{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:37:25Z","timestamp":1764783445876},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334689"},{"type":"electronic","value":"9783642334696"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33469-6_42","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T11:35:50Z","timestamp":1349523350000},"page":"314-323","source":"Crossref","is-referenced-by-count":4,"title":["Encrypted Remote User Authentication Scheme by Using Smart Card"],"prefix":"10.1007","author":[{"given":"Ali A.","family":"Yassin","sequence":"first","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ayad","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"42_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Haller, N.: The s\/key one-time password system. In: Proceedings of Internet Society Symposium on Network and Distributed Systems, California, pp. 151\u2013157 (1994)","DOI":"10.17487\/rfc1760"},{"issue":"4","key":"42_CR3","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/S0140-3664(98)00215-1","volume":"22","author":"K. Tan","year":"1999","unstructured":"Tan, K., Zhu, H.: Remote password authentication scheme based on cross-product. Computer Communications\u00a022(4), 390\u2013393 (1999)","journal-title":"Computer Communications"},{"key":"42_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M.-S. Hwang","year":"2000","unstructured":"Hwang, M.-S., Li, L.-H.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a046, 28\u201330 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"42_CR5","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H.-M. Sun","year":"2000","unstructured":"Sun, H.-M.: An efficient remote use authentication scheme using smart cards. IEEE Transactionson on Consumer Electronics\u00a046, 958\u2013961 (2000)","journal-title":"IEEE Transactionson on Consumer Electronics"},{"issue":"8","key":"42_CR6","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.cose.2005.03.006","volume":"24","author":"C. Fan","year":"2005","unstructured":"Fan, C., Chan, Y., Zhang, Z.: Robust remote authentication scheme with smart cards. Computers and Security\u00a024(8), 619\u2013628 (2005)","journal-title":"Computers and Security"},{"issue":"2","key":"42_CR7","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M.L. Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics\u00a050(2), 629\u2013631 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"42_CR8","unstructured":"Liao, I.E., Lee, C.C., Hwang, M.S.: Security enhancement for a dynamic ID-based remote user authentication scheme. In: Proceeding of International Conference on Next Generation Web Services Practice, Seoul, Korea, pp. 437\u2013440 (2005)"},{"issue":"32","key":"42_CR9","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"4","author":"Y.Y. Wang","year":"2009","unstructured":"Wang, Y.Y., Liu, J.Y., Xiao, F.X., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications\u00a04(32), 583\u2013585 (2009)","journal-title":"Computer Communications"},{"key":"42_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/11915034_73","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"E.J. Yoon","year":"2006","unstructured":"Yoon, E.J., Yoo, K.Y.: Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops, Part I. LNCS, vol.\u00a04277, pp. 499\u2013507. Springer, Heidelberg (2006)"},{"key":"42_CR11","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"M.K. Khan","year":"2011","unstructured":"Khan, M.K., Kim, S.K., Alghathbar, K.: Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme. Computer Communications\u00a034, 305\u2013309 (2011)","journal-title":"Computer Communications"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33469-6_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:10:51Z","timestamp":1620130251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33469-6_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334689","9783642334696"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33469-6_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}