{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:16:14Z","timestamp":1742912174106,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642315121"},{"type":"electronic","value":"9783642315138"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31513-8_25","type":"book-chapter","created":{"date-parts":[[2012,6,29]],"date-time":"2012-06-29T09:39:17Z","timestamp":1340962757000},"page":"245-254","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Triangle Centroid Authentication Protocol for Cloud Environment"],"prefix":"10.1007","author":[{"given":"K.","family":"Anitha Kumari","sequence":"first","affiliation":[]},{"given":"G.","family":"Sudha Sadasivam","sequence":"additional","affiliation":[]},{"given":"Bhandari","family":"Chetna","sequence":"additional","affiliation":[]},{"given":"S.","family":"Rubika","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"Chow, R., Jakobsson, M., Masuoka, R.: Authentication in the Clouds: A Framework and its Application to Mobile Users. ACM (2010) 978-1-4503-0089-6\/10\/10"},{"key":"25_CR2","unstructured":"Cloud Security Alliance, Domain 12: Guidance for Identity & Access Management V2.1 (April 2010)"},{"issue":"6","key":"25_CR3","first-page":"1059","volume":"19","author":"H.-T. Yeh","year":"2003","unstructured":"Yeh, H.-T., Sun, H.-M., Hwang, T.: Efficient Three- Party Authentication and Key Agreement Protocols Resistant to Password Guessing Attacks. Journal of Information Science and Engineering\u00a019(6), 1059\u20131070 (2003)","journal-title":"Journal of Information Science and Engineering"},{"issue":"1","key":"25_CR4","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S0167-4048(03)00114-7","volume":"22","author":"C.L. Lin","year":"2003","unstructured":"Lin, C.L., Hwang, T.: A password authentication scheme with secure password updating. Computer & Security\u00a022(1), 68\u201372 (2003)","journal-title":"Computer & Security"},{"issue":"2","key":"25_CR5","doi-asserted-by":"crossref","first-page":"285","DOI":"10.15388\/Informatica.2005.099","volume":"16","author":"E.-J. Yoon","year":"2005","unstructured":"Yoon, E.-J., Ryu, E.-K., Yoo, K.-Y.: Attacks and Solutions of Yang et al.\u2019s Protected Password Changing Scheme. Informatica\u00a016(2), 285\u2013294 (2005)","journal-title":"Informatica"},{"key":"25_CR6","unstructured":"Yang, Y., Deng, R.H., Bao, F.: A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEE"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Kang, L., Zhang, X.: Identity-Based Authentication in Cloud Storage Sharing. In: 2010 International Conference on Multimedia Information Networking and Security (2010)","DOI":"10.1109\/MINES.2010.180"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Shen, Z., Tong, Q.: The Security of Cloud Computing System enabled by Trusted Computing Technology. In: 2010 2nd International Conference on Signal Processing Systems (2010)","DOI":"10.1109\/ICSPS.2010.5555234"},{"key":"25_CR9","unstructured":"Johnson, D., Murari, K., et al.: Eucalyptus Beginner\u2019s Guide\u2013UEC edition (Ubuntu Server 10.04 - Lucid Lynx) v1.0, May 25 (2010)"},{"key":"25_CR10","unstructured":"Ruckmani, V., Sudha Sadasivam, G.: A novel trigon-based dual authentication protocol for enhancing security in grid environment. (IJCSIS) International Journal of Computer Science and Information Security\u00a06(3) (2009)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Yang, Y., Bao, F.: Enabling Use of Single Password Over Multiple Servers in Two-Server Model. In: 2010 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010)","DOI":"10.1109\/CIT.2010.159"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Yang, D., Yang, B.: A Novel Two-Server Password Authentication Scheme with Provable Security. In: 2010 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010)","DOI":"10.1109\/CIT.2010.284"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Lee, J.H., Lee, D.H.: Secure and Efficient Password-based Authenticated Key Exchange Protocol for Two-Server Architecture. In: 2007 International Conference on Convergence Information Technology (2007)","DOI":"10.1109\/ICCIT.2007.291"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Yang, Y., Bao, F.: Enabling Use of Single Password Over Multiple Servers in Two-Server Model. In: 2010 10th IEEE International Conference on Computer and Information Technology, CIT 2010 (2010)","DOI":"10.1109\/CIT.2010.159"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Computing and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31513-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T15:58:27Z","timestamp":1714751907000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-31513-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642315121","9783642315138"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31513-8_25","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2012]]}}}