{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:41:47Z","timestamp":1740123707423,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T00:00:00Z","timestamp":1534723200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11036-018-1104-1","type":"journal-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T01:49:36Z","timestamp":1534729776000},"page":"1104-1119","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Two-Server 3D ElGamal Diffie-Hellman Password Authenticated and Key Exchange Protocol Using Geometrical Properties"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7639-3355","authenticated-orcid":false,"given":"K.","family":"Anitha Kumari","sequence":"first","affiliation":[]},{"given":"G.","family":"Sudha Sadasivam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,20]]},"reference":[{"key":"1104_CR1","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1007\/11593447_31","volume":"3788","author":"M Abdalla","year":"2005","unstructured":"Abdalla M, Chevassut O, Fouque P, Pointcheval D (2005) A simple threshold authenticated key exchange from short secrets. Lect Notes Comput Sci 3788:566\u2013584","journal-title":"Lect Notes Comput Sci"},{"key":"1104_CR2","doi-asserted-by":"crossref","unstructured":"Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks\u2019, in proceedings of the 19th international conference on theory and application of cryptographic techniques 139\u201355","DOI":"10.1007\/3-540-45539-6_11"},{"key":"1104_CR3","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/381906.381946","volume":"20","author":"SM Bellovin","year":"1990","unstructured":"Bellovin SM, Merritt M (1990) Limitations of the Kerberos authentication system. ACM SIGCOMM Comput Commun Rev 20:119\u2013132","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"1104_CR4","doi-asserted-by":"crossref","unstructured":"Bellovin, SM, Merritt, M (1992) Encrypted key exchange: password-based protocols secure against dictionary attacks\u2019, in proceedings of the IEEE symposium on research in security and privacy 72\u201384","DOI":"10.1145\/168588.168618"},{"key":"1104_CR5","doi-asserted-by":"crossref","unstructured":"Bellovin SM, Merritt M (1993) Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise\u2019, in proceedings of the first ACM conference on computer and communications security 244\u2013250","DOI":"10.1145\/168588.168618"},{"key":"1104_CR6","unstructured":"Brainard J, Juels A, Kaliski B, Szydlo M (2003) A new two-server approach for authentication with short secrets\u2019, in proceedings of the 12th USENIX security symposium, pp. 201\u2013214"},{"key":"1104_CR7","doi-asserted-by":"crossref","unstructured":"Bresson E, Chevassut O, Pointcheval D (2003) Security proofs for an efficient password-based key exchange\u2019, in proceedings of the 10th ACM conference on computer and communications security 241\u2013250","DOI":"10.1145\/948138.948142"},{"key":"1104_CR8","unstructured":"Brunet M (2005) Perfect Password: Selection, Protection, Authentication, Syngress, Rockland"},{"issue":"9","key":"1104_CR9","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/LCOMM.2006.1714545","volume":"10","author":"JW Byun","year":"2006","unstructured":"Byun JW, Lee DH, Lim JI (2006) Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol. IEEE Commun Lett 10(9):683\u2013685","journal-title":"IEEE Commun Lett"},{"key":"1104_CR10","first-page":"249","volume":"29","author":"HY Chien","year":"2013","unstructured":"Chien HY, Wu TC, Yeh MK (2013) Provably secure gateway-oriented password-based authenticated key exchange protocol resistant to password guessing attacks. J Inf Sci Eng 29:249\u2013265","journal-title":"J Inf Sci Eng"},{"issue":"1","key":"1104_CR11","first-page":"117","volume":"4","author":"A Chouksey","year":"2013","unstructured":"Chouksey A, Pandey Y (2013) An efficient password based two-server authentication and pre-shared key exchange system using smart cards. Int J Comput Sci Inform Technol 4(1):117\u2013120","journal-title":"Int J Comput Sci Inform Technol"},{"key":"1104_CR12","unstructured":"Cloud Computing Trends 2016 State of the Cloud Survey, Available from: <\n                    http:\/\/www.rightscale.com\/blog\/cloud-industry-insights\/cloud-computing-trends-2016-state-cloud-survey#security>\n                    \n                  . [9 February 2016]"},{"key":"1104_CR13","unstructured":"Construction of a Triangle from Circumcenter, Orthocenter and Incenter, Available from: <\n                    http:\/\/www.cut-the-knot.org\/triangle\/O-H-I.shtml>\n                    \n                  . [30 September 2008]"},{"issue":"4","key":"1104_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/219282.219298","volume":"29","author":"Y Ding","year":"1995","unstructured":"Ding Y, Horster P (1995) Undetectable on-line password guessing attacks. ACM SIGOPS Operating Syst Rev 29(4):77\u201386","journal-title":"ACM SIGOPS Operating Syst Rev"},{"issue":"4","key":"1104_CR15","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"1104_CR16","unstructured":"Final Report on Diginotar Hack Shows Total Compromise of CA Servers, Available from: <\n                    https:\/\/threatpost.com\/final-report-diginotar-hack-shows-total-compromise-ca-servers-103112\/77170\/>\n                    \n                  . [31 October 2012]"},{"issue":"2","key":"1104_CR17","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1145\/1151414.1151418","volume":"9","author":"R Gennaro","year":"2006","unstructured":"Gennaro R, Lindell Y (2006) A framework for password-based authenticated key exchange. ACM Trans Inf Syst Secur 9(2):181\u2013234","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"3","key":"1104_CR18","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00145-006-0233-z","volume":"19","author":"O Goldreich","year":"2006","unstructured":"Goldreich O, Lindell Y (2006) Session-key generation using human passwords only. J Cryptol 19(3):241\u2013340","journal-title":"J Cryptol"},{"key":"1104_CR19","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-642-17697-5_10","volume":"6480","author":"F Hao","year":"2010","unstructured":"Hao F, Ryan P (2010) J-PAKE: authenticated key exchange without PKI. Lect Notes Comput Sci 6480:192\u2013206","journal-title":"Lect Notes Comput Sci"},{"issue":"4","key":"1104_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1391949.1391950","volume":"8","author":"A Herzberg","year":"2008","unstructured":"Herzberg A, Jbara A (2008) Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans Internet Technol 8(4):1\u201336","journal-title":"ACM Trans Internet Technol"},{"key":"1104_CR21","unstructured":"Is SAML an Effective Framework for Secure SSO?, Available from: <\n                    http:\/\/vinayendra.com\/SAML.pdf>\n                    \n                  . [2 December 2012]"},{"issue":"5","key":"1104_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"DP Jablon","year":"1996","unstructured":"Jablon DP (1996) Strong password-only authenticated key exchange*. ACM Comput Commun Rev 26(5):5\u201326","journal-title":"ACM Comput Commun Rev"},{"key":"1104_CR23","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/3-540-45353-9_26","volume":"2020","author":"DP Jablon","year":"2001","unstructured":"Jablon DP (2001) Password authentication using multiple servers. Lect Notes Comput Sci 2020:344\u2013360","journal-title":"Lect Notes Comput Sci"},{"key":"1104_CR24","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-540-77048-0_4","volume":"4861","author":"H Jin","year":"2007","unstructured":"Jin H, Wong DS, Xu Y (2007) An efficient password-only two-server authenticated key exchange system. Lect Notes Comput Sci 4861:44\u201356","journal-title":"Lect Notes Comput Sci"},{"key":"1104_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11496137_1","volume":"3531","author":"J Katz","year":"2005","unstructured":"Katz J, Mackenzie P, Taban G, Gligor V (2005) Two-server password-only authenticated key exchange. Lect Notes Comput Sci 3531:1\u201316","journal-title":"Lect Notes Comput Sci"},{"issue":"1","key":"1104_CR26","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.compeleceng.2008.05.007","volume":"35","author":"HS Kim","year":"2009","unstructured":"Kim HS, Choi JY (2009) Enhanced password-based simple three-party key exchange