{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:04:50Z","timestamp":1725843890601},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811002809"},{"type":"electronic","value":"9789811002816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-981-10-0281-6_2","type":"book-chapter","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T04:57:57Z","timestamp":1450328277000},"page":"7-13","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis on Symmetric Key Techniques Based Authentication Scheme for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Younsung","family":"Choi","sequence":"first","affiliation":[]},{"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Nam, J., Choo, K.K.R., Han, S., Kim, M., Paik, J., Won, D.: Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation. PLOS ONE 10(4) (2015)","DOI":"10.1371\/journal.pone.0116709"},{"issue":"3","key":"2_CR2","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 8(3), 1086\u20131090 (2009)","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2_CR3","unstructured":"Nyang, D., Lee, M.K.: Improvement of Das\u2019s two-factor authentication protocol in wireless sensor networks. IACR Cryptology ePrint Archive (2009)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Khan, M.K., Alghathbar, K.: Security analysis of \u2018two-factor user authentication in wireless sensor networks\u2019. In: Advances in Computer Science and Information Technology. Lecture Notes in Computer Science, vol. 6059, pp. 55\u201360. Springer, Germany (2010)","DOI":"10.1007\/978-3-642-13577-4_5"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Vaidya, B., Makrakis, D., Mouftah, H.T.: Improved two factor user authentication in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010), pp. 600\u2013606, October 2010","DOI":"10.1109\/WIMOB.2010.5645004"},{"issue":"1","key":"2_CR6","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s11235-013-9755-5","volume":"55","author":"JJ Yuan","year":"2014","unstructured":"Yuan, J.J.: An enhanced two-factor user authentication in wireless sensor networks. Telecommunication Systems 55(1), 105\u2013113 (2014)","journal-title":"Telecommunication Systems"},{"issue":"5","key":"2_CR7","doi-asserted-by":"publisher","first-page":"4767","DOI":"10.3390\/s110504767","volume":"11","author":"HL Yeh","year":"2011","unstructured":"Yeh, H.L., et al.: A secured authentication protocol for wireless sensor networks using Elliptic Curves Cryptography. Sensors 11(5), 4767\u20134779 (2011)","journal-title":"Sensors"},{"issue":"6","key":"2_CR8","doi-asserted-by":"publisher","first-page":"10081","DOI":"10.3390\/s140610081","volume":"14","author":"Y Choi","year":"2014","unstructured":"Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., Won, D.: Security enhanced user authent-ication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14(6), 10081\u201310106 (2014)","journal-title":"Sensors"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Chen, L., Fushan, W., Chuangui, M.: A Secure User Authentication Scheme against Smart-Card Loss Attack for Wireless Sensor Networks Using Symmetric Key Techniques. International Journal of Distributed Sensor Networks (2015)","DOI":"10.1155\/2015\/704502"},{"issue":"4","key":"2_CR10","doi-asserted-by":"publisher","first-page":"6443","DOI":"10.3390\/s140406443","volume":"14","author":"J Kim","year":"2014","unstructured":"Kim, J., Lee, D., Jeon, W., Lee, Y., Won, D.: Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4), 6443\u20136462 (2014)","journal-title":"Sensors"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0281-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:16:06Z","timestamp":1559348166000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0281-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9789811002809","9789811002816"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0281-6_2","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015]]}}}