{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T18:08:54Z","timestamp":1695492534826},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,10,20]],"date-time":"2013-10-20T00:00:00Z","timestamp":1382227200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1007\/s10796-013-9461-6","type":"journal-article","created":{"date-parts":[[2013,10,19]],"date-time":"2013-10-19T01:20:14Z","timestamp":1382145614000},"page":"113-127","source":"Crossref","is-referenced-by-count":5,"title":["Enhanced Dynamic Authentication Scheme (EDAS)"],"prefix":"10.1007","volume":"16","author":[{"given":"Toan-Thinh","family":"Truong","sequence":"first","affiliation":[]},{"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Anh-Duc","family":"Duong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,20]]},"reference":[{"key":"9461_CR1","first-page":"229","volume":"3715","author":"C Boyd","year":"2005","unstructured":"Boyd, C., & Choo, K. (2005). Security of two-party identity-based key agreement. Expert Systems with Applications, 3715, 229\u2013243.","journal-title":"Expert Systems with Applications"},{"key":"9461_CR2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R. (1990). A logic of authentication. ACM Transactions on Computer System, 8, 18\u201336.","journal-title":"ACM Transactions on Computer System"},{"key":"9461_CR3","unstructured":"Canetti, R., & Krawczyk, H. (2001). Analysis of key exchange schemes and their use for building secure channels. In Advances in cryptology-eurocrypt (pp. 451\u2013472) Verlag: Springer."},{"key":"9461_CR4","first-page":"659667","volume":"31","author":"X Cao","year":"2008","unstructured":"Cao, X., Kou, W., Dang, L., Zhao, B. (2008). Identity-based multi-user broadcast authentication in wireless sensor networks. Computer Communications, 31, 659667.","journal-title":"Computer Communications"},{"key":"9461_CR5","doi-asserted-by":"crossref","unstructured":"Chen, C.-L., Lee, C.-C., Hsu, C.-Y. (2011). Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems. doi: 10.1002\/dac.1277 .","DOI":"10.1002\/dac.1277"},{"key":"9461_CR6","unstructured":"Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L. (2005). On the indistinguishability-based security model of key agreement schemes-simple cases. In Cryptology ePrint Archive, Report."},{"issue":"8","key":"9461_CR7","first-page":"5499","volume":"8","author":"Z-Y Cheng","year":"2012","unstructured":"Cheng, Z.-Y., Liu, Y., Chang, C.-C., Chang, S.-C. (2012). A smart card based authentication scheme for remote user login and verification. International Journal of Innovative Computing, Information and Control, 8(8), 5499\u20135511.","journal-title":"International Journal of Innovative Computing, Information and Control"},{"issue":"2","key":"9461_CR8","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"ML Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P. (2004). A dynamic id-based remote user authentication scheme. IEEE Transactions on Consumer Electronics, 50(2), 629\u2013631.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"9461_CR9","unstructured":"Debiao, H., Jianhua, C., Jin, H. (2011). An id-based client authentication with key agreement protocol for mobile clientserver environment on ecc with provable security. Information Fusion."},{"key":"9461_CR10","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information, 31, 469\u2013472.","journal-title":"IEEE Transactions on Information"},{"key":"9461_CR11","volume-title":"Guide to Elliptic Curve Cryptography.","author":"D Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S. (2003). Guide to Elliptic Curve Cryptography. Secaucus: Springer-Verlag."},{"key":"9461_CR12","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S0895-7177(02)00106-1","volume":"36","author":"MS Hwang","year":"2002","unstructured":"Hwang, M.S., Lee, C.C., Tang, Y.L. (2002). A simple remote user authentication scheme. Mathematical and Computer Modelling, 36, 103\u2013107.","journal-title":"Mathematical and Computer Modelling"},{"issue":"11","key":"9461_CR13","doi-asserted-by":"crossref","first-page":"1892","DOI":"10.1016\/j.jss.2011.06.061","volume":"84","author":"SH Islam","year":"2011","unstructured":"Islam, S.H., & Biswas, G.P. (2011). A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Journal of Systems and Software, 84(11), 1892\u20131898.","journal-title":"Journal of Systems and Software"},{"issue":"1","key":"9461_CR14","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.csi.2006.01.002","volume":"29","author":"MK Khan","year":"2007","unstructured":"Khan, M.K., & Zhang, J. (2007). Improving the security of \u2019a flexible biometrics remote user authentication scheme. Computer Standards and Interfaces, 29(1), 82\u201385.","journal-title":"Computer Standards and Interfaces"},{"issue":"3","key":"9461_CR15","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"MK Khana","year":"2010","unstructured":"Khana, M.K., Kimb, S.