{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:56:27Z","timestamp":1725540987441},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334689"},{"type":"electronic","value":"9783642334696"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33469-6_34","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T11:35:50Z","timestamp":1349523350000},"page":"246-253","source":"Crossref","is-referenced-by-count":16,"title":["Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing"],"prefix":"10.1007","author":[{"given":"Ding","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ying","family":"Mei","sequence":"additional","affiliation":[]},{"given":"Chun-guang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zhen-shan","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"34_CR1","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1109\/TPDS.2009.111","volume":"21","author":"R. Baldoni","year":"2010","unstructured":"Baldoni, R., Corsaro, A., Querzoni, L., Scipioni, S., Piergiovanni, S.: Coupling-based internal clock synchronization for large-scale dynamic distributed systems. IEEE Transactions on Parallel and Distributed Systems\u00a021(5), 607\u2013619 (2010)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"1","key":"34_CR2","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TIE.2011.2130500","volume":"59","author":"C.C. Chang","year":"2012","unstructured":"Chang, C.C., Lee, C.Y.: A secure single sign-on mechanism for distributed computer networks. IEEE Transactions on Industrial Electronics\u00a059(1), 629\u2013637 (2012)","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Chen, T., Yeh, H., Shih, W.: An advanced ecc dynamic id-based remote mutual authentication scheme for cloud computing. In: Proceedings of the 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering, pp. 155\u2013159. IEEE Computer Society (2011)","DOI":"10.1109\/MUE.2011.69"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Giridhar, A., Kumar, P.: Distributed clock synchronization over wireless networks: Algorithms and analysis. In: 2006 45th IEEE Conference on Decision and Control, pp. 4915\u20134920. IEEE (2006)","DOI":"10.1109\/CDC.2006.377325"},{"issue":"1","key":"34_CR5","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/130704.130709","volume":"26","author":"L. Gong","year":"1992","unstructured":"Gong, L.: A security risk of depending on synchronized clocks. ACM SIGOPS Operating Systems Review\u00a026(1), 49\u201353 (1992)","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"11","key":"34_CR6","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1016\/j.jss.2011.06.061","volume":"84","author":"S.H. Islam","year":"2011","unstructured":"Islam, S.H., Biswas, G.: A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software\u00a084(11), 1892\u20131898 (2011)","journal-title":"Journal of Systems and Software"},{"key":"34_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-25286-0_5","volume-title":"RFID. Security and Privacy","author":"T. Kasper","year":"2012","unstructured":"Kasper, T., Oswald, D., Paar, C.: Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol.\u00a07055, pp. 61\u201377. Springer, Heidelberg (2012)"},{"key":"34_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-28073-3_13","volume-title":"Distributed Computing and Internet Technology","author":"C.-G. Ma","year":"2012","unstructured":"Ma, C.-G., Wang, D., Zhang, Q.-M.: Cryptanalysis and Improvement of Sood et al.\u2019s Dynamic ID-Based Authentication Scheme. In: Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. LNCS, vol.\u00a07154, pp. 141\u2013152. Springer, Heidelberg (2012)"},{"issue":"2","key":"34_CR9","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S. Mangard","year":"2011","unstructured":"Mangard, S., Oswald, E., Standaert, F.X.: One for all-all for one: unifying standard differential power analysis attacks. IET Information Security\u00a05(2), 100\u2013110 (2011)","journal-title":"IET Information Security"},{"issue":"5","key":"34_CR10","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computers"},{"key":"34_CR11","unstructured":"Wang, D., Ma, C.G.: On the security of an improved password authentication scheme based on ecc. Cryptology ePrint Archive, Report 2012\/190 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/2012\/190.pdf"},{"key":"34_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-31540-4_9","volume-title":"Data and Applications Security and Privacy XXVI","author":"D. Wang","year":"2012","unstructured":"Wang, D., Ma, C.-G., Wu, P.: Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol.\u00a07371, pp. 114\u2013121. Springer, Heidelberg (2012)"},{"issue":"4","key":"34_CR13","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J. Xu","year":"2009","unstructured":"Xu, J., Zhu, W., Feng, D.: An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces\u00a031(4), 723\u2013728 (2009)","journal-title":"Computer Standards & Interfaces"},{"key":"34_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/11935308_7","volume-title":"Information and Communications Security","author":"G. Yang","year":"2006","unstructured":"Yang, G., Wong, D.S., Wang, H., Deng, X.: Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 82\u201391. Springer, Heidelberg (2006)"},{"issue":"3-4","key":"34_CR15","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"J. Yang","year":"2009","unstructured":"Yang, J., Chang, C.: An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & security\u00a028(3-4), 138\u2013143 (2009)","journal-title":"Computers & security"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Yu, H., Powell, N., Stembridge, D., Yuan, X.: Cloud computing and security challenges. In: Proceedings of the 50th Annual Southeast Regional Conference, pp. 298\u2013302. ACM (2012)","DOI":"10.1145\/2184512.2184581"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33469-6_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:10:48Z","timestamp":1620130248000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33469-6_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334689","9783642334696"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33469-6_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}