{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T03:41:11Z","timestamp":1762659671405,"version":"3.37.3"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,5,19]],"date-time":"2018-05-19T00:00:00Z","timestamp":1526688000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11036-018-1061-8","type":"journal-article","created":{"date-parts":[[2018,5,19]],"date-time":"2018-05-19T06:59:07Z","timestamp":1526713147000},"page":"1046-1062","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7379-2641","authenticated-orcid":false,"given":"Marimuthu","family":"Karuppiah","sequence":"first","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Shehzad Ashraf","family":"Chaudhry","sequence":"additional","affiliation":[]},{"given":"R.","family":"Niranchana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,19]]},"reference":[{"issue":"11","key":"1061_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770\u2013772","journal-title":"Commun ACM"},{"key":"1061_CR2","unstructured":"Hwang T-Y (1983) Password authentication using public-key encryption. In: Proceedings of IEEE international Carnahan conference on security technology, pp 141\u2013144"},{"issue":"12","key":"1061_CR3","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1016\/0898-1221(89)90028-X","volume":"18","author":"L Harn","year":"1989","unstructured":"Harn L, Huang D, Laih CS (1989) Password authentication using public-key cryptography. Computers and Mathematics with Applications 18(12):1001\u20131017","journal-title":"Computers and Mathematics with Applications"},{"issue":"7","key":"1061_CR4","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1002\/scj.4690220704","volume":"22","author":"A Shimizu","year":"1991","unstructured":"Shimizu A (1991) A dynamic password authentication method using a one-way function. Systems and Computers in Japan 22(7):32\u201340","journal-title":"Systems and Computers in Japan"},{"key":"1061_CR5","unstructured":"Neil H (1994) The s\/key (tm) one-time password system. In: Symposium on network and distributed system security, pp 151\u2013157"},{"issue":"3","key":"1061_CR6","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/4234.585805","volume":"1","author":"S-P Shieh","year":"1997","unstructured":"Shieh S-P, Yang W-H, Sun H-M (1997) An authentication protocol without trusted third party. IEEE Commun Lett 1(3):87\u201389","journal-title":"IEEE Commun Lett"},{"issue":"6","key":"1061_CR7","first-page":"1363","volume":"83","author":"M Sandirigama","year":"2000","unstructured":"Sandirigama M, Shimizu A (2000) Simple and secure password authentication protocol (sas). IEICE Trans Commun 83(6):1363\u20131365","journal-title":"IEICE Trans Commun"},{"issue":"3","key":"1061_CR8","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1049\/ip-e.1991.0022","volume":"138","author":"C-C Chang","year":"1991","unstructured":"Chang C-C, Wu T-C (1991) Remote password authentication with smart cards. IEE Proceedings Computers and Digital Techniques 138(3):165\u2013168","journal-title":"IEE Proceedings Computers and Digital Techniques"},{"issue":"1","key":"1061_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M-S Hwang","year":"2000","unstructured":"Hwang M-S, Li L-H (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28\u201330","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"1061_CR10","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1109\/30.920451","volume":"46","author":"C-K Chan","year":"2000","unstructured":"Chan C-K, Cheng L-M (2000) Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(4):992\u2013993","journal-title":"IEEE Trans Consum Electron"},{"issue":"3","key":"1061_CR11","doi-asserted-by":"crossref","first-page":"289","DOI":"10.15388\/Informatica.2003.022","volume":"14","author":"C-C Chang","year":"2003","unstructured":"Chang C-C (2003) Some forgery attacks on a remote user authentication scheme using smart cards. Informatica 14(3):289\u2013294","journal-title":"Informatica"},{"issue":"1","key":"1061_CR12","first-page":"192","volume":"87","author":"H-T Yeh","year":"2004","unstructured":"Yeh H-T, Sun H-M, Hsieh B-T (2004) Security of a remote user authentication scheme using smart cards. IEICE Trans Commun 87(1):192\u2013194","journal-title":"IEICE Trans