-title":"Computer Communications"},{"key":"59_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"5","key":"59_CR11","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Convergence and Hybrid Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24082-9_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,7]],"date-time":"2019-04-07T02:45:14Z","timestamp":1554605114000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24082-9_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642240812","9783642240829"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24082-9_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}