-K., Alghathbara, K. (2010). Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Computer Communications, 34(3), 305\u2013309.","journal-title":"Computer Communications"},{"key":"9461_CR16","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N. (1987). Elliptic curve cryptosystem. Mathematics of Computation, 48, 203\u2013209.","journal-title":"Mathematics of Computation"},{"key":"9461_CR17","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B. (1999). Differential power analysis. In Proceddings CRYPTO (pp. 388\u2013397). Springer Verlag.","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"9461_CR18","doi-asserted-by":"crossref","first-page":"2165","DOI":"10.1093\/ietcom\/e88-b.5.2165","volume":"E88-B","author":"W Ku","year":"2005","unstructured":"Ku, W., & Chang, S. (2005). Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions on Communications, E88-B(5), 2165\u20132167.","journal-title":"IEICE Transactions on Communications"},{"key":"9461_CR19","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24, 770\u2013772.","journal-title":"Communications of the ACM"},{"issue":"3","key":"9461_CR20","first-page":"46","volume":"36","author":"CC Lee","year":"2002","unstructured":"Lee, C.C., Hwang, M.S., Yang, W.P. (2002). Flexible remote user authentication scheme using smart cards. IEEE Transactions on Neural Network, 36(3), 46\u201352.","journal-title":"IEEE Transactions on Neural Network"},{"issue":"11","key":"9461_CR21","first-page":"13 863","volume":"38","author":"C-C Lee","year":"2011","unstructured":"Lee, C.-C., Lin, T.-H., Chang, R.-X. (2011). A secure dynamic id based remote user authentication scheme for multi-server environment using smart cards. Expert Systems with Applications, 38(11), 13 863\u201313 870.","journal-title":"Expert Systems with Applications"},{"key":"9461_CR22","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"JK Lee","year":"2002","unstructured":"Lee, J.K., Ryu, S.R., Yoo, K.Y. (2002). Fingerprint-based remote user authentication scheme using smart cards. Electronics Letters, 38, 554\u2013555.","journal-title":"Electronics Letters"},{"issue":"1","key":"9461_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C-T Li","year":"2010","unstructured":"Li, C.-T., & Hwang, M.-S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 33(1), 1\u20135.","journal-title":"Journal of Network and Computer Applications"},{"issue":"12","key":"9461_CR24","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.csi.2007.08.005","volume":"30","author":"F Li","year":"2008","unstructured":"Li, F., Xin, X., Hu, Y. (2008). Indentity-based broadcast signcryption. Computer Standards and Interfaces, 30(12), 89\u201394.","journal-title":"Computer Standards and Interfaces"},{"issue":"6","key":"9461_CR25","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"LH Li","year":"2001","unstructured":"Li, L.H., Lin, I.C., Hwang, M.S. (2001). A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Network, 12(6), 1498\u20131504.","journal-title":"IEEE Transactions on Neural Network"},{"issue":"1","key":"9461_CR26","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J., Ma, J., Wang, W., Liu, C.-L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal Network and Computer Applications, 34(1), 73\u201379.","journal-title":"Journal Network and Computer Applications"},{"issue":"2","key":"9461_CR27","first-page":"517","volume":"6","author":"IE Liao","year":"2005","unstructured":"Liao, I.E., Lee, C.C., Hwang, M.S. (2005). Security enhancement for a dynamic id-based remote user authentication scheme. International Conference on Next Generation Web Services Practices, 6(2), 517\u2013522.","journal-title":"International Conference on Next Generation Web Services Practices"},{"issue":"1","key":"9461_CR28","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"C-H Lin","year":"2004","unstructured":"Lin, C.-H., & Lai, Y.-Y. (2004). A flexible biometrics remote user authentication scheme. Computer Standards and Interfaces, 27(1), 19\u201323.","journal-title":"Computer Standards and Interfaces"},{"key":"9461_CR29","unstructured":"Liou, Y., Lin, J., Wang, S. (2006). A new dynamic id-based remote user authentication scheme using smart cards. In Proceedings of 16th information security conference (pp. 198\u2013205)."