{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:20:18Z","timestamp":1740097218237,"version":"3.37.3"},"publisher-location":"New Delhi","reference-count":32,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226932"},{"type":"electronic","value":"9788132226956"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_41","type":"book-chapter","created":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:41:10Z","timestamp":1445733670000},"page":"495-505","source":"Crossref","is-referenced-by-count":6,"title":["Secure Remote Login Scheme with Password and Smart Card Update Facilities"],"prefix":"10.1007","author":[{"given":"Rajeev","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Arijit","family":"Karati","sequence":"additional","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"Amin, R.: Cryptanalysis and an efficient secure id-based remote user authentication scheme using smart card. In: IJCA. vol. 75, pp. 1149\u20131157. Citeseer (2013)","DOI":"10.5120\/13175-0909"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Amin, R., Biswas, G.P.: Anonymity preserving secure hash function based authentication scheme for consumer usb mass storage device. In: IEEE 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT), pp. 1\u20136. (2015)","DOI":"10.1109\/C3IT.2015.7060190"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Amin, R., Biswas, G.P.: Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card. Arab. J. Sci. Eng. 1\u201315 (2015). http:\/\/dx.doi.org\/10.1007\/s13369-015-1743-5","DOI":"10.1007\/s13369-015-1743-5"},{"key":"41_CR4","doi-asserted-by":"crossref","unstructured":"Amin, R., Biswas, G.P.: Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wireless Pers. Commun. 1\u201324 (2015)","DOI":"10.1007\/s11277-015-2616-7"},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Amin, R., Biswas, G.P.: An improved rsa based user authentication and session key agreement protocol usable in tmis. J. Med. Syst. 39(8), 79 (2015). http:\/\/dx.doi.org\/10.1007\/s10916-015-0262-y","DOI":"10.1007\/s10916-015-0262-y"},{"issue":"3","key":"41_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0217-3","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Biswas, G.P.: A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis. J. Med. Syst. 39(3), 1\u201317 (2015)","journal-title":"J. Med. Syst."},{"key":"41_CR7","doi-asserted-by":"crossref","unstructured":"Amin, R., Biswas, G.P.: Remote access control mechanism using rabin public key cryptosystem. In: Information Systems Design and Intelligent Applications, pp. 525\u2013533. Springer (2015)","DOI":"10.1007\/978-81-322-2250-7_52"},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Amin, R., Biswas, G.P.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. (2015)","DOI":"10.1016\/j.adhoc.2015.05.020"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Amin, R., Biswas, G.P.: A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8), 78 (2015). http:\/\/dx.doi.org\/10.1007\/s10916-015-0258-7","DOI":"10.1007\/s10916-015-0258-7"},{"issue":"13","key":"41_CR10","first-page":"37","volume":"75","author":"R Amin","year":"2013","unstructured":"Amin, R., Maitra, T., Rana, S.P.: An improvement of wang. et. al.s remote user authentication scheme against smart card security breach. Int. J. Comput. Appl. 75(13), 37\u201342 (2013)","journal-title":"Int. J. Comput. Appl."},{"issue":"6","key":"41_CR11","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1016\/j.compeleceng.2011.09.015","volume":"37","author":"AK Awasthi","year":"2011","unstructured":"Awasthi, A.K., Srivastava, K., Mittal, R.: An improved timestamp-based remote user authentication scheme. Comput. Electr. Eng. 37(6), 869\u2013874 (2011)","journal-title":"Comput. Electr. Eng."},{"issue":"11","key":"41_CR12","doi-asserted-by":"crossref","first-page":"3430","DOI":"10.1002\/dac.2552","volume":"27","author":"YF Chang","year":"2014","unstructured":"Chang, Y.F., Tai, W.L., Chang, H.C.: Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst. 27(11), 3430\u20133440 (2014)","journal-title":"Int. J. Commun. Syst."},{"key":"41_CR13","first-page":"402","volume":"2013","author":"JS Chou","year":"2013","unstructured":"Chou, J.S., Huang, C.H., Huang, Y.S., Chen, Y.: Efficient two-pass anonymous identity authentication using smart card. IACR Cryptology ePrint Archive 2013, 402 (2013)","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"1","key":"41_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2015","unstructured":"Giri, D., Maitra, T., Amin, R., Srivastava, P.: An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1), 1\u20139 (2015)","journal-title":"J. Med. Syst."},{"key":"41_CR15","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"Debiao He","year":"2015","unstructured":"He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences 321, 263\u2013277 (2015), security and privacy information technologies and applications for wireless pervasive computing environments","journal-title":"Information Sciences"},{"issue":"10","key":"41_CR16","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s10916-014-0116-z","volume":"38","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Chilamkurti, N., Lee, J.H.: Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J. Med. Syst. 38(10), 116 (2014)","journal-title":"J. Med. Syst."