Commun"},{"issue":"4","key":"1061_CR13","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H-M Sun","year":"2000","unstructured":"Sun H-M (2000) An efficient remote use authentication scheme using smart cards. IEEE Trans Consum Electron 46(4):958\u2013961","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"1061_CR14","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"H-Y Chien","year":"2002","unstructured":"Chien H-Y, Jan J-K, Tseng Y-M (2002) An efficient and practical solution to remote authentication: smart card. Comput Secur 21(4):372\u2013375","journal-title":"Comput Secur"},{"issue":"3","key":"1061_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/S0920-5489(03)00094-1","volume":"26","author":"C-L Hsu","year":"2004","unstructured":"Hsu C-L (2004) Security of Chien et al.\u2019s remote user authentication scheme using smart cards. Computer Standards and Interfaces 26(3):167\u2013169","journal-title":"Computer Standards and Interfaces"},{"issue":"1","key":"1061_CR16","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"W-C Ku","year":"2004","unstructured":"Ku W-C, Chen S-M (2004) Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans Consum Electron 50(1):204\u2013207","journal-title":"IEEE Trans Consum Electron"},{"issue":"2","key":"1061_CR17","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.csi.2004.02.002","volume":"27","author":"S-W Lee","year":"2005","unstructured":"Lee S-W, Kim H-S, Yoo K-Y (2005) Improvement of Chien et al.\u2019s remote user authentication scheme using smart cards. Computer Standards and Interfaces 27(2):181\u2013183","journal-title":"Computer Standards and Interfaces"},{"issue":"2","key":"1061_CR18","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1109\/TCE.2004.1309437","volume":"50","author":"E-J Yoon","year":"2004","unstructured":"Yoon E-J, Ryu E-K, Yoo K-Y (2004) Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans Consum Electron 50(2):612\u2013614","journal-title":"IEEE Trans Consum Electron"},{"key":"1061_CR19","unstructured":"Sood SK, Sarje AK, Singh K (2010) An improvement of wang others.\u2019s authentication scheme using smart cards. In: 2010 national conference on communications (NCC). IEEE, pp 1\u20135"},{"issue":"5","key":"1061_CR20","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.csi.2010.03.008","volume":"32","author":"R Song","year":"2010","unstructured":"Song R (2010) Advanced smart card based password authentication protocol. Computer Standards & Interfaces 32(5):321\u2013325","journal-title":"Computer Standards & Interfaces"},{"issue":"2","key":"1061_CR21","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1002\/dac.2368","volume":"27","author":"B-L Chen","year":"2014","unstructured":"Chen B-L, Kuo W-C, Wuu L-C (2014) Robust smart-card-based remote user password authentication scheme. Int J Commun Syst 27(2):377\u2013389","journal-title":"Int J Commun Syst"},{"issue":"5","key":"1061_CR22","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365\u20131371","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"1061_CR23","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu J, Zhu W-T, Feng D-G (2009) An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4):723\u2013728","journal-title":"Computer Standards & Interfaces"},{"issue":"10","key":"1061_CR24","doi-asserted-by":"publisher","first-page":"3826","DOI":"10.1007\/s11227-015-1610-x","volume":"72","author":"Q Jiang","year":"2016","unstructured":"Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput 72(10):3826\u20133849","journal-title":"J Supercomput"},{"key":"1061_CR25","unstructured":"Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2017) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Humaniz Comput:1\u201313"},{"issue":"2","key":"1061_CR26","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"ML Das","year":"2004","unstructured":"Das ML, Saxena A, Gulati VP (2004) A dynamic id-based remote user authentication scheme. IEEE Trans Consum Electron 50(2):629\u2013631","journal-title":"IEEE Trans Consum Electron"},{"key":"1061_CR27","unstructured":"Liao I-E, Lee C-C, Hwang M-S (2005) Security enhancement for a dynamic id-based remote user authentication scheme. In: International conference on next generation web services practices, 2005. NWeSP 2005. IEEE, p 4"},{"key":"1061_CR28","unstructured":"Yoon