{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:04:41Z","timestamp":1740096281662,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387852"},{"type":"electronic","value":"9783642387869"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38786-9_31","type":"book-chapter","created":{"date-parts":[[2013,6,2]],"date-time":"2013-06-02T22:00:41Z","timestamp":1370210441000},"page":"271-277","source":"Crossref","is-referenced-by-count":3,"title":["Cryptanalysis of Truong et al.\u2019s Fingerprint Biometric Remote Authentication Scheme Using Mobile Device"],"prefix":"10.1007","author":[{"given":"Muhammad Khurram","family":"Khan","sequence":"first","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Mridul K.","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Fahad T. Bin","family":"Muhaya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"31_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M.S. Hwang","year":"2000","unstructured":"Hwang, M.S., Li, L.H.: A New Remote User Authentication Scheme using Smart Cards. IEEE Transactions on Consumer Electronics\u00a046(1), 28\u201330 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"31_CR2","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H.M. Sun","year":"2000","unstructured":"Sun, H.M.: An Efficient Remote User Authentication Scheme using Smart Cards. IEEE Transactions on Consumer Electronics\u00a046(4), 958\u2013961 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"31_CR3","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"H.Y. Chein","year":"2002","unstructured":"Chein, H.Y., Jan, J.K., Tseng, Y.M.: An Efficient and Practical Solution to Remote Authentication: Smart Card. Computers and Security\u00a021(4), 372\u2013375 (2002)","journal-title":"Computers and Security"},{"issue":"4","key":"31_CR4","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"I.E. Liao","year":"2006","unstructured":"Liao, I.E., Lee, C.C., Hwang, M.S.: A Password Authentication Scheme over Insecure Networks. Journal of Computer and System Sciences\u00a072(4), 727\u2013740 (2006)","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"31_CR5","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"J.K. Lee","year":"2002","unstructured":"Lee, J.K., Ryu, S.R., Yoo, K.Y.: Fingerprint based Remote User Authentication Scheme using Smart Cards. Electronics Letters\u00a038(2), 554\u2013555 (2002)","journal-title":"Electronics Letters"},{"issue":"1","key":"31_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"C.H. Lin","year":"2004","unstructured":"Lin, C.H., Lai, Y.Y.: A Flexible Biometrics Remote User Authentication Scheme. Computer Standards & Interfaces\u00a027(1), 19\u201323 (2004)","journal-title":"Computer Standards & Interfaces"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.csi.2006.01.002","volume":"29","author":"M.K. Khan","year":"2007","unstructured":"Khan, M.K., Zhang, J.: Improving the Security of \u2019a Flexible Biometrics Remote User Authentication Scheme\u2019. Comput. Stand. Interfaces\u00a029, 82\u201385 (2007)","journal-title":"Comput. Stand. Interfaces"},{"key":"31_CR8","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/s11859-010-0318-2","volume":"15","author":"J. Yuan","year":"2010","unstructured":"Yuan, J., Jiang, C., Jiang, Z.: A Biometric-Based User Authentication for Wireless Sensor Networks. Wuhan University Journal of Natural Sciences\u00a015, 272\u2013276 (2010), \n                  \n                    http:\/\/dx.doi.org\/10.1007\/s11859-010-0318-2","journal-title":"Wuhan University Journal of Natural Sciences"},{"issue":"1","key":"31_CR9","doi-asserted-by":"publisher","first-page":"60","DOI":"10.2478\/s13537-012-0003-y","volume":"2","author":"S. Kumari","year":"2012","unstructured":"Kumari, S., Gupta, M.K., Kumar, M.: Cryptanalysis And Security Enhancement of Chen et al. \u2019s Remote User Authentication Scheme Using Smart Card. Central European Journal of Computer Science\u00a02(1), C60\u201375C (2012)","journal-title":"\u2019s Remote User Authentication Scheme Using Smart Card. Central European Journal of Computer Science"},{"issue":"2","key":"31_CR10","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1002\/dac.1265","volume":"25","author":"D. He","year":"2012","unstructured":"He, D., Chen, J., Hu, J.: A Pairing-free Certificateless Authenticated Key Agreement Protocol. International Journal of Communication Systems\u00a025(2), 221\u2013230 (2012)","journal-title":"International Journal of Communication Systems"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1016\/j.compeleceng.2011.10.015","volume":"38","author":"H. Guo","year":"2012","unstructured":"Guo, H., Xu, C., Mu, Y., Li, Z.: A Provably Secure Authenticated Key Agreement Protocol for Wireless Communications. Computers and Electrical Engineering\u00a038, 563\u2013572 (2012)","journal-title":"Computers and Electrical Engineering"},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.jcss.2010.07.004","volume":"77","author":"R.C. Wang","year":"2011","unstructured":"Wang, R.C., Juang, W.S., Lei, C.L.: Provably Secure And Efficient Identification and Key Agreement