{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:56:28Z","timestamp":1725540988813},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334689"},{"type":"electronic","value":"9783642334696"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33469-6_38","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T11:35:50Z","timestamp":1349523350000},"page":"283-290","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication Scheme"],"prefix":"10.1007","author":[{"given":"Mo-han","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chen-guang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"38_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"issue":"4","key":"38_CR2","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"H.Y. Chien","year":"2002","unstructured":"Chien, H.Y., Jan, J.K., Tseng, Y.M.: An efficient and practical solution to remote authentication: smart card. Computers & Security\u00a021(4), 372\u2013375 (2002)","journal-title":"Computers & Security"},{"issue":"4","key":"38_CR3","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H.M. Sun","year":"2000","unstructured":"Sun, H.M.: An Efficient Remote User Authentication Scheme using Smart Cards. IEEE Transactions on Consumer Electronics\u00a046(4), 958\u2013961 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"38_CR4","doi-asserted-by":"publisher","first-page":"1196","DOI":"10.1109\/TCE.2003.1261216","volume":"49","author":"C.L. Hsu","year":"2003","unstructured":"Hsu, C.L.: Security of two remote user authentication schemes using smart cards. IEEE Transactions on Consumer Electronics\u00a049(4), 1196\u20131198 (2003)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"1","key":"38_CR5","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"W.C. Ku","year":"2004","unstructured":"Ku, W.C., Chen, S.M.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a050(1), 204\u2013207 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"38_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.csi.2004.02.002","volume":"27","author":"S.W. Lee","year":"2005","unstructured":"Lee, S.W., Kim, H.S., Yoo, K.Y.: Improvement of chien et al.\u2019s remote user authentication scheme using smart cards. Computer Standards & Interfaces\u00a027(2), 181\u2013183 (2005)","journal-title":"Computer Standards & Interfaces"},{"issue":"4","key":"38_CR7","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J. Xu","year":"2009","unstructured":"Xu, J., Zhu, W., Feng, D.: An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces\u00a031(4), 723\u2013728 (2009)","journal-title":"Computer Standards & Interfaces"},{"key":"38_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-11659-9_25","volume-title":"Distributed Computing and Internet Technology","author":"S.K. Sood","year":"2010","unstructured":"Sood, S.K., Sarje, A.K., Singh, K.: Secure Dynamic Identity-Based Remote User Authentication Scheme. In: Janowski, T., Mohanty, H. (eds.) ICDCIT 2010. LNCS, vol.\u00a05966, pp. 224\u2013235. Springer, Heidelberg (2010)"},{"issue":"3","key":"38_CR9","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"M. Khan","year":"2011","unstructured":"Khan, M., Kim, S., Alghathbar, K.: Cryptanalysis and security enhancement of \u2018a more efficient and secure dynamic id-based remote user authentication scheme\u2019. Computer Communications\u00a034(3), 305\u2013309 (2011)","journal-title":"Computer Communications"},{"key":"38_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-31540-4_9","volume-title":"Data and Applications Security and Privacy XXVI","author":"D. Wang","year":"2012","unstructured":"Wang, D., Ma, C.-G., Wu, P.: Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol.\u00a07371, pp. 114\u2013121. Springer, Heidelberg (2012)"},{"key":"38_CR11","unstructured":"Wang, D., Ma, C.G.: On the security of an improved password authentication scheme based on ecc. Cryptology ePrint Archive, Report 2012\/190 (2012), \n                    \n                      http:\/\/eprint.iacr.org\/2012\/190.pdf"},{"key":"38_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-28073-3_13","volume-title":"Distributed Computing and Internet Technology","author":"C.G. Ma","year":"2012","unstructured":"Ma, C.G., Wang, D., Zhang, Q.M.: Cryptanalysis and Improvement of Sood et al.\u2019s Dynamic ID-Based Authentication Scheme. In: Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. LNCS, vol.\u00a07154, pp. 141\u2013152. Springer, Heidelberg (2012)"},{"issue":"2","key":"38_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"38_CR14","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"38_CR15","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1049\/iet-ifs.2010.0096","volume":"5","author":"S. Mangard","year":"2011","unstructured":"Mangard, S., Oswald, E., Standaert, F.X.: One for all-all for one: unifying standard differential power analysis attacks. IET Information Security\u00a05(2), 100\u2013110 (2011)","journal-title":"IET Information Security"},{"key":"38_CR16","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1109\/CIS.2011.149","volume-title":"2011 Seventh International Conference on Computational Intelligence and Security","author":"K. Gu","year":"2011","unstructured":"Gu, K., Wu, L.J., Li, X.Y., Zhang, X.M.: Design and implementation of an electromagnetic analysis system for smart cards. In: 2011 Seventh International Conference on Computational Intelligence and Security, pp. 653\u2013656. IEEE Press, New York (2011)"},{"issue":"3","key":"38_CR17","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/0167-4048(92)90207-8","volume":"11","author":"E.H. Spaford","year":"1992","unstructured":"Spaford, E.H.: Opus: Preventing weak password choices. Computers & Security\u00a011(3), 273\u2013278 (1992)","journal-title":"Computers & Security"},{"issue":"3","key":"38_CR18","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1080\/0144929X.2010.492876","volume":"30","author":"J. Campbell","year":"2011","unstructured":"Campbell, J., Ma, W., Kleeman, D.: Impact of restrictive composition policy on user password choices. Behaviour & Information Technology\u00a030(3), 379\u2013388 (2011)","journal-title":"Behaviour & Information Technology"},{"key":"38_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/3-540-45600-7_23","volume-title":"Information and Communications Security","author":"F. Bao","year":"2001","unstructured":"Bao, F., Deng, R.: Privacy Protection for Transactions of Digital Goods. In: Qing, S., Okamoto, T., Zhou, J. (eds.) ICICS 2001. LNCS, vol.\u00a02229, pp. 202\u2013213. Springer, Heidelberg (2001)"},{"issue":"3","key":"38_CR20","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1109\/TWC.2008.060802","volume":"7","author":"C. Tang","year":"2008","unstructured":"Tang, C., Wu, D.: Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications\u00a07(3), 1035\u20131042 (2008)","journal-title":"IEEE Transactions on Wireless Communications"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33469-6_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:10:50Z","timestamp":1620130250000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33469-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334689","9783642334696"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33469-6_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}