E-J, Yoo K-Y (2006) Improving the dynamic id-based remote mutual authentication scheme. In: OTM confederated international conferences on the move to meaningful internet systems. Springer, pp 499\u2013507"},{"issue":"4","key":"1061_CR29","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"Y-Y Wang","year":"2009","unstructured":"Wang Y-Y, Liu J-Y, Xiao F-X, Dan J (2009) A more efficient and secure dynamic id-based remote user authentication scheme. Comput Commun 32(4):583\u2013585","journal-title":"Comput Commun"},{"issue":"2","key":"1061_CR30","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.compeleceng.2011.11.010","volume":"38","author":"F Wen","year":"2012","unstructured":"Wen F, Li X (2012) An improved dynamic id-based remote user authentication with key agreement scheme. Comput Electr Eng 38(2):381\u2013387","journal-title":"Comput Electr Eng"},{"issue":"11","key":"1061_CR31","doi-asserted-by":"crossref","first-page":"3430","DOI":"10.1002\/dac.2552","volume":"27","author":"Y-F Chang","year":"2014","unstructured":"Chang Y-F, Tai W-L, Chang H-C (2014) Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst 27(11):3430\u20133440","journal-title":"Int J Commun Syst"},{"issue":"2","key":"1061_CR32","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1002\/dac.2644","volume":"28","author":"Q Jiang","year":"2015","unstructured":"Jiang Q, Ma J, Li G, Li X (2015) Improvement of robust smart-card-based password authentication scheme. Int J Commun Syst 28(2):383\u2013393","journal-title":"Int J Commun Syst"},{"issue":"3","key":"1061_CR33","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1002\/dac.2858","volume":"29","author":"Q Xie","year":"2016","unstructured":"Xie Q, Dong N, Wong DS, Hu B (2016) Cryptanalysis and security enhancement of a robust two-factor authentication and key agreement protocol. Int J Commun Syst 29(3):478\u2013487","journal-title":"Int J Commun Syst"},{"issue":"6","key":"1061_CR34","doi-asserted-by":"publisher","first-page":"1997","DOI":"10.1016\/j.compeleceng.2014.05.007","volume":"40","author":"S Kumari","year":"2014","unstructured":"Kumari S, Khan MK, Li X (2014) An improved remote user authentication scheme with key agreement. Comput Electr Eng 40(6):1997\u20132012","journal-title":"Comput Electr Eng"},{"issue":"11","key":"1061_CR35","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1002\/sec.1419","volume":"9","author":"Y Lu","year":"2016","unstructured":"Lu Y, Li L, Peng H, Yang Y (2016) Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment. Security and Communication Networks 9(11):1331\u20131339","journal-title":"Security and Communication Networks"},{"key":"1061_CR36","doi-asserted-by":"crossref","unstructured":"Wang D, Gu Q, Cheng H, Wang P (2016) The request for better measurement: a comparative evaluation of two-factor authentication schemes. In: Proceedings of the 11th ACM on Asia conference on computer and communications security. ACM, pp 475\u2013486","DOI":"10.1145\/2897845.2897916"},{"issue":"2","key":"1061_CR37","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/s11277-016-3297-6","volume":"89","author":"SD Kaul","year":"2016","unstructured":"Kaul SD, Awasthi AK (2016) Security enhancement of an improved remote user authentication scheme with key agreement. Wirel Pers Commun 89(2):621\u2013637","journal-title":"Wirel Pers Commun"},{"issue":"16","key":"1061_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.3341","volume":"30","author":"M Qi","year":"2017","unstructured":"Qi M, Chen J (2017) An efficient two-party authentication key exchange protocol for mobile environment. Int J Commun Syst 30(16):1\u20138","journal-title":"Int J Commun Syst"},{"issue":"16","key":"1061_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.3336","volume":"30","author":"C Wang","year":"2017","unstructured":"Wang C, Wang D, Xu G, Guo Y (2017) A lightweight password-based authentication protocol using smart card. Int J Commun Syst 30(16):1\u201311","journal-title":"Int J Commun Syst"},{"issue":"4","key":"1061_CR40","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"I-E Liao","year":"2006","unstructured":"Liao I-E, Lee C-C, Hwang M-S (2006) A password authentication scheme over insecure networks. J Comput Syst Sci 72(4):727\u2013740","journal-title":"J Comput