{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:04:52Z","timestamp":1725843892962},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811002809"},{"type":"electronic","value":"9789811002816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-981-10-0281-6_7","type":"book-chapter","created":{"date-parts":[[2015,12,17]],"date-time":"2015-12-17T04:57:57Z","timestamp":1450328277000},"page":"45-51","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables"],"prefix":"10.1007","author":[{"given":"Jaewook","family":"Jung","sequence":"first","affiliation":[]},{"given":"Younsung","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Donghoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jiye","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jongho","family":"Mun","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of ACM 24, 770\u2013772 (1981)","journal-title":"Communications of ACM"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"ML Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: A Dynamic ID-based Remote User Authentication Scheme. IEEE Transactions on Consumer Electronics 50, 629\u2013631 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"7_CR3","unstructured":"Liao, I.E., Lee, C.C., Hwang, M.S.: Security enhancement for a dynamic id-based remote user authentication scheme. In: Proceedings of the International Conference on the Next Generation Web Services Practices, pp. 22\u201326 (2005)"},{"key":"7_CR4","first-page":"211","volume":"6","author":"M Misbahuddin","year":"2008","unstructured":"Misbahuddin, M., Bindu, C.S.: Cryptanalysis of Liao- Lee-Hwang\u2019s Dynamic ID Scheme. International Journal of Network Security 6, 211\u2013213 (2008)","journal-title":"International Journal of Network Security"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"YY Wang","year":"2009","unstructured":"Wang, Y.Y., Liu, J.Y., Xia, F.X., Dan, J.: A More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme. Computer Communications 32, 583\u2013585 (2009)","journal-title":"Computer Communications"},{"key":"7_CR6","first-page":"32","volume":"1","author":"MA Ahmed","year":"2009","unstructured":"Ahmed, M.A., Lakshmi, D.R., Sattar, S.A.: Cryptanalysis of A More Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme. International Journal of Network Security & Its Applications 1, 32\u201337 (2009)","journal-title":"International Journal of Network Security & Its Applications"},{"key":"7_CR7","first-page":"190","volume":"59","author":"H Lee","year":"2009","unstructured":"Lee, H., Choi, D., Lee, Y., Won, D., Kim, S.: Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol. Proceedings of the World Academy of Science Engineering and Technology 59, 190\u2013193 (2009)","journal-title":"Proceedings of the World Academy of Science Engineering and Technology"},{"key":"7_CR8","first-page":"355","volume":"6","author":"YC Lee","year":"2012","unstructured":"Lee, Y.C.: A New Dynamic ID-based User Authentication Scheme to Resist Smart-Card-Theft Attack. Applied Mathematics and Information Sciences 6, 355\u2013361 (2012)","journal-title":"Applied Mathematics and Information Sciences"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"485","DOI":"10.12785\/amis\/090156","volume":"9","author":"TF Lee","year":"2014","unstructured":"Lee, T.F.: An Efficient Dynamic ID-based User Authentication Scheme using Smartcard without Verifier Tables. Applied Mathematics and Information Sciences 9, 485\u2013490 (2014)","journal-title":"Applied Mathematics and Information Sciences"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Proceedings of Advances in Cryptology (CRYPTO 1999), vol. 1666, pp. 388\u2013397 (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"4","key":"7_CR11","first-page":"6443","volume":"14","author":"J Nam","year":"2014","unstructured":"Nam, J., Choo, K.K.R., Kim, J., Kang, H.K., Kim, J., Paik, J., Won, D.: Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model. Sensors 2014 14(4), 6443\u20136462 (2014)","journal-title":"Sensors 2014"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Jung, J., Jeon, W., Won, D.: An enhanced remote user authentication scheme using smart card. In: ICUIMC 2014 (2014)","DOI":"10.1145\/2557977.2558021"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0281-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:16:38Z","timestamp":1559348198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0281-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9789811002809","9789811002816"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0281-6_7","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015]]}}}