},{"issue":"5","key":"9461_CR30","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"key":"9461_CR31","first-page":"417","volume":"218","author":"VS Miller","year":"1986","unstructured":"Miller, V.S. (1986). Use of elliptic curves in cryptography. Proceedings of CRYPTO85, 218, 417\u2013426.","journal-title":"Proceedings of CRYPTO85"},{"key":"9461_CR32","doi-asserted-by":"crossref","unstructured":"Oh, J.-B., Yoon, E.-J., Yoo, K.-Y. (2007). An efficient id-based authenticated key agreement protocol with pairings. 4742, 446\u2013456. doi: 10.1007\/978-3-540-74742-0_41 .","DOI":"10.1007\/978-3-540-74742-0_41"},{"issue":"2","key":"9461_CR33","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2), 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"9461_CR34","doi-asserted-by":"crossref","unstructured":"Ryu, E., Yoon, E., Yoo, K. (2004). An efficient id-based authenticated key agreement protocol. NETWORKING, 3042.","DOI":"10.1007\/978-3-540-24693-0_135"},{"key":"9461_CR35","unstructured":"Shamir, A. (1984). Identity based cryptosystems and signature schemes. Proceedings of CRYPTO84 (pp. 47\u201353). LNCS, Springer-Verlag."},{"issue":"2","key":"9461_CR36","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/TCE.2003.1209534","volume":"49","author":"J-J Shen","year":"2003","unstructured":"Shen, J.-J., Lin, C.-W., Hwang, M.-S. (2003). A modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 49(2), 414\u2013416.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"9461_CR37","unstructured":"Shih, H. (2008). Cryptanalysis on two password authentication schemes. Master Thesis."},{"issue":"8","key":"9461_CR38","first-page":"653","volume":"39","author":"K Shim","year":"2003","unstructured":"Shim, K. (2003). Efficient id-based authenticated key agreement protocol based on the weil pairing. Electron, 39(8), 653\u2013654.","journal-title":"Electron"},{"issue":"8","key":"9461_CR39","first-page":"16","volume":"1","author":"SK Sood","year":"2010","unstructured":"Sood, S.K., Sarje, A.K., Singh, K. (2010). An improvement of liou et al.s authentication scheme using smart cards. International Journal of Computer Applications, 1(8), 16\u201323.","journal-title":"International Journal of Computer Applications"},{"key":"9461_CR40","unstructured":"Sun, H., & Hsieh, B. (2003). Security analysis of shims authenticated key agreement protocols from parings. Cryptology ePrint Archive, Report 2003\/113."},{"issue":"12","key":"9461_CR41","doi-asserted-by":"crossref","first-page":"1449","DOI":"10.1002\/dac.1118","volume":"23","author":"J-L Tsai","year":"2010","unstructured":"Tsai, J.-L., Wu, T.-C., Tsai, K.-Y. (2010). New dynamic id authentication scheme using smart cards. International Journal Communication Systems, 23(12), 1449\u20131462.","journal-title":"International Journal Communication Systems"},{"issue":"3\u20134","key":"9461_CR42","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"J-H Yang","year":"2009","unstructured":"Yang, J.-H., & Chang, C.-C. (2009). An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers and Security, 28(3\u20134), 138\u2013143.","journal-title":"Computers and Security"},{"key":"9461_CR43","first-page":"499","volume":"4277","author":"EJ Yoon","year":"2006","unstructured":"Yoon, E.J., & Yoo, K.Y. (2006). Improving the dynamic id-based remote mutual authentication scheme. First International Workshop on Information Security, 4277, 499\u2013507.","journal-title":"First International Workshop on Information Security"},{"key":"9461_CR44","first-page":"633","volume":"2","author":"E-J Yoon","year":"2009","unstructured":"Yoon, E.-J., & Yoo, K.-Y. (2009). Robust id-based remote mutual authentication with key agreement scheme for mobile devices on ecc. IEEE International Conference on Computational Science and Engineering, 2, 633\u2013640.","journal-title":"IEEE International Conference on Computational Science and Engineering"}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-013-9461-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-013-9461-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-013-9461-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,31]],"date-time":"2019-07-31T00:39:07Z","timestamp":1564533547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-013-9461-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,20]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,3]]}},"alternative-id":["9461"],"URL":"https:\/\/doi.org\/10.1007\/s10796-013-9461-6","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,20]]}}}