{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:19:13Z","timestamp":1725700753052},"publisher-location":"Dordrecht","reference-count":14,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400750821"},{"type":"electronic","value":"9789400750838"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-94-007-5083-8_29","type":"book-chapter","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T06:31:00Z","timestamp":1345098660000},"page":"233-240","source":"Crossref","is-referenced-by-count":2,"title":["Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment"],"prefix":"10.1007","author":[{"given":"Mijin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Namje","family":"Park","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"29_CR1","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/381906.381946","volume":"20","author":"S.M. Bellovin","year":"1990","unstructured":"Bellovin, S.M., Merritt, M.: Limitations of the Kerberos authentication system. ACM Computer Communication Review\u00a020(5), 119\u2013132 (1990)","journal-title":"ACM Computer Communication Review"},{"issue":"5","key":"29_CR2","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1109\/49.223869","volume":"11","author":"R. Bird","year":"1993","unstructured":"Bird, R., Gopal, I., Herzberg, A., Janson, P.A., Kutten, S., Molva, R., Yung, M.: Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications\u00a011(5), 679\u2013693 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"29_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorschot, P.C., Wiener, M.J.: Authentication and authenticated key exchange. Designs, Codes and Cryptography\u00a02(2), 107\u2013125 (1992)","journal-title":"Designs, Codes and Cryptography"},{"issue":"1","key":"29_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/130704.130709","volume":"26","author":"L. Gong","year":"1992","unstructured":"Gong, L.: A security risk of depending on synchronized clocks. ACM SIGOPS Operating Systems Review\u00a026(1), 49\u201353 (1992)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"937","DOI":"10.4304\/jnw.5.8.937-941","volume":"5","author":"K.C. Liao","year":"2010","unstructured":"Liao, K.C., Lee, W.-H.: A Novel User Authentication Scheme Based on QR-Code. Journal of Networks\u00a05, 937\u2013941 (2010)","journal-title":"Journal of Networks"},{"issue":"6","key":"29_CR6","first-page":"12","volume":"11","author":"J.-S. Wang","year":"2011","unstructured":"Wang, J.-S., Yang, F.-Y., Paik, I.: A Novel E-cash Payment Protocol Using Trapdoor Hash Function on Smart Mobile Devices. International Journal of Computer Science and Network Security\u00a011(6), 12\u201319 (2011)","journal-title":"International Journal of Computer Science and Network Security"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Schneier, B.: Two-Factor Authentication: Too Little, Too Late, in Inside Risks 178. Communications of the ACM\u00a048(4) (2005)","DOI":"10.1145\/1053291.1053327"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Aloul, F., Zahidi, S., EI-Hajj, W.: Two Factor Authentication Using Mobile Phones. Computer Systems and Applications, 641\u2013649 (2009)","DOI":"10.1109\/AICCSA.2009.5069395"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/11610496_100","volume-title":"Advanced Web and Network Technologies, and Applications","author":"N. Park","year":"2006","unstructured":"Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol.\u00a03842, pp. 741\u2013748. Springer, Heidelberg (2006)"},{"key":"29_CR10","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-642-16339-5_10","volume-title":"Information Computing and Applications","author":"N. Park","year":"2010","unstructured":"Park, N.: Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol.\u00a0106, pp. 72\u201379. Springer, Heidelberg (2010)"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/978-3-642-23935-9_48","volume-title":"Computational Collective Intelligence. Technologies and Applications","author":"N. Park","year":"2011","unstructured":"Park, N.: Secure UHF\/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: J\u0119drzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol.\u00a06922, pp. 488\u2013496. Springer, Heidelberg (2011)"},{"issue":"4","key":"29_CR12","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1504\/IJAHUC.2011.043583","volume":"8","author":"N. Park","year":"2011","unstructured":"Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing\u00a08(4), 205\u2013219 (2011)","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"key":"29_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-14654-1_30","volume-title":"Wireless Algorithms, Systems, and Applications","author":"N. Park","year":"2010","unstructured":"Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol.\u00a06221, pp. 245\u2013252. Springer, Heidelberg (2010)"},{"issue":"5","key":"29_CR14","first-page":"785","volume":"35","author":"N. Park","year":"2010","unstructured":"Park, N.: The Implementation of Open Embedded S\/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society\u00a035(5), 785\u2013793 (2010)","journal-title":"The Journal of Korea Information and Communications Society"}],"container-title":["Lecture Notes in Electrical Engineering","Information Technology Convergence, Secure and Trust Computing, and Data Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-5083-8_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T14:40:38Z","timestamp":1606315238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-94-007-5083-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9789400750821","9789400750838"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-5083-8_29","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2012]]}}}