{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:13:03Z","timestamp":1725707583935},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642355998"},{"type":"electronic","value":"9783642356001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35600-1_46","type":"book-chapter","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T07:31:37Z","timestamp":1353915097000},"page":"307-315","source":"Crossref","is-referenced-by-count":4,"title":["Improved Biometrics-Based Remote User Authentication Scheme with Session Key Agreement"],"prefix":"10.1007","author":[{"given":"Younghwa","family":"An","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"46_CR1","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M.L. Das","year":"2004","unstructured":"Das, M.L., Sxena, A., Gulathi, V.P.: A Dynamic ID-based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics\u00a050(2), 629\u2013631 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"46_CR2","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1134\/S1064230706040137","volume":"45","author":"C.W. Lin","year":"2006","unstructured":"Lin, C.W., Tsai, C.S., Hwang, M.S.: A New Strong-Password Authentication Scheme Using One-Way Hash Functions. Journal of Computer and Systems Sciences International\u00a045(4), 623\u2013626 (2006)","journal-title":"Journal of Computer and Systems Sciences International"},{"issue":"3","key":"46_CR3","first-page":"62","volume":"8","author":"C.S. Bindu","year":"2008","unstructured":"Bindu, C.S., Reddy, P.C.S., Satyanarayana, B.: Improved Remote User Authentication Scheme Preserving User Anonymity. International Journal of Computer Science and Network Security\u00a08(3), 62\u201366 (2008)","journal-title":"International Journal of Computer Science and Network Security"},{"key":"46_CR4","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1016\/j.compeleceng.2011.09.015","volume":"37","author":"A.K. Awasthi","year":"2011","unstructured":"Awasthi, A.K., Srivastava, K., Mittal, R.C.: An Improved Timestamp-based Remote User Authentication Scheme. Computer and Electrical Engineering\u00a037, 869\u2013874 (2011)","journal-title":"Computer and Electrical Engineering"},{"key":"46_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/11689522_24","volume-title":"Information Security Practice and Experience","author":"M.K. Khan","year":"2006","unstructured":"Khan, M.K., Zhang, J.: An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol.\u00a03903, pp. 260\u2013268. Springer, Heidelberg (2006)"},{"key":"46_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C.T. Li","year":"2010","unstructured":"Li, C.T., Hwang, M.S.: An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards. Journal of Network and Computer Applications\u00a033, 1\u20135 (2010)","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"46_CR7","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"A.K. Das","year":"2011","unstructured":"Das, A.K.: Analysis and Improvement on an Efficient Biometric-based Remote User Authentication Scheme Using Smart Cards. IET Information Security\u00a05(3), 541\u2013552 (2011)","journal-title":"IET Information Security"},{"issue":"7","key":"46_CR8","first-page":"193","volume":"10","author":"C.C. Lee","year":"2011","unstructured":"Lee, C.C., Chang, R.X., Chen, L.A.: Improvement of Li-Hwang\u2019s Biometrics-based User Authentication Scheme Using Smart Cards. WSEAS Transactions on Communications\u00a010(7), 193\u2013200 (2011)","journal-title":"WSEAS Transactions on Communications"},{"key":"46_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"5","key":"46_CR10","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Communications in Computer and Information Science","Computer Applications for Graphics, Grid Computing, and Industrial Environment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35600-1_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T02:29:34Z","timestamp":1557368974000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35600-1_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642355998","9783642356001"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35600-1_46","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}