{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:34:07Z","timestamp":1743017647103,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811046414"},{"type":"electronic","value":"9789811046421"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-4642-1_3","type":"book-chapter","created":{"date-parts":[[2017,4,15]],"date-time":"2017-04-15T05:18:49Z","timestamp":1492233529000},"page":"26-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Security on \u201cSecure Remote Login Scheme with Password and Smart Card Update Facilities\u201d"],"prefix":"10.1007","author":[{"given":"Marimuthu","family":"Karuppiah","sequence":"first","affiliation":[]},{"given":"Akshat","family":"Pradhan","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[]},{"given":"S.","family":"Rajkumar","sequence":"additional","affiliation":[]},{"given":"Rahul","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,16]]},"reference":[{"issue":"11","key":"3_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Amin, R.: Cryptanalysis and an efficient secure id-based remote user authentication scheme using smart card. IJCA 75, 1149\u20131157. Citeseer (2013)","DOI":"10.5120\/13175-0909"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Amin, R., Biswas, G.P.: Anonymity preserving secure hash function based authentication scheme for consumer USB mass storage device. In: IEEE 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT), pp. 1\u20136 (2015)","DOI":"10.1109\/C3IT.2015.7060190"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s11277-015-2616-7","volume":"84","author":"R Amin","year":"2015","unstructured":"Amin, R., Biswas, G.P.: Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wirel. Pers. Commun. 84, 439\u2013462 (2015)","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"3_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0217-3","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Biswas, G.P.: A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. J. Med. Syst. 39(3), 1\u201317 (2015)","journal-title":"J. Med. Syst."},{"key":"3_CR6","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/978-81-322-2250-7_52","volume-title":"Information Systems Design and Intelligent Applications","author":"R Amin","year":"2015","unstructured":"Amin, R., Biswas, G.P.: Remote access control mechanism using rabin public key cryptosystem. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds.) Information Systems Design and Intelligent Applications, pp. 525\u2013533. Springer, Heidelberg (2015)"},{"issue":"13","key":"3_CR7","first-page":"37","volume":"75","author":"R Amin","year":"2013","unstructured":"Amin, R., Maitra, T., Rana, S.P.: An improvement of wang. et. al\u2019.s remote user authentication scheme against smart card security breach. Int. J. Comput. Appl. 75(13), 37\u201342 (2013)","journal-title":"Int. J. Comput. Appl."},{"issue":"1","key":"3_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2015","unstructured":"Giri, D., Maitra, T., Amin, R., Srivastava, P.: An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1), 1\u20139 (2015)","journal-title":"J. Med. Syst."},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321, 263\u2013277 (2015)","journal-title":"Inf. Sci."},{"issue":"10","key":"3_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0116-z","volume":"38","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Chilamkurti, N., Lee, J.H.: Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10), 1\u201316 (2014)","journal-title":"J. Med. Syst."},{"issue":"3","key":"3_CR11","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1007\/s11277-014-1968-8","volume":"79","author":"SH Islam","year":"2014","unstructured":"Islam, S.H.: A provably secure ID-based mutual authentication and key agreement scheme for mobile multi-server environment without ESL attack. Wirel. Pers. Commun. 79(3), 1975\u20131991 (2014)","journal-title":"Wirel. Pers. Commun."},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ins.2015.03.050","volume":"312","author":"SH Islam","year":"2015","unstructured":"Islam, S.H.: Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf. Sci. 312, 104\u2013130 (2015)","journal-title":"Inf. Sci."},{"issue":"1","key":"3_CR13","doi-asserted-by":"publisher","first-page":"35","DOI":"10.12785\/isl\/030105","volume":"3","author":"S Islam","year":"2014","unstructured":"Islam, S., Biswas, G.P., Choo, K.K.R.: Cryptanalysis of an improved smartcard-based remote password authentication scheme. Inf. Sci. Lett. 3(1), 35\u201340 (2014)","journal-title":"Inf. Sci. Lett."},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1007\/s11277-015-2542-8","volume":"84","author":"S Islam","year":"2015","unstructured":"Islam, S., Khan, M.K., Obaidat, M., Muhaya, F.: Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps. Wirel. Pers. Commun. 84, 2013\u20132034 (2015)","journal-title":"Wirel. Pers. Commun."},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"3939","DOI":"10.1002\/dac.2590","volume":"27","author":"S Kumari","year":"2013","unstructured":"Kumari, S., Khan, M.K.: Cryptanalysis and improvement of a robust smart-card-based remote user password authentication scheme. Int. J. Commun. Syst. 27, 3939\u20133955 (2013). doi:\n                    10.1002\/dac.2590","journal-title":"Int. J. Commun. Syst."},{"issue":"6","key":"3_CR16","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.cose.2012.06.001","volume":"31","author":"WB Hsieh","year":"2012","unstructured":"Hsieh, W.B., Leu, J.S.: Exploiting hash functions to intensify the remote user authentication scheme. Comput. Secur. 31(6), 791\u2013798 (2012)","journal-title":"Comput. Secur."},{"issue":"6","key":"3_CR17","doi-asserted-by":"publisher","first-page":"1997","DOI":"10.1016\/j.compeleceng.2014.05.007","volume":"40","author":"S Kumari","year":"2014","unstructured":"Kumari, S., Khan, M.K., Li, X.: An improved remote user authentication scheme with key agreement. Comput. Electr. Eng. 40(6), 1997\u20132012 (2014)","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"3_CR18","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"WC Ku","year":"2004","unstructured":"Ku, W.C., Chen, S.M.: Weakness and improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(1), 204\u2013207 (2004)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"4\u20135","key":"3_CR19","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.jisa.2014.09.006","volume":"19","author":"M Karuppiah","year":"2014","unstructured":"Karuppiah, M., Saravanan, R.: A secure remote user mutual authentication scheme using smart cards. J. Inf. Secur. Appl. 19(4\u20135), 282\u2013294 (2014). doi:\n                    10.1016\/j.jisa.2014.09.006","journal-title":"J. Inf. Secur. Appl."