{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:24:12Z","timestamp":1743135852196,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642396397"},{"type":"electronic","value":"9783642396403"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39640-3_37","type":"book-chapter","created":{"date-parts":[[2013,6,21]],"date-time":"2013-06-21T02:25:58Z","timestamp":1371781558000},"page":"502-515","source":"Crossref","is-referenced-by-count":10,"title":["Robust Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment"],"prefix":"10.1007","author":[{"given":"Toan-Thinh","family":"Truong","sequence":"first","affiliation":[]},{"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Anh-Duc","family":"Duong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"37_CR1","first-page":"13863","volume":"38","author":"C.-C. Lee","year":"2011","unstructured":"Lee, C.-C., Lin, T.-H., Chang, R.-X.: A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Systems with Applications\u00a038(11), 13863\u201313870 (2011)","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"37_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"Y.-P. Liao","year":"2009","unstructured":"Liao, Y.-P., Wang, S.-S.: A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces\u00a031(1), 24\u201329 (2009)","journal-title":"Computer Standards & Interfaces"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Hsiang, H.-C., Shih, W.-K.: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces\u00a031(6), 1118\u20131123 (November 2009)","DOI":"10.1016\/j.csi.2008.11.002"},{"issue":"2","key":"37_CR4","first-page":"149","volume":"4","author":"M.S. Hwang","year":"2007","unstructured":"Hwang, M.S., Lee, C.C., Tang, Y.L.: Improved efficient remote user authentication schemes. Int. J. Netw. Secur.\u00a04(2), 149\u2013154 (2007)","journal-title":"Int. J. Netw. Secur."},{"issue":"3","key":"37_CR5","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/567331.567335","volume":"36","author":"C.C. Lee","year":"2002","unstructured":"Lee, C.C., Hwang, M.S., Yang, W.P.: Flexible Remote User Authentication Scheme Using Smart Cards. ACM Operating Systems Review\u00a036(3), 46\u201352 (2002)","journal-title":"ACM Operating Systems Review"},{"issue":"2","key":"37_CR6","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M.L. Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: A Dynamic ID-based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics\u00a050(2), 629\u2013631 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Yoon, E.-J., Yoo, K.-Y.: Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. OTM Workshops\u00a0(1), 499\u2013507 (2006)","DOI":"10.1007\/11915034_73"},{"issue":"4","key":"37_CR8","first-page":"1131","volume":"34","author":"T.-H. Chen","year":"2011","unstructured":"Chen, T.-H., Chen, Y.-C., Shih, W.-K., Wei, H.-W.: An efficient anonymous authentication protocol for mobile pay-TV. Advanced Topics in Cloud Computing\u00a034(4), 1131\u20131137 (2011)","journal-title":"Advanced Topics in Cloud Computing"},{"key":"37_CR9","volume-title":"Handbook of Applied Cryptograph","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptograph. CRC Press, New York (1997)"},{"key":"37_CR10","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password Authentication with Insecure Communication. Communications of the ACM\u00a024, 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/S0895-7177(02)00106-1","volume":"36","author":"M.S. Hwang","year":"2002","unstructured":"Hwang, M.S., Lee, C.C., Tang, Y.L.: A Simple Remote User Authentication Scheme. Mathematical and Computer Modelling\u00a036, 103\u2013107 (2002)","journal-title":"Mathematical and Computer Modelling"},{"issue":"6","key":"37_CR12","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"L.H. Li","year":"2001","unstructured":"Li, L.H., Lin, I.C., Hwang, M.S.: A Remote Password Authentication Scheme for Multiserver Architecture Using Neural Networks. IEEE Transactions on Neural Network\u00a012(6), 1498\u20131504 (2001)","journal-title":"IEEE Transactions on Neural Network"},{"issue":"2","key":"37_CR13","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/TCE.2003.1209534","volume":"49","author":"J.J. Shen","year":"2003","unstructured":"Shen, J.J., Lin, C.W., Hwang, M.S.: A Modified Remote User Authentication Scheme Using Smart Cards. IEEE Transactions on Consumer Electronics\u00a049(2), 414\u2013416 (2003)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"3","key":"37_CR14","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.comcom.2010.04.041","volume":"34","author":"J. Xu","year":"2011","unstructured":"Xu, J., Zhu, W.-T., Feng, D.-G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications\u00a034(3), 319\u2013325 (2011)","journal-title":"Computer Communications"},{"issue":"3","key":"37_CR15","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.comcom.2010.04.005","volume":"34","author":"R.-C. Wang","year":"2011","unstructured":"Wang, R.-C., Juang, W.-S., Lei, C.-L.: Robust authentication and key agreement scheme preserving the privacy of secret key. Computer Communications\u00a034(3), 274\u2013280 (2011)","journal-title":"Computer Communications"},{"key":"37_CR16","doi-asserted-by":"crossref","unstructured":"Islam, S.H., Biswas, G.P.: A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software (2011) (In Press); Corrected Proof, Available online (July 7, 2011)","DOI":"10.1016\/j.jss.2011.06.061"},{"issue":"3","key":"37_CR17","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.comcom.2010.03.013","volume":"34","author":"B. Vaidya","year":"2011","unstructured":"Vaidya, B., Park, J.H., Joel, S.-S.Y., Rodrigues, J.P.C.: Robust one-time password authentication scheme using smart card for home network environment. Computer Communications\u00a034(3), 326\u2013336 (2011)","journal-title":"Computer Communications"},{"issue":"1-2","key":"37_CR18","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.mcm.2006.01.015","volume":"44","author":"H.-T. Liaw","year":"2006","unstructured":"Liaw, H.-T., Lin, J.-F., Wu, W.-C.: An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling\u00a044(1-2), 223\u2013228 (2006)","journal-title":"Mathematical and Computer Modelling"},{"key":"37_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/11554868_17","volume-title":"Progress in Cryptology \u2013 Mycrypt 2005","author":"C. Boyd","year":"2005","unstructured":"Boyd, C., Choo, K.: Security of Two-Party Identity-Based Key Agreement. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol.\u00a03715, pp. 229\u2013243. Springer, Heidelberg (2005)"},{"issue":"8","key":"37_CR20","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1049\/el:20030448","volume":"39","author":"K. Shim","year":"2003","unstructured":"Shim, K.: Effient ID-based authenticated key agreement protocol based on the Weil pairing. Electron. Lett.\u00a039(8), 653\u2013654 (2003)","journal-title":"Electron. Lett."},{"key":"37_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"issue":"5","key":"37_CR22","doi-asserted-by":"publisher","first-page":"54152","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers\u00a051(5), 54152 (2002)","journal-title":"IEEE Transactions on Computers"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2013"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39640-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:13:39Z","timestamp":1675955619000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-39640-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642396397","9783642396403"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39640-3_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}