{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T00:10:06Z","timestamp":1751760606076,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":39,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811310553"},{"type":"electronic","value":"9789811310560"}],"license":[{"start":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T00:00:00Z","timestamp":1532390400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-1056-0_31","type":"book-chapter","created":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T16:30:31Z","timestamp":1532363431000},"page":"295-301","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Hou-Wang\u2019s User Authentication Scheme"],"prefix":"10.1007","author":[{"given":"Min-Shiang","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Hung-Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Cheng-Ying","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,24]]},"reference":[{"key":"31_CR1","first-page":"101","volume":"3","author":"CS Tsai","year":"2006","unstructured":"Tsai CS, Lee CC, Hwang MS (2006) Password authentication schemes: current status and key issues. Int J Netw Secur 3:101\u2013115","journal-title":"Int J Netw Secur"},{"key":"31_CR2","doi-asserted-by":"crossref","first-page":"551","DOI":"10.15388\/Informatica.2003.041","volume":"14","author":"CC Yang","year":"2003","unstructured":"Yang CC, Chang TY, Hwang MS (2003) The security of the improvement on the methods for protecting password transmission. Informatica 14:551\u2013558","journal-title":"Informatica"},{"key":"31_CR3","first-page":"271","volume":"16","author":"X Zhuang","year":"2014","unstructured":"Zhuang X, Chang CC, Wang ZH, Zhu Y (2014) A simple password authentication scheme based on geometric hashing function. Int J Netw Secur 16:271\u2013277","journal-title":"Int J Netw Secur"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Ling CH, Chao WY, Chen SM, Hwang MS (2015) Cryptanalysis of dynamic identity based on a remote user authentication scheme for a multi-server environment. In: Advances in engineering research, vol 15. Atlantis Press, pp 981\u2013986","DOI":"10.2991\/ameii-15.2015.181"},{"issue":"1","key":"31_CR5","first-page":"1","volume":"19","author":"Y Liu","year":"2017","unstructured":"Liu Y, Chang CC, Chang SC (2017) An efficient and secure smart card based password authentication scheme. Int J Netw Secur 19(1):1\u201310","journal-title":"Int J Netw Secur"},{"key":"31_CR6","first-page":"188","volume-title":"Recent Developments in Intelligent Systems and Interactive Applications","author":"Chi-Wei Liu","year":"2016","unstructured":"Liu CW, Tsai CY, Hwang MS (2017) Cryptanalysis of an efficient and secure smart card based password authentication scheme. In: Advances in intelligent systems and computing, recent developments in intelligent systems and interactive applications, vol 541. Springer, pp 188\u2013193 (2017)"},{"issue":"4","key":"31_CR7","first-page":"782","volume":"18","author":"J Wei","year":"2016","unstructured":"Wei J, Liu W, Hu X (2016) Secure and efficient smart card based remote user password authentication scheme. Int J Netw Secur 18(4):782\u2013792","journal-title":"Int J Netw Secur"},{"key":"31_CR8","first-page":"194","volume-title":"Recent Developments in Intelligent Systems and Interactive Applications","author":"Cheng-Yi Tsai","year":"2016","unstructured":"Tsai CY, Pan CS, Hwang MS (2017) An improved password authentication scheme for smart card. In: Advances in intelligent systems and computing, recent developments in intelligent systems and interactive applications, vol 541. Springer, pp 194\u2013199"},{"issue":"2","key":"31_CR9","first-page":"362","volume":"18","author":"PK Thandra","year":"2016","unstructured":"Thandra PK, Rajan J, Satya Murty SAV (2016) Cryptanalysis of an efficient password authentication scheme. Int J Netw Secur 18(2):362\u2013368","journal-title":"Int J Netw Secur"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Pan CS, Tsai CY, Tsaur SC, Hwang MS (2016) Cryptanalysis of an efficient password authentication scheme. In: The 3rd IEEE international conference on systems and informatics, Shaihai, pp 732\u2013737","DOI":"10.1109\/ICSAI.2016.7811051"},{"key":"31_CR11","unstructured":"Pan HT, Pan, CS, Tsaur, SC, Hwang, MS (2017) Cryptanalysis of efficient dynamic ID based remote user authentication scheme in multi-server environment using smart card. In: 12th