},{"issue":"6","key":"41_CR17","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1016\/j.cose.2012.06.001","volume":"31","author":"Wen-Bin Hsieh","year":"2012","unstructured":"Hsieh, W.B., Leu, J.S.: Exploiting hash functions to intensify the remote user authentication scheme. Comput. Secur. 31(6), 791\u2013798 (2012)","journal-title":"Computers & Security"},{"issue":"3","key":"41_CR18","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1007\/s11277-014-1968-8","volume":"79","author":"SH Islam","year":"2014","unstructured":"Islam, S.H.: A provably secure id-based mutual authentication and key agreement scheme for mobile multi-server environment without esl attack. Wireless Pers. Commun. 79(3), 1975\u20131991 (2014)","journal-title":"Wireless Pers. Commun."},{"key":"41_CR19","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ins.2015.03.050","volume":"312","author":"SH Islam","year":"2015","unstructured":"Islam, S.H.: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf. Sci. 312, 104\u2013130 (2015)","journal-title":"Inf. Sci."},{"issue":"1","key":"41_CR20","doi-asserted-by":"crossref","first-page":"35","DOI":"10.12785\/isl\/030105","volume":"3","author":"SK Hafizul Islam","year":"2014","unstructured":"Islam, S., Gosta Pada Biswas, K.K.C.: Cryptanalysis of an improved smartcard-based remote password authentication scheme. Inf. Sci. Lett. 3(1), 35\u201340 (2014)","journal-title":"Information Sciences Letters"},{"key":"41_CR21","doi-asserted-by":"crossref","unstructured":"Islam, S., Khan, M.K., Obaidat, M., Muhaya, F.: Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps. Wireless Pers. Commun. 1\u201322 (2015)","DOI":"10.1007\/s11277-015-2542-8"},{"key":"41_CR22","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology CRYPTO99. pp. 388\u2013397. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"6","key":"41_CR23","doi-asserted-by":"publisher","first-page":"1997","DOI":"10.1016\/j.compeleceng.2014.05.007","volume":"40","author":"S Kumari","year":"2014","unstructured":"Kumari, S., Khan, M.K., Li, X.: An improved remote user authentication scheme with key agreement. Comput. Electr. Eng. 40(6), 1997\u20132012 (2014)","journal-title":"Comput. Electr. Eng."},{"issue":"11","key":"41_CR24","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"issue":"5","key":"41_CR25","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E., Sloan, R.H., et al.: Examining smart-card security under the threat of power analysis attacks. Comput. IEEE Trans. 51(5), 541\u2013552 (2002)","journal-title":"Comput. IEEE Trans."},{"issue":"7","key":"41_CR26","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/S0167-4048(03)00709-0","volume":"22","author":"JJ Shen","year":"2003","unstructured":"Shen, J.J., Lin, C.W., Hwang, M.S.: Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput. Secur. 22(7), 591\u2013595 (2003)","journal-title":"Comput. Secur."},{"issue":"1","key":"41_CR27","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"WC Ku","year":"2004","unstructured":"Ku, W.C.: S.M.C. Weakness and improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(1), 204\u2013207 (2004)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"41_CR28","first-page":"148","volume":"8","author":"D Wang","year":"2013","unstructured":"Wang, D., Ma, C.G., Zhang, Q.M., Zhao, S.: Secure password-based remote user authentication scheme against smart card security breach. J. Netw. 8(1), 148\u2013155 (2013)","journal-title":"J. Netw."},{"issue":"5","key":"41_CR29","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.csi.2006.11.005","volume":"29","author":"XM Wang","year":"2007","unstructured":"Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput. Stan. Interfaces 29(5), 507\u2013512 (2007)","journal-title":"Comput. Stan. Interfaces"},{"issue":"2","key":"41_CR30","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.compeleceng.2011.11.010","volume":"38","author":"F Wen","year":"2012","unstructured":"Wen, F., Li, X.: An improved dynamic id-based remote user authentication with key agreement scheme. Comput. Electr. Eng. 38(2), 381\u2013387 (2012)","journal-title":"Comput. Electr. Eng."},{"issue":"7","key":"41_CR31","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1016\/j.jcss.2008.04.002","volume":"74","author":"G Yang","year":"2008","unstructured":"Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7), 1160\u20131172 (2008)","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"41_CR32","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/TCE.2004.1309437","volume":"50","author":"EJ Yoon","year":"2004","unstructured":"Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further improvement of an efficient password based remote user authentication scheme using smart cards. Consum. Electron. IEEE Trans. 50(2), 612\u2013614 (2004)","journal-title":"Consum. Electron. IEEE Trans."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T00:14:07Z","timestamp":1718151247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_41","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}