{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:30:04Z","timestamp":1775471404769,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2005,6,25]],"date-time":"2005-06-25T00:00:00Z","timestamp":1119657600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2005,9]]},"DOI":"10.1007\/s00521-004-0460-x","type":"journal-article","created":{"date-parts":[[2005,6,27]],"date-time":"2005-06-27T09:48:33Z","timestamp":1119865713000},"page":"243-249","source":"Crossref","is-referenced-by-count":4,"title":["A user authentication system using back-propagation network"],"prefix":"10.1007","volume":"14","author":[{"given":"Iuon-Chang","family":"Lin","sequence":"first","affiliation":[]},{"given":"Hsia-Hung","family":"Ou","sequence":"additional","affiliation":[]},{"given":"Min-Shiang","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,25]]},"reference":[{"key":"460_CR1","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1109\/21.87093","volume":"21","author":"S Bleha","year":"1991","unstructured":"Bleha S, Obaidat MS (1991) Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Trans Syst Man Cybern 21:452\u2013456","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"460_CR2","doi-asserted-by":"crossref","unstructured":"Chang CC, Hwang RJ, Daniel JB (1993) Using smart cards to authenticate passwords. In: IEEE International Carnahan conference on Security technology, pp 154\u2013156","DOI":"10.1109\/CCST.1993.386808"},{"issue":"7","key":"460_CR3","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/0898-1221(93)90048-Z","volume":"26","author":"CC Chang","year":"1993","unstructured":"Chang CC, Hwang SJ (1993) Using smart cards to authenticate remote passwords. Comput Math Appl 26(7):19\u201327","journal-title":"Comput Math Appl"},{"key":"460_CR4","unstructured":"Damgard IB (1989) A design principle for hash functions. In: Advances in Cryptology, CRYPTO\u201989, pp 416\u2013427"},{"key":"460_CR5","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1145\/361082.361087","volume":"17","author":"A Evans Jr","year":"1974","unstructured":"Evans A Jr, Kantrowitz W, Weiss E (1974) A user authentication scheme not requiring secrecy in the computer. Commun ACM 17:437\u2013442","journal-title":"Commun ACM"},{"key":"460_CR6","doi-asserted-by":"crossref","unstructured":"Ford W (1992) Security techniques for network management. In: Advanced Communications and Applications for High Speed Networks, pp 133\u2013149","DOI":"10.1109\/NOMS.1992.639305"},{"issue":"8","key":"460_CR7","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1016\/S0140-3664(99)00036-5","volume":"22","author":"MS Hwang","year":"1999","unstructured":"Hwang MS (1999) Cryptanalysis of remote login authentication scheme. Comput Commun 22(8):742\u2013744","journal-title":"Comput Commun"},{"key":"460_CR8","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1080\/00207169908804781","volume":"70","author":"MS Hwang","year":"1999","unstructured":"Hwang MS (1999) A remote password authentication scheme based on the digital signature method. Int J Comput Math 70:657\u2013666","journal-title":"Int J Comput Math"},{"issue":"2","key":"460_CR9","first-page":"297","volume":"12","author":"MS Hwang","year":"2001","unstructured":"Hwang MS, Lee CC, Tang YL (2001) An improvement of SPLICE\/AS in WIDE against guessing attack. Int J Inform 12(2):297\u2013302","journal-title":"Int J Inform"},{"issue":"1","key":"460_CR10","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M-S Hwang","year":"2000","unstructured":"Hwang M-S, Li LH (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consumer Electron 46(1):28\u201330","journal-title":"IEEE Trans Consumer Electron"},{"key":"460_CR11","unstructured":"ISO\/IEC 9797. Data cryptographic techniques-Data integrity mechanism using a cryptographic check functionemploying a block cipher algorithm. Internal Organization for Standardization"},{"key":"460_CR12","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/S0164-1212(98)00006-5","volume":"42","author":"JK Jan","year":"1998","unstructured":"Jan JK, Chen YY (1998) \u2019Paramita wisdom\u2019 password authentication scheme without verification tables. J Syst Software 42:45\u201357","journal-title":"J Syst Software"},{"key":"460_CR13","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/0167-4048(89)90051-5","volume":"8","author":"DL