international conference on computational intelligence and security, Wuxi, China, pp 590\u2013593"},{"key":"31_CR12","first-page":"58","volume":"13","author":"D He","year":"2011","unstructured":"He D, Chen J, Hu J (2011) Weaknesses of a remote user password authentication scheme using smart card. Int J Netw Secur 13:58\u201360","journal-title":"Int J Netw Secur"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.jss.2009.07.050","volume":"83","author":"MS Hwang","year":"2000","unstructured":"Hwang MS, Chong SK, Chen TY (2000) Dos-resistant ID-based password authentication scheme using smart cards. J Syst Softw 83:163\u2013172","journal-title":"J Syst Softw"},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"MS Hwang","year":"2000","unstructured":"Hwang MS, Li LH (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46:28\u201330","journal-title":"IEEE Trans Consum Electron"},{"key":"31_CR15","first-page":"167","volume":"13","author":"M Kumar","year":"2011","unstructured":"Kumar M, Gupta MK, Kumari S (2011) An improved efficient remote password authentication scheme with smart card over insecure networks. Int J Netw Secur 13:167\u2013177","journal-title":"Int J Netw Secur"},{"key":"31_CR16","first-page":"180","volume":"14","author":"R Ramasamy","year":"2012","unstructured":"Ramasamy R, Muniyandi AP (2012) An efficient password authentication scheme for smart card. Int J Netw Secur 14:180\u2013186","journal-title":"Int J Netw Secur"},{"key":"31_CR17","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/S0167-4048(03)00709-0","volume":"22","author":"JJ Shen","year":"2003","unstructured":"Shen JJ, Lin CW, Hwang MS (2003) Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput Secur 22:591\u2013595","journal-title":"Comput Secur"},{"key":"31_CR18","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/TCE.2003.1209534","volume":"49","author":"JJ Shen","year":"2003","unstructured":"Shen JJ, Lin CW, Hwang MS (2003) A modified remote user authentication scheme using smart cards. IEEE Trans Consum Electron 49:414\u2013416","journal-title":"IEEE Trans Consum Electron"},{"key":"31_CR19","first-page":"446","volume":"15","author":"H Tang","year":"2013","unstructured":"Tang H, Liu X, Jiang L (2013) A robust and efficient timestamp-based remote user authentication scheme with smart card lost attack resistance. Int J Netw Secur 15:446\u2013454","journal-title":"Int J Netw Secur"},{"key":"31_CR20","first-page":"156","volume":"14","author":"L Yang","year":"2012","unstructured":"Yang L, Ma JF, Jiang Q (2012) Mutual authentication scheme with smart cards and password under trusted computing. Int J Netw Secur 14:156\u2013163","journal-title":"Int J Netw Secur"},{"issue":"3","key":"31_CR21","first-page":"414","volume":"20","author":"D Ghosh","year":"2018","unstructured":"Ghosh D, Li C, Yang C (2018) A lightweight authentication protocol in smart grid. Int J Netw Secur 20(3):414\u2013422","journal-title":"Int J Netw Secur"},{"key":"31_CR22","first-page":"318","volume":"16","author":"TH Feng","year":"2014","unstructured":"Feng TH, Ling CH, Hwang MS (2014) Cryptanalysis of Tan\u2019s improvement on a password authentication scheme for multi-server environments. Int J Netw Secur 16:318\u2013321","journal-title":"Int J Netw Secur"},{"key":"31_CR23","first-page":"282","volume":"15","author":"D He","year":"2013","unstructured":"He D, Zhao W, Wu S (2013) Security analysis of a dynamic id-based authentication scheme for multi-server environment using smart cards. Int J Netw Secur 15:282\u2013292","journal-title":"Int J Netw Secur"},{"key":"31_CR24","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"LH Li","year":"2001","unstructured":"Li LH, Lin IC, Hwang MS (2001) A remote password authentication scheme for multi-server architecture using neural networks. IEEE Trans Neural Netw 12:1498\u20131504","journal-title":"IEEE Trans Neural Netw"},{"key":"31_CR25","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","volume":"19","author":"IC Lin","year":"2003","unstructured":"Lin IC, Hwang MS, Li LH (2003) A new remote user authentication scheme for multi-server architecture. Futur Gener Comput Syst 19:13\u201322","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"31_CR26","first-page":"172","volume":"18","author":"R Amin","year":"2016","unstructured":"Amin R (2016) Cryptanalysis and efficient dynamic ID based remote user authentication scheme