{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:08:12Z","timestamp":1771697292048,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642280726","type":"print"},{"value":"9783642280733","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28073-3_13","type":"book-chapter","created":{"date-parts":[[2012,2,21]],"date-time":"2012-02-21T01:11:19Z","timestamp":1329786679000},"page":"141-152","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis and Improvement of Sood et al.\u2019s Dynamic ID-Based Authentication Scheme"],"prefix":"10.1007","author":[{"given":"Chun-Guang","family":"Ma","sequence":"first","affiliation":[]},{"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qi-Ming","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"W.C. Ku","year":"2004","unstructured":"Ku, W.C., Chen, S.M.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a050(1), 204\u2013207 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"13_CR2","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1016\/j.amc.2004.11.004","volume":"169","author":"Y.C. Chen","year":"2005","unstructured":"Chen, Y.C., Yeh, L.Y.: An efficient nonce-based authentication scheme with key agreement. Applied Mathematics and Computation\u00a0169(2), 982\u2013994 (2005)","journal-title":"Applied Mathematics and Computation"},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.cose.2005.09.008","volume":"25","author":"W.G. Shieh","year":"2006","unstructured":"Shieh, W.G., Wang, J.M.: Efficient Remote Mutual Authentication and Key Agreement. Computers and Security\u00a025(1), 72\u201377 (2006)","journal-title":"Computers and Security"},{"issue":"4","key":"13_CR4","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1016\/j.comcom.2008.11.019","volume":"32","author":"H.C. Hsiang","year":"2009","unstructured":"Hsiang, H.C., Shih, W.K.: Weaknesses and Improvements of the Yoon-Ryu-Yoo Remote User Authentication Scheme using Smart Cards. Computer Communications\u00a032(4), 649\u2013652 (2009)","journal-title":"Computer Communications"},{"key":"13_CR5","first-page":"88","volume":"11","author":"M. Kumar","year":"2010","unstructured":"Kumar, M.: A new secure remote user authentication scheme with smart cards. International Journal of Network Security\u00a011, 88\u201393 (2010)","journal-title":"International Journal of Network Security"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-11659-9_25","volume-title":"Distributed Computing and Internet Technology","author":"S.K. Sood","year":"2010","unstructured":"Sood, S.K., Sarje, A.K., Singh, K.: Secure Dynamic Identity-Based Remote User Authentication Scheme. In: Janowski, T., Mohanty, H. (eds.) ICDCIT 2010. LNCS, vol.\u00a05966, pp. 224\u2013235. Springer, Heidelberg (2010)"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"5","key":"13_CR8","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"13_CR9","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M.L. Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics\u00a050(2), 629\u2013631 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"13_CR10","first-page":"245","volume-title":"IEEE AINA 2005","author":"H.Y. Chien","year":"2005","unstructured":"Chien, H.Y., Chen, C.H.: A remote authentication scheme preserving user anonymity. In: IEEE AINA 2005, pp. 245\u2013248. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"4","key":"13_CR11","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"Y.Y. Wang","year":"2009","unstructured":"Wang, Y.Y., Liu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications\u00a032(4), 583\u2013585 (2009)","journal-title":"Computer Communications"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/CNSR.2007.38","volume-title":"Fifth Annual Conference on Communication Networks and Services Research","author":"L.L. Hu","year":"2007","unstructured":"Hu, L.L., Yang, Y.X., Niu, X.Y.: Improved remote user authentication scheme preserving user anonymity. In: Fifth Annual Conference on Communication Networks and Services Research, pp. 323\u2013328. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"5","key":"13_CR13","first-page":"619","volume":"7","author":"W.B. Horng","year":"2010","unstructured":"Horng, W.B., Lee, C.P., Peng, J.: A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards. WSEAS Transactions on Information Science and Applications\u00a07(5), 619\u2013628 (2010)","journal-title":"WSEAS Transactions on Information Science and Applications"},{"issue":"12","key":"13_CR14","doi-asserted-by":"publisher","first-page":"2556","DOI":"10.1016\/j.jss.2010.07.062","volume":"83","author":"K.H. Yeh","year":"2010","unstructured":"Yeh, K.H., Su, C.H., Lo, N.W.: Two robust remote user authentication protocols using smart cards. Journal of Systems and Software\u00a083(12), 2556\u20132565 (2010)","journal-title":"Journal of Systems and Software"},{"issue":"3","key":"13_CR15","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"M.K. Khan","year":"2011","unstructured":"Khan, M.K., Kim, S.K., Alghathbar, K.: Cryptanalysis and security enhancement of a \u2018more efficient & secure dynamic ID-based remote user authentication scheme\u2019. Computer Communications\u00a034(3), 305\u2013309 (2011)","journal-title":"Computer Communications"},{"issue":"2","key":"13_CR16","first-page":"67","volume":"20","author":"S.K. Sood","year":"2011","unstructured":"Sood, S.K.: Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards. Information Security Journal: A Global Perspective\u00a020(2), 67\u201377 (2011)","journal-title":"Information Security Journal: A Global Perspective"},{"issue":"4","key":"13_CR17","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1504\/IJESDF.2010.038613","volume":"3","author":"D.B. He","year":"2010","unstructured":"He, D.B., Chen, J.H., Zhang, R.: Weaknesses of a dynamic ID-based remote user authentication scheme. International Journal of Electronic Security and Digital Forensics\u00a03(4), 355\u2013362 (2010)","journal-title":"International Journal of Electronic Security and Digital Forensics"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28073-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T21:27:02Z","timestamp":1556400422000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28073-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642280726","9783642280733"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28073-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}