Syst Sci"},{"issue":"2","key":"1061_CR41","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1002\/sec.315","volume":"5","author":"S Wu","year":"2012","unstructured":"Wu S, Zhu Y, Pu Q (2012) Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks 5(2):236\u2013248","journal-title":"Security and Communication Networks"},{"issue":"7","key":"1061_CR42","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1016\/j.jcss.2008.04.002","volume":"74","author":"G Yang","year":"2008","unstructured":"Yang G, Wong DS, Wang H, Deng X (2008) Two-factor mutual authentication based on smart cards and passwords. J Comput Syst Sci 74(7):1160\u20131172","journal-title":"J Comput Syst Sci"},{"issue":"4","key":"1061_CR43","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1016\/j.jnca.2012.01.007","volume":"35","author":"R Madhusudhan","year":"2012","unstructured":"Madhusudhan R, Mittal RC (2012) Dynamic id-based remote user password authentication schemes using smart cards: a review. J Netw Comput Appl 35(4):1235\u20131248","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"1061_CR44","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1109\/JSYST.2016.2585681","volume":"12","author":"D Wang","year":"2018","unstructured":"Wang D, Cheng H, He D, Wang P (2018) On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst J 12(1):916\u2013925","journal-title":"IEEE Syst J"},{"issue":"2-3","key":"1061_CR45","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1504\/IJIPT.2016.079548","volume":"9","author":"M Karuppiah","year":"2016","unstructured":"Karuppiah M (2016) Remote user authentication scheme using smart card: a review. Int J Internet Protoc Technol 9(2-3):107\u2013120","journal-title":"Int J Internet Protoc Technol"},{"issue":"4","key":"1061_CR46","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.jisa.2014.09.006","volume":"19","author":"M Karuppiah","year":"2014","unstructured":"Karuppiah M, Saravanan R (2014) A secure remote user mutual authentication scheme using smart cards. Journal of Information Security and Applications 19(4):282\u2013294","journal-title":"Journal of Information Security and Applications"},{"issue":"3","key":"1061_CR47","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1007\/s11277-015-2524-x","volume":"84","author":"M Karuppiah","year":"2015","unstructured":"Karuppiah M, Saravanan R (2015) A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel Pers Commun 84(3):2055\u20132078","journal-title":"Wirel Pers Commun"},{"issue":"16","key":"1061_CR48","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1002\/sec.1558","volume":"9","author":"F Wu","year":"2016","unstructured":"Wu F, Xu L, Kumari S, Li X, Das AK, Khan MK, Karuppiah M, Baliyan R (2016) A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Security and Communication Networks 9(16):3527\u20133542","journal-title":"Security and Communication Networks"},{"issue":"5","key":"1061_CR49","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1080\/09720529.2015.1013693","volume":"18","author":"M Karuppiah","year":"2015","unstructured":"Karuppiah M, Saravanan R (2015) Cryptanalysis and an improvement of new remote mutual authentication scheme using smart cards. J Discret Math Sci Cryptogr 18(5):623\u2013649","journal-title":"J Discret Math Sci Cryptogr"},{"key":"1061_CR50","doi-asserted-by":"crossref","unstructured":"Wang D, Wang P, Liu J (2014) Improved privacy-preserving authentication scheme for roaming service in mobile networks. In: 2014 IEEE wireless communications and networking conference (WCNC). IEEE, pp 3136\u20133141","DOI":"10.1109\/WCNC.2014.6953015"},{"issue":"2","key":"1061_CR51","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"1061_CR52","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual international cryptology conference. Springer, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"1061_CR53","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"issue":"10","key":"1061_CR54","doi-asserted-by":"publisher","first-page":"2215","DOI":"10.1002\/dac.2468","volume":"27","author":"C-G Ma","year":"2014","unstructured":"Ma C-G, Wang D, Zhao S-D (2014) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst 27(10):2215\u20132227","journal-title":"Int J Commun Syst"},{"key":"1061_CR55","doi-asserted-by":"crossref","unstructured":"Bonneau