{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T19:22:04Z","timestamp":1748805724299,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":52,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811680588"},{"type":"electronic","value":"9789811680595"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-8059-5_10","type":"book-chapter","created":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:03:12Z","timestamp":1638450192000},"page":"155-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Pluggable Authentication Module Meets Identity-Based Identification"],"prefix":"10.1007","author":[{"given":"Jason","family":"Chia","sequence":"first","affiliation":[]},{"given":"Ji-Jian","family":"Chin","sequence":"additional","affiliation":[]},{"given":"Sook-Chin","family":"Yip","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"10_CR1","unstructured":"Samar, V., Schemers, R.: Unified login with pluggable authentication modules (PAM). RFC 86.0, Open Software Foundation, October 1995. https:\/\/opensource.apple.com\/source\/pam\/pam-31\/pam\/doc\/specs\/rfc86.0.txt.auto.html"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Samar, V.: Unified login with pluggable authentication modules (PAM). In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS 1996, New York, NY, USA, pp. 1\u201310. Association for Computing Machinery (1996). https:\/\/doi.org\/10.1145\/238168.238177","DOI":"10.1145\/238168.238177"},{"key":"10_CR3","unstructured":"Garfinkel, S., Spafford, G., Schwartz, A.: Pluggable Authentication Modules, pp. 114\u2013116. O\u2019Reilly (2003)"},{"key":"10_CR4","unstructured":"Kukuk, T., Mr\u00e1z, T., Levin, D.V., Morgan, A.G.: Pluggable authentication modules for Linux, December 1997. https:\/\/www.linuxjournal.com\/article\/2120. Accessed 1 Dec 1997"},{"key":"10_CR5","volume-title":"Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers","author":"K Geisshirt","year":"2007","unstructured":"Geisshirt, K.: Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers. Packt Publishing, Birmingham (2007)"},{"key":"10_CR6","unstructured":"Morgan, A.G., Kukuk, T.: The Linux-PAM system administrators\u2019 guide, August 2010. http:\/\/www.linux-pam.org\/Linux-PAM-html\/Linux-PAM_SAG.html"},{"key":"10_CR7","unstructured":"Comparison of the usage statistics of Linux vs. windows for websites. https:\/\/w3techs.com\/technologies\/comparison\/os-linux,os-windows. Accessed 27 May 2021"},{"key":"10_CR8","unstructured":"OS\/Linux distributions using Apache. https:\/\/secure1.securityspace.com\/s_survey\/data\/man.202104\/apacheos.html. Accessed 1 May 2021"},{"key":"10_CR9","unstructured":"PADL Software Pty Ltd: pam$$\\_$$ldap(1) Linux User\u2019s Manual (2000)"},{"key":"10_CR10","unstructured":"Cusack, F., Salomon, A., Allbery, R.: pam-krb5, March 2021. https:\/\/www.eyrie.org\/~eagle\/software\/pam-krb5\/"},{"key":"10_CR11","unstructured":"Mantova, V. (2013). http:\/\/www1.maths.leeds.ac.uk\/~pmtvlm\/pam-sasl.html. Accessed 23 July 2013"},{"key":"10_CR12","unstructured":"Kukushkin, A.: pam-oauth2 (2017). https:\/\/github.com\/CyberDem0n\/pam-oauth2"},{"key":"10_CR13","unstructured":"Velissek, O.: pam-oauth2-device (2018). https:\/\/github.com\/ondrejvelisek\/pam_oauth2_device"},{"key":"10_CR14","unstructured":"Motoki, S.: pam-exec-oauth2 (2017). https:\/\/github.com\/shimt\/pam-exec-oauth2"},{"key":"10_CR15","unstructured":"Lindfors, K., Josefsson, S., Thulin, F., S., H., Babioch, K.: pam-yubico (2008). https:\/\/github.com\/Yubico\/yubico-pam"},{"key":"10_CR16","unstructured":"Mauro, A.D., Martelletto, P., Michaelsson, L., Bierbaumer, B.: pam-u2f (2014). https:\/\/github.com\/Yubico\/pam-u2f"},{"key":"10_CR17","unstructured":"Strasser, M., Martinez, J.A.: pam$$\\_$$pkcs11(8) Linux User\u2019s Manual (2005)"},{"key":"10_CR18","unstructured":"Moody, P., Harrington, B., Shuffler, S.: pam-ussh (2018). https:\/\/github.com\/uber\/pam-ussh"},{"key":"10_CR19","unstructured":"Witts, J.: The top 5 biggest cyber security threats that small businesses face and how to stop them, May 2021. https:\/\/expertinsights.com\/insights\/the-top-5-biggest-cyber-security-threats-that-small-businesses-face-and-how-to-stop-them\/"},{"key":"10_CR20","unstructured":"Tunggal, A.T.: What is an attack vector? 