{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:40:36Z","timestamp":1725745236238},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405754"},{"type":"electronic","value":"9783642405761"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40576-1_23","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T06:17:03Z","timestamp":1376461023000},"page":"236-242","source":"Crossref","is-referenced-by-count":2,"title":["Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash Function"],"prefix":"10.1007","author":[{"given":"Ashok Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Vanga","family":"Odelu","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Secure Hash Standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (April 1995)"},{"issue":"3","key":"23_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"A.K. Das","year":"2011","unstructured":"Das, A.K.: Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security\u00a05(3), 145\u2013151 (2011)","journal-title":"IET Information Security"},{"issue":"2","key":"23_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.5121\/ijnsa.2011.3202","volume":"3","author":"A.K. Das","year":"2011","unstructured":"Das, A.K.: Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards. International Journal of Network Security & Its Applications\u00a03(2), 13\u201328 (2011)","journal-title":"International Journal of Network Security & Its Applications"},{"issue":"1","key":"23_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M.S. Hwang","year":"2000","unstructured":"Hwang, M.S., Li, L.H.: A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a046(1), 28\u201330 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C.T. Li","year":"2010","unstructured":"Li, C.T., Hwang, M.S.: An efficient biometric-based remote authentication scheme using smart cards. Journal of Network and Computer Applications\u00a033, 1\u20135 (2010)","journal-title":"Journal of Network and Computer Applications"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-22348-8_18","volume-title":"Data and Applications Security and Privacy XXV","author":"C.-T. Li","year":"2011","unstructured":"Li, C.-T., Lee, C.-C., Liu, C.-J., Lee, C.-W.: A Robust Remote User Authentication Scheme against Smart Card Security Breach. In: Li, Y. (ed.) DBSec. LNCS, vol.\u00a06818, pp. 231\u2013238. Springer, Heidelberg (2011)"},{"issue":"5","key":"23_CR8","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T.S. Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers\u00a051(5), 541\u2013552 (2002)","journal-title":"IEEE Transactions on Computers"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Sonwanshi, S.S., Ahirwal, R.R., Jain, Y.K.: An Efficient Smart Card based Remote User Authentication Scheme using hash function. In: Proceedings of IEEE SCEECS 2012, pp. 1\u20134 (March 2012)","DOI":"10.1109\/SCEECS.2012.6184815"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40576-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T11:45:44Z","timestamp":1558007144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40576-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405754","9783642405761"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40576-1_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}