J, Herley C, Van Oorschot PC, Stajano F (2012) The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE symposium on security and privacy. IEEE, pp 553\u2013567","DOI":"10.1109\/SP.2012.44"},{"key":"1061_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jisa.2015.01.001","volume":"21","author":"V Odelu","year":"2015","unstructured":"Odelu V, Das AK, Goswami A (2015) An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. Journal of Information Security and Applications 21:1\u201319","journal-title":"Journal of Information Security and Applications"},{"issue":"4","key":"1061_CR57","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1880022.1880027","volume":"13","author":"P Sarkar","year":"2010","unstructured":"Sarkar P (2010) A simple and generic construction of authenticated encryption with associated data. ACM Trans Inf Syst Secur 13(4):33","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"2","key":"1061_CR58","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10623-005-6344-y","volume":"38","author":"DR Stinson","year":"2006","unstructured":"Stinson DR (2006) Some observations on the theory of cryptographic hash functions. Des Codes Crypt 38 (2):259\u2013277","journal-title":"Des Codes Crypt"},{"issue":"1","key":"1061_CR59","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s13119-012-0009-8","volume":"2","author":"AK Das","year":"2013","unstructured":"Das AK (2013) A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw Sci 2(1):12\u201327","journal-title":"Netw Sci"},{"key":"1061_CR60","doi-asserted-by":"crossref","unstructured":"Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: 8th international workshop on theory and practice in public key cryptography public key cryptography (PKC 2005), vol 3386 of Lecture Notes in Computer Science, pp 65\u201384, Les Diablerets, Switzerland. Springer, Berlin","DOI":"10.1007\/978-3-540-30580-4_6"},{"issue":"1","key":"1061_CR61","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","volume":"15","author":"CC Chang","year":"2016","unstructured":"Chang CC, Le HD (2016) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15(1):357\u2013366","journal-title":"IEEE Trans Wirel Commun"},{"issue":"16","key":"1061_CR62","doi-asserted-by":"publisher","first-page":"3670","DOI":"10.1002\/sec.1573","volume":"9","author":"AK Das","year":"2016","unstructured":"Das AK, Kumari S, Odelu V, Li X, Wu F, Huang X (2016) Provably secure user authentication and key agreement scheme for wireless sensor networks. Security and Communication Networks 9(16):3670\u20133687","journal-title":"Security and Communication Networks"},{"issue":"4","key":"1061_CR63","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang D, He D, Wang P, Chu C-H (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secure Comput 12(4):428\u2013442","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"11","key":"1061_CR64","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1002\/dac.2793","volume":"29","author":"SK Islam","year":"2014","unstructured":"Islam SK (2014) Design and analysis of an improved smartcard-based remote user password authentication scheme. Int J Commun Syst 29(11):1708\u20131719","journal-title":"Int J Commun Syst"},{"key":"1061_CR65","doi-asserted-by":"crossref","unstructured":"Scott M, Costigan N, Abdulwahab W (2006) Implementing cryptographic pairings on smartcards. In: International workshop on cryptographic hardware and embedded systems. Springer, pp 134\u2013147","DOI":"10.1007\/11894063_11"},{"key":"1061_CR66","unstructured":"Crypto+ + library. [online]. http:\/\/www.cryptopp.com"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1061-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1061-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1061-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T21:46:42Z","timestamp":1720302402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1061-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,19]]},"references-count":66,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["1061"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1061-8","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2018,5,19]]},"assertion":[{"value":"19 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}