16 common attack vectors in 2021, May 2021. https:\/\/www.upguard.com\/blog\/attack-vector"},{"key":"10_CR21","unstructured":"Password security best practices in 2021, November 2020. https:\/\/www.swisscyberforum.com\/blog\/is-your-password-secure\/"},{"key":"10_CR22","unstructured":"Most hacked passwords revealed as UK cyber survey exposes gaps in online security. National Cyber Security Centre, April 2019. https:\/\/www.ncsc.gov.uk\/news\/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security"},{"key":"10_CR23","unstructured":"Swinhoe, D.: The 15 biggest data breaches of the 21st century. CSO, January 2021. https:\/\/www.csoonline.com\/article\/2130877\/the-biggest-data-breaches-of-the-21st-century.html"},{"key":"10_CR24","unstructured":"Srinivas, S., Balfanz, D., Tiffany, E., Czeskis, A.: Universal 2nd factor (U2F) overview, April 2017. https:\/\/fidoalliance.org\/specs\/fido-u2f-v1.2-ps-20170411\/fido-u2f-overview-v1.2-ps-20170411.html"},{"key":"10_CR25","unstructured":"Pkcs #11 v2.20: Cryptographic token interface standard. RSA Laboratories Public Key Cryptography Standards, June 2004"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Igoe, K., Stebila, D.: X.509v3 Certificates for Secure Shell Authentication. RFC 6187, March 2011. https:\/\/rfc-editor.org\/rfc\/rfc6187.txt","DOI":"10.17487\/rfc6187"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18, 1 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-540-24632-9_18","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"K Kurosawa","year":"2004","unstructured":"Kurosawa, K., Heng, S.-H.: From digital signature to ID-based identification\/signature. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 248\u2013261. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24632-9_18"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/978-3-540-24676-3_17","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M Bellare","year":"2004","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 268\u2013286. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_17"},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"issue":"1","key":"10_CR31","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.tcs.2008.07.001","volume":"407","author":"G Yang","year":"2008","unstructured":"Yang, G., Chen, J., Wong, D.S., Deng, X., Wang, D.: A new framework for the design and analysis of identity-based identification schemes. Theoret. Comput. Sci. 407(1), 370\u2013388 (2008)","journal-title":"Theoret. Comput. Sci."},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-31284-7_9","volume-title":"Applied Cryptography and Network Security","author":"A Fujioka","year":"2012","unstructured":"Fujioka, A., Saito, T., Xagawa, K.: Security enhancements by OR-proof in identity-based identification. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 135\u2013152. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31284-7_9"},{"key":"10_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-540-69485-4_5","volume-title":"Public Key Infrastructure","author":"J-J Chin","year":"2008","unstructured":"Chin, J.-J., Heng, S.-H., Goi, B.-M.: An efficient and provable secure identity-based identification scheme in the standard model. In: Mj\u00f8lsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol. 5057, pp. 60\u201373. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-69485-4_5"},{"key":"10_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-642-27142-7_42","volume-title":"Future Generation Information Technology","author":"S-Y Tan","year":"2011","unstructured":"Tan, S.-Y., Heng, S.-H., Phan, R.C.-W., Goi, B.-M.: A variant of Schnorr identity-based identification scheme with tight reduction. In: Kim, T., et al. (eds.) FGIT 2011. LNCS, vol. 7105, pp. 361\u2013370. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-27142-7_42"},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"237514","DOI":"10.1155\/2015\/237514","volume":"2015","author":"JJ Chin","year":"2015","unstructured":"Chin, J.J., Tan, S.Y., Heng, S.H., Phan, R.: Twin-Schnorr: a security upgrade for the Schnorr identity-based identification scheme. Sci. World J. 2015, 237514 (2015)","journal-title":"Sci. World J."},{"issue":"4","key":"10_CR36","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1007\/s12095-015-0162-5","volume":"8","author":"JJ Chin","year":"2015","unstructured":"Chin, J.J., Tan, S.Y., Heng, S.H., Phan, R.C.W.: Twin-beth: security under active and concurrent attacks for the beth identity-based identification scheme. Cryptogr. Commun. 8(4), 579\u2013591 (2015)","journal-title":"Cryptogr. Commun."