Protocol with User Anonymity. Journal of Computer and System Sciences\u00a077, 790\u2013798 (2011)","journal-title":"Journal of Computer and System Sciences"},{"key":"31_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"5","key":"31_CR14","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining Smart-card Security under the Threat of Power Analysis Attacks. IEEE Transactions on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"31_CR15","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.csi.2007.11.017","volume":"31","author":"H.S. Rhee","year":"2009","unstructured":"Rhee, H.S., Kwon, J.O., Lee, D.H.: A Remote User Authentication Scheme Without using Smart Cards. Computer Standards and Interfaces\u00a031(1), 6\u201313 (2009)","journal-title":"Computer Standards and Interfaces"},{"key":"31_CR16","doi-asserted-by":"crossref","unstructured":"Chen, C.L., Lee, C.C., Hsu, C.Y.: Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme. International Journal of Communication Systems (2011), \n                  \n                    http:\/\/dx.doi.org\/10.1002\/dac.1277","DOI":"10.1002\/dac.1277"},{"issue":"6","key":"31_CR17","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1016\/j.comcom.2008.12.023","volume":"32","author":"D.Z. Sun","year":"2009","unstructured":"Sun, D.Z., Huai, J.P., Sun, J.Z., Li, J.X.: Cryptanalysis of a Mutual Authentication Scheme Based on Nonce and Smart Cards. Computer Communications\u00a032(6), 1015\u20131017 (2009)","journal-title":"Computer Communications"},{"issue":"3","key":"31_CR18","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/S0920-5489(03)00094-1","volume":"26","author":"C.L. Hsu","year":"2004","unstructured":"Hsu, C.L.: Security of Chein et al.\u2019s Remote User Authentication Scheme using Smart Cards. Computer Standards and Interfaces\u00a026(3), 167\u2013169 (2004)","journal-title":"Computer Standards and Interfaces"},{"issue":"1","key":"31_CR19","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"W.C. Ku","year":"2004","unstructured":"Ku, W.C., Chen, S.M.: Weaknesses and Improvements of an Efficient Password based Remote User Authentication Scheme using Smart Cards. IEEE Transactions on Consumer Electronics\u00a050(1), 204\u2013207 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"5","key":"31_CR20","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1016\/j.jcss.2007.05.001","volume":"74","author":"T. Xiang","year":"2008","unstructured":"Xiang, T., Wong, K.W., Liao, X.: Cryptanalysis of a Password Authentication Scheme over Insecure Networks. Journal of Computer and System Sciences\u00a074(5), 657\u2013661 (2008)","journal-title":"Journal of Computer and System Sciences"},{"issue":"5","key":"31_CR21","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.csi.2006.11.005","volume":"29","author":"X.M. Wang","year":"2007","unstructured":"Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and Improvement on two Efficient Remote User Authentication Scheme using Smart Cards. Computer Standards and Interfaces\u00a029(5), 507\u2013512 (2007)","journal-title":"Computer Standards and Interfaces"},{"issue":"3","key":"31_CR22","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"M.K. Khan","year":"2010","unstructured":"Khan, M.K., Kim, S.K., Alghathbar, K.: Cryptanalysis and Security Enhancement of a \u2018More Efficient & Secure Dynamic ID-based Remote User Authentication Scheme\u2019. Computer Communications\u00a034(3), 305\u2013309 (2010)","journal-title":"Computer Communications"},{"issue":"3","key":"31_CR23","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1016\/j.chaos.2006.05.061","volume":"35","author":"M.K. Khan","year":"2008","unstructured":"Khan, M.K., Zhang, J., Wang, X.: Chaotic Hash based Fingerprint Biometric Remote User Authentication Scheme on Mobile Devices. Chaos, Solitons & Fractals\u00a035(3), 519\u2013524 (2008)","journal-title":"Chaos, Solitons & Fractals"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Truong, T.T., Tran, M.T., Duong, A.D.: Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme. In: Proceedings of 26th IEEE International Conference on Advanced Information Networking and Applications, pp. 678\u2013685 (2012)","DOI":"10.1109\/AINA.2012.47"},{"key":"31_CR25","unstructured":"Bellcore Press Release. New Threat Model Breaks Crypto Codes, Bellcore Press Release (September 1996)"},{"issue":"9","key":"31_CR26","first-page":"967","volume":"49","author":"S.M. Yen","year":"2002","unstructured":"Yen, S.M., Joye, M.: Checking Before Output Not Be Enough Against Fault-based Cryptanalysis. IEEE Transactions on Computers\u00a049(9), 967\u2013970 (2002)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Advances in Brain Inspired Cognitive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38786-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:33:24Z","timestamp":1557750804000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38786-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642387852","9783642387869"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38786-9_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}