{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:06:04Z","timestamp":1725638764017},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642271410"},{"type":"electronic","value":"9783642271427"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27142-7_33","type":"book-chapter","created":{"date-parts":[[2011,12,3]],"date-time":"2011-12-03T10:31:32Z","timestamp":1322908292000},"page":"285-292","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of the User Authentication Scheme with Anonymity"],"prefix":"10.1007","author":[{"given":"Woongryul","family":"Jeon","sequence":"first","affiliation":[]},{"given":"Jeeyeon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Junghyun","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Nam, J., Paik, J., Kang, H., Kim, U., Won, D.: An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communication Letters, 205\u2013207 (2009)","DOI":"10.1109\/LCOMM.2009.081609"},{"key":"33_CR2","unstructured":"Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consum. Electiron\u00a050(1), 13(3), 230\u2013234 (2009)"},{"issue":"5","key":"33_CR3","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C.C. Lee","year":"2006","unstructured":"Lee, C.C., Hwang, M.S., Liao, I.E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Ind. Electron.\u00a053(5), 1683\u20131687 (2006)","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"10","key":"33_CR4","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/LCOMM.2008.080283","volume":"12","author":"C.C. Wu","year":"2008","unstructured":"Wu, C.C., Lee, W.B., Tsaur, W.J.: A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett.\u00a012(10), 722\u2013723 (2008)","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"33_CR5","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1587\/transfun.E94.A.860","volume":"E94-A","author":"M. Kang","year":"2011","unstructured":"Kang, M., Rhee, H., Choi, J.: Improved User Authentication Scheme with User Anonymity for Wireless Communications. IEICE Trans. Fundamentals\u00a0E94-A(2), 860\u2013864 (2011)","journal-title":"IEICE Trans. Fundamentals"},{"issue":"3","key":"33_CR6","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/LCOMM.2009.081821","volume":"13","author":"P. Zeng","year":"2009","unstructured":"Zeng, P., Cao, Z., Choo, K.R., Wang, S.: On the anonymity of some authentication schemes for wireless communications. IEEE Commun. Lett.\u00a013(3), 170\u2013171 (2009)","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"33_CR7","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1109\/LCOMM.2009.090074","volume":"13","author":"J. Lee","year":"2009","unstructured":"Lee, J., Chang, J.H., Lee, D.H.: Security flaws of authentication scheme with anonymity for wireless communications. IEEE Commun. Lett.\u00a013(5), 292\u2013293 (2009)","journal-title":"IEEE Commun. Lett."},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Wei, Y., Qui, H., Hu, Y.: Security analysis of authentication scheme with anonymity for wireless environments. In: ICCT(International Conference on Communication Technology) (2006)","DOI":"10.1109\/ICCT.2006.341724"},{"issue":"8","key":"33_CR9","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.cose.2005.03.006","volume":"24","author":"C. Fan","year":"2005","unstructured":"Fan, C., Chan, Y., Zhang, Z.: Robust remote authentication scheme with smart cards. Comput. Secur.\u00a024(8), 619\u2013628 (2005)","journal-title":"Comput. Secur."},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.compeleceng.2011.03.002","volume":"37","author":"E. Yoon","year":"2011","unstructured":"Yoon, E., Yoo, K., Ha, K.: A user friendly authentication scheme with anonymity for wireless communications. Computres and Electrical Engineering\u00a037, 356\u2013364 (2011)","journal-title":"Computres and Electrical Engineering"},{"issue":"4","key":"33_CR11","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J. Xu","year":"2009","unstructured":"Xu, J., Zhu, W.T., Feng, D.G.: An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces\u00a031(4), 723\u2013728 (2009)","journal-title":"Computer Standards & Interfaces"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Li, C.T., Lee, C.C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications, Mathematical and Computer Modelling (In press)","DOI":"10.1016\/j.mcm.2011.01.010"},{"issue":"3","key":"33_CR13","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.compeleceng.2011.03.002","volume":"37","author":"E. Yoon","year":"2011","unstructured":"Yoon, E., Yoo, K., Ha, K.: A user friendly authentication scheme with anonymity for wireless communications. Computers and Electrical Engineering\u00a037(3), 356\u2013364 (2011)","journal-title":"Computers and Electrical Engineering"},{"key":"33_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1007\/11751649_94","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"Y. Lee","year":"2006","unstructured":"Lee, Y., Nam, J., Kim, S., Won, D.: Two Efficient and Secure Authentication Schemes Using Smart Cards. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagan\u00e1, A., Mun, Y., Choo, H. (eds.) ICCSA 2006, Part V. LNCS, vol.\u00a03984, pp. 858\u2013866. Springer, Heidelberg (2006)"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Lee, J., Kwon, T.: Secure Authentication Scheme with Improved Anonymity for Wireless Environments. IEICE Trans. Commun.\u00a0E97-B(2) (2011)","DOI":"10.1587\/transcom.E94.B.554"}],"container-title":["Lecture Notes in Computer Science","Future Generation Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27142-7_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T03:17:38Z","timestamp":1561000658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27142-7_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642271410","9783642271427"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27142-7_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}