},{"key":"10_CR37","doi-asserted-by":"publisher","first-page":"61711","DOI":"10.1109\/ACCESS.2020.2983750","volume":"8","author":"J Chia","year":"2020","unstructured":"Chia, J., Chin, J.: An identity based-identification scheme with tight security against active and concurrent adversaries. IEEE Access 8, 61711\u201361725 (2020)","journal-title":"IEEE Access"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Chia, J., Chin, J.J., Yip, S.C.: A pairing-free identity-based identification scheme with tight security using modified-Schnorr signatures. Symmetry 13(8) (2021). https:\/\/www.mdpi.com\/2073-8994\/13\/8\/1330","DOI":"10.3390\/sym13081330"},{"key":"10_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-35404-5_14","volume-title":"Cryptology and Network Security","author":"A Fujioka","year":"2012","unstructured":"Fujioka, A., Saito, T., Xagawa, K.: Applicability of OR-proof techniques to hierarchical identity-based identification. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 169\u2013184. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35404-5_14"},{"key":"10_CR40","first-page":"93","volume":"13","author":"A Vangujar","year":"2018","unstructured":"Vangujar, A., Chin, J., Tan, S., Ng, T.: A hierarchical identity-based identification scheme without pairing. Malays. J. Math. Sci. 13, 93\u2013109 (2018)","journal-title":"Malays. J. Math. Sci."},{"key":"10_CR41","doi-asserted-by":"publisher","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"J Katz","year":"2014","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography, 2nd edn. Chapman & Hall\/CRC, Boca Raton (2014)","edition":"2"},{"key":"10_CR42","unstructured":"Youngblood, C.: An introduction to identity-based cryptography, March 2005. https:\/\/courses.cs.washington.edu\/courses\/csep590\/06wi\/finalprojects\/youngblood_csep590tu_final_paper.pdf"},{"key":"10_CR43","doi-asserted-by":"crossref","unstructured":"Bai, Q.-H.: Comparative research on two kinds of certification systems of the public key infrastructure (PKI) and the identity based encryption (IBE). In: Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), pp. 147\u2013150, July 2012","DOI":"10.1109\/CSQRWC.2012.6294997"},{"key":"10_CR44","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-981-33-6835-4_12","volume-title":"Advances in Cyber Security","author":"J Chia","year":"2021","unstructured":"Chia, J., Chin, J.-J., Yip, S.-C.: Evaluating pairing-free identity-based identification using curve25519. In: Anbar, M., Abdullah, N., Manickam, S. (eds.) ACeS 2020. CCIS, vol. 1347, pp. 179\u2013193. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-6835-4_12"},{"key":"10_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"key":"10_CR46","unstructured":"Morgan, A.G., Kukuk, T.: The Linux-PAM module writers\u2019 guide, August 2010. http:\/\/www.linux-pam.org\/Linux-PAM-html\/Linux-PAM_MWG.html"},{"key":"10_CR47","unstructured":"Bernstein, D., Lange, T., Schwabe, P.: The security impact of a new cryptographic library. IACR Cryptology ePrint Archive 2011, 646, January 2011"},{"key":"10_CR48","doi-asserted-by":"crossref","unstructured":"Ylonen, T.: The secure shell (SSH) protocol architecture. RFC 4521, January 2006. https:\/\/www.rfc-editor.org\/rfc\/rfc4251.txt","DOI":"10.17487\/rfc4251"},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"Percival, C., Josefsson, S.: The scrypt Password-Based Key Derivation Function. RFC 7914, August 2016. https:\/\/rfc-editor.org\/rfc\/rfc7914.txt","DOI":"10.17487\/RFC7914"},{"key":"10_CR50","unstructured":"Denis, F.: Secure memory, May 2018. https:\/\/libsodium.gitbook.io\/doc\/memory_management"},{"key":"10_CR51","doi-asserted-by":"crossref","unstructured":"Hamilton, C., Olmstead, A.: Database multi-factor authentication via pluggable authentication modules. In: 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 367\u2013368 (2017)","DOI":"10.23919\/ICITST.2017.8356421"},{"key":"10_CR52","unstructured":"Elaine, B.: Recommendation for Key Management, Part 1: General, 5th edn. U.S. Department of Commerce, National Institute of Standards and Technology (2020)"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-8059-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T13:14:44Z","timestamp":1638450884000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-8059-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811680588","9789811680595"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-8059-5_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"92","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}