Jobush","year":"1989","unstructured":"Jobush DL, Oldehoeft AE (1989) A survey of password mechanisms: weakness and potential improvements. Comput Security 8:587\u2013604","journal-title":"Comput Security"},{"issue":"6","key":"460_CR14","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"LH Li","year":"2001","unstructured":"Li LH, Lin IC, Hwang MS (2001) A remote password authentication scheme for multiserver architecture using neurnal networks. IEEE Trans on Neurnal Netw 12(6):1498-1504","journal-title":"IEEE Trans on Neurnal Netw"},{"key":"460_CR15","doi-asserted-by":"crossref","unstructured":"Lippman RP (1987) An introduction to computing with neural nets. IEEE ASSP Magazine, pp 4\u201322","DOI":"10.1109\/MASSP.1987.1165576"},{"key":"460_CR16","unstructured":"Merkle RC (1989) One way hash function and DES. In: Advances in Cryptology-CRYPTO\u201989, pp 428\u2013446"},{"issue":"1","key":"460_CR17","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1007\/BF00203968","volume":"3","author":"RC Merkle","year":"1990","unstructured":"Merkle RC (1990) A fast software one-way hash function. J Cryptogr 3(1):43\u201358","journal-title":"J Cryptogr"},{"key":"460_CR18","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R Morris","year":"1979","unstructured":"Morris R, Thompson K (1979) Password security: a case history. Communi ACM 22:594\u2013597","journal-title":"Communi ACM"},{"key":"460_CR19","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham RM, Schroeder MD (1978) Using encryption for authentication in large networks of computers. Communi ACM 21:993\u2013999","journal-title":"Communi ACM"},{"issue":"9","key":"460_CR20","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"BC Neuman","year":"1994","unstructured":"Neuman BC, Ts\u2019o T (1994) Kerberos: an authentication service for computer networks. IEEE Communi Mag 32(9):33\u201338","journal-title":"IEEE Communi Mag"},{"key":"460_CR21","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1109\/21.293498","volume":"24","author":"MS Obaidat","year":"1994","unstructured":"Obaidat MS, Macchiarolo DT (1994) An multilayer neural network system for computer access security. IEEE Trans Syst Man Cybern 24:806\u2013813","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"460_CR22","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public key cryptosystems. Communi ACM 21:120\u2013126","journal-title":"Communi ACM"},{"key":"460_CR23","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/72.80203","volume":"1","author":"M Roth","year":"1990","unstructured":"Roth M (1990) Survey of neural network technology for automatic target recognition. IEEE Trans Neural Netw 1:28\u201343","journal-title":"IEEE Trans Neural Netw"},{"key":"460_CR24","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1016\/0167-4048(95)00017-8","volume":"14","author":"BC Soh","year":"1995","unstructured":"Soh BC, Dillon TS (1995) Setting optimal intrusion-detection thresholds. Computers & Security 14:621\u2013631","journal-title":"Comput Security"},{"issue":"2","key":"460_CR25","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/0167-4048(96)00003-X","volume":"15","author":"U Manber","year":"1996","unstructured":"Manber U (1996) A simple scheme to make passwords based on one-way function much harder to crack. Comput Security 15(2):171\u2013176","journal-title":"Comput Security"},{"issue":"1","key":"460_CR26","first-page":"22","volume":"1","author":"CY Yang","year":"2005","unstructured":"Yang CY, Lee CC, Hsiao SY (2005) Man-in-the-middle attack on the authentication of the user from the remote autonomous object. Int J Network Security 1(1):22\u201324","journal-title":"Int J Network Security"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-004-0460-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-004-0460-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-004-0460-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T08:46:54Z","timestamp":1626079614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-004-0460-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6,25]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,9]]}},"alternative-id":["460"],"URL":"https:\/\/doi.org\/10.1007\/s00521-004-0460-x","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,6,25]]}}}