},{"issue":"2","key":"3_CR20","first-page":"141","volume":"2","author":"R Ramasamy","year":"2009","unstructured":"Ramasamy, R., Muniyandi, A.P.: New remote mutual authentication scheme using smart cards. Trans. Data Priv. 2(2), 141\u2013152 (2009)","journal-title":"Trans. Data Priv."},{"issue":"5","key":"3_CR21","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.csi.2006.11.005","volume":"29","author":"XM Wang","year":"2007","unstructured":"Wang, X.M., Zhang, W.F., Zhang, J.S., Khan, M.K.: Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput. Stan. Interfaces 29(5), 507\u2013512 (2007)","journal-title":"Comput. Stan. Interfaces"},{"issue":"2","key":"3_CR22","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/TCE.2004.1309437","volume":"50","author":"EJ Yoon","year":"2004","unstructured":"Yoon, E.J., Ryu, E.K., Yoo, K.Y.: Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(2), 612\u2013614 (2004)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"3_CR23","first-page":"148","volume":"8","author":"D Wang","year":"2013","unstructured":"Wang, D., Ma, C.G., Zhang, Q.M., Zhao, S.: Secure password-based remote user authentication scheme against smart card security breach. J. Netw. 8(1), 148\u2013155 (2013)","journal-title":"J. Netw."},{"issue":"7","key":"3_CR24","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1016\/j.jcss.2008.04.002","volume":"74","author":"G Yang","year":"2008","unstructured":"Yang, G., Wong, D.S., Wang, H., Deng, X.: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7), 1160\u20131172 (2008)","journal-title":"J. Comput. Syst. Sci."},{"key":"3_CR25","series-title":"Advances in Intelligent Systems and Computing (AISC)","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-81-322-2695-6-41","volume-title":"Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA)","author":"R Kumar","year":"2015","unstructured":"Kumar, R., Amin, R., Karati, A., Biswas, G.P.: Secure remote login scheme with password and smart card update facilities. In: Das, S., Pal, T., Kar, S., Satapathy, S., Mandal, J. (eds.) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA). Advances in Intelligent Systems and Computing (AISC), vol. 404, pp. 495\u2013505. Springer, Heidelberg (2015). doi:\n                    10.1007\/978-81-322-2695-6-41"},{"issue":"3","key":"3_CR26","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1007\/s11277-015-2524-x","volume":"84","author":"M Karuppiah","year":"2015","unstructured":"Karuppiah, M., Saravanan, R.: A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3), 2055\u20132078 (2015)","journal-title":"Wirel. Pers. Commun."},{"issue":"5","key":"3_CR27","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1080\/09720529.2015.1013693","volume":"18","author":"M Karuppiah","year":"2015","unstructured":"Karuppiah, M., Saravanan, R.: Cryptanalysis and an Improvement of New Remote Mutual Authentication Scheme using Smart Cards. Journal of Discrete Mathematical Sciences and Cryptography 18(5), 623\u2013649 (2015)","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography"},{"key":"3_CR28","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1002\/sec.1558","volume":"9","author":"F Wu","year":"2016","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X., Das, A.K., Khan, M.K., Karuppiah, M., Baliyan, R.: A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Netw. Secur. Commun. 9, 3527\u20133542 (2016). doi:\n                    10.1002\/sec.1558","journal-title":"Netw. Secur. Commun."},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Kumari, S., Karuppiah, M., Li, X., Wu, F., Das, A.K., Odelu, V.: A Secure Trust-Extended Authentication Mechanism for VANETs. Security and Communication Network (2016)","DOI":"10.1002\/sec.1602"},{"key":"3_CR30","doi-asserted-by":"publisher","first-page":"4192","DOI":"10.1002\/sec.1598","volume":"9","author":"M Karuppiah","year":"2016","unstructured":"Karuppiah, M., Kumari, S., Das, A.K., Li, X., Wu, F., Basu, S.A.: A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. Secur. Commun. Netw. 9, 4192\u20134209 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"3_CR31","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1504\/IJIPT.2016.079548","volume":"9","author":"M Karuppiah","year":"2016","unstructured":"Karuppiah, M.: Remote user authentication scheme using smart card: a review. Int. J. Internet Protoc. Technol. 9, 107\u2013120 (2016)","journal-title":"Int. J. Internet Protoc. Technol."},{"issue":"4","key":"3_CR32","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu, J., Zhu, W.T., Feng, D.G.: An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4), 723\u2013728 (2009)","journal-title":"Comput. Stand. Interfaces"},{"key":"3_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2013 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances in Cryptology \u2013 CRYPTO\u2019 99. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). doi:\n                    10.1007\/3-540-48405-1_25"},{"issue":"5","key":"3_CR34","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"3_CR35","doi-asserted-by":"publisher","first-page":"2215","DOI":"10.1002\/dac.2468","volume":"27","author":"CG Ma","year":"2012","unstructured":"Ma, C.G., Wang, D., Zhao, S.D.: Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst. 27, 2215\u20132227 (2012). doi:\n                    10.1002\/dac.2468","journal-title":"Int. J. Commun. Syst."}],"container-title":["Communications in Computer and Information Science","Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-4642-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:25:16Z","timestamp":1558394716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-4642-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811046414","9789811046421"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-4642-1_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"16 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICMC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mathematics and Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haldia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 January 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icmc2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/hithaldia.co.in\/icmc2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}