in multi-server environment using smart card. Int J Netw Secur 18(1):172\u2013181","journal-title":"Int J Netw Secur"},{"issue":"2","key":"31_CR27","first-page":"217","volume":"20","author":"NBM Mohan","year":"2018","unstructured":"Mohan NBM, Chakravarthy ASN, Ravindranath C (2018) Cryptanalysis of design and analysis of a provably secure multi-server authentication scheme. Int J Netw Secur 20(2):217\u2013224","journal-title":"Int J Netw Secur"},{"key":"31_CR28","first-page":"2181","volume":"6","author":"CT Li","year":"2010","unstructured":"Li CT, Hwang MS (2010) An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards. Int J Innov Comput Inf Control 6:2181\u20132188","journal-title":"Int J Innov Comput Inf Control"},{"key":"31_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33:1\u20135","journal-title":"J Netw Comput Appl"},{"key":"31_CR30","first-page":"65","volume":"16","author":"A Prakash","year":"2014","unstructured":"Prakash A (2014) A biometric approach for continuous user authentication by fusing hard and soft traits. Int J Netw Secur 16:65\u201370","journal-title":"Int J Netw Secur"},{"issue":"4","key":"31_CR31","first-page":"487","volume":"19","author":"H Zhu","year":"2017","unstructured":"Zhu H, Zhang Y (2017) An improved two-party password-authenticated key agreement protocol with privacy protection based on chaotic maps. Int J Netw Secur 19(4):487\u2013497","journal-title":"Int J Netw Secur"},{"issue":"5","key":"31_CR32","first-page":"785","volume":"19","author":"M Wu","year":"2017","unstructured":"Wu M, Chen J, Wang R (2017) An enhanced anonymous password-based authenticated key agreement scheme with formal proof. Int J Netw Secur 19(5):785\u2013793","journal-title":"Int J Netw Secur"},{"issue":"1","key":"31_CR33","first-page":"828","volume":"7","author":"J Li","year":"2012","unstructured":"Li J, Liu S, Wu S (2012) Cryptanalysis and improvement of a YS-like user authentication scheme. Int J Digit Conten Technol Appl 7(1):828\u2013836","journal-title":"Int J Digit Conten Technol Appl"},{"key":"31_CR34","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1201\/b18331-25","volume-title":"Future Communication Technology and Engineering","author":"T Feng","year":"2015","unstructured":"Feng TH, Chao WY, Hwang MS (2014) Cryptanalysis and improvement of the Li-Liu-Wu user authentication scheme. In: International conference on future communication technology and engineering, Shenzhen, China, pp 103\u2013106"},{"issue":"5","key":"31_CR35","first-page":"3661","volume":"8","author":"EJ Yoon","year":"2012","unstructured":"Yoon EJ, Kim SH, Yoo KY (2012) A security enhanced remote user authentication scheme using smart cards. Int J Innov Comput, Inf Control 8(5):3661\u20133675","journal-title":"Int J Innov Comput, Inf Control"},{"key":"31_CR36","doi-asserted-by":"crossref","unstructured":"Chen TY, Ling CH, Hwang MS (2014) Weaknesses of the Yoon-Kim-Yoo remote user authentication scheme using smart cards. In: IEEE workshop on electronics, computer and applications, Ottawa, Canada, pp 771\u2013774","DOI":"10.1109\/IWECA.2014.6845736"},{"key":"31_CR37","first-page":"463","volume":"16","author":"HF Huang","year":"2014","unstructured":"Huang HF, Chang HW, Yu PK (2014) Enhancement of timestamp-based user authentication scheme with smart card. Int J Netw Secur 16:463\u2013467","journal-title":"Int J Netw Secur"},{"key":"31_CR38","doi-asserted-by":"crossref","unstructured":"Feng TH, Ling CH, Hwang MS (2014) An improved timestamp-based user authentication scheme with smart card. In: The 2nd congress on computer science and application, Sanya, China, pp 111\u2013117 (2014)","DOI":"10.1142\/9789814689007_0017"},{"issue":"6","key":"31_CR39","first-page":"904","volume":"19","author":"G Hou","year":"2017","unstructured":"Hou G, Wang Z (2017) A robust and efficient remote authentication scheme from elliptic curve cryptosystem. Int J Netw Secur 19(6):904\u2013911","journal-title":"Int J Netw Secur"}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-1056-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T23:42:11Z","timestamp":1751758931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-1056-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,24]]},"ISBN":["9789811310553","9789811310560"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-1056-0_31","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2018,7,24]]}}}