protocol. Comput Electr Eng 35(1):107\u2013114","journal-title":"Comput Electr Eng"},{"issue":"6","key":"1104_CR27","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1080\/03772063.2016.1176539","volume":"62","author":"KA Kumari","year":"2016","unstructured":"Kumari KA, Sadasivam GS, Rohini L (2016) An efficient 3D elliptic curve Diffie-Hellman (ECDH) based two-server password-only authenticated key exchange protocol with provable security. IETE J Res 62(6):762\u2013773","journal-title":"IETE J Res"},{"key":"1104_CR28","doi-asserted-by":"crossref","unstructured":"Lee JH, Lee DH (2007) Secure and efficient password-based authenticated key exchange protocol for two-server architecture, in proceedings of the international conference on convergence information technology 2102\u20132107","DOI":"10.1109\/ICCIT.2007.291"},{"key":"1104_CR29","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-10665-1_14","volume":"5931","author":"H Li","year":"2009","unstructured":"Li H, Dai Y, Tian Y, Yang H (2009) Identity-based authentication for cloud computing. Lect Notes Comput Sci 5931:157\u2013166","journal-title":"Lect Notes Comput Sci"},{"issue":"4","key":"1104_CR30","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/506106.506108","volume":"34","author":"CL Lin","year":"2000","unstructured":"Lin CL, Sun HM, Hwang T (2000) Three-party encrypted key exchange: attacks and a solution. ACM SIGOPS Operating Syst Rev 34(4):12\u201320","journal-title":"ACM SIGOPS Operating Syst Rev"},{"key":"1104_CR31","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/3-540-45708-9_25","volume":"2442","author":"P Mackenzie","year":"2005","unstructured":"Mackenzie P, Shrimpton T, Jakobsson M (2005) Threshold password-authenticated key exchange. Lect Notes Comput Sci 2442:385\u2013400","journal-title":"Lect Notes Comput Sci"},{"key":"1104_CR32","first-page":"27","volume":"3","author":"I Milenkovi\u0107","year":"2013","unstructured":"Milenkovi\u0107 I, Atinovi\u0107 O, Simi\u0107 D (2013) Using Kerberos protocol for single sign-on in identity management systems. J Info Technol Appl 3:27\u201333","journal-title":"J Info Technol Appl"},{"key":"1104_CR33","unstructured":"OASIS, Available at: \n                    https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=wss"},{"issue":"12","key":"1104_CR34","first-page":"178","volume":"2","author":"PK Panwar","year":"2012","unstructured":"Panwar PK, Kumar D (2012) Security through SSL. Int J Adv Res Comput Sci Software Eng 2(12):178\u2013184","journal-title":"Int J Adv Res Comput Sci Software Eng"},{"key":"1104_CR35","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/3-540-39200-9_32","volume":"2656","author":"MD Raimondo","year":"2003","unstructured":"Raimondo MD, Gennaro R (2003) Password-authenticated key exchange extended abstract. Lect Notes Comput Sci 2656:507\u2013523","journal-title":"Lect Notes Comput Sci"},{"key":"1104_CR36","unstructured":"Securing the Internet of Things The Conversation Every CIO Needs to Have with the CEO, Available from: <\n                    https:\/\/www.eiuperspectives.economist.com\/sites\/default\/files\/images\/EIU-HPE%20IoT%20Security%20Article_PDF_1.pdf>\n                    \n                  . [30 March 2016]"},{"key":"1104_CR37","unstructured":"Somorovsky J, Mayer A, Schwenk J, Kampmann M, Jenson M (2012) \u2018On breaking SAML: be whoever you want to be\u2019, in proceedings of the 21st USENIX security symposium 1\u201316"},{"key":"1104_CR38","first-page":"326","volume":"3","author":"SK Sood","year":"2012","unstructured":"Sood SK (2012) Dynamic identity based authentication protocol for two-server architecture. J Inf Secur 3:326\u2013334","journal-title":"J Inf Secur"},{"issue":"3","key":"1104_CR39","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M Steiner","year":"1995","unstructured":"Steiner M, Tsudik G, Waidner M (1995) Refinement and extension of encrypted key exchange. ACM SIGOPS Operating Syst Rev 29(3):22\u201330","journal-title":"ACM SIGOPS Operating Syst Rev"},{"key":"1104_CR40","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-30574-3_16","volume":"3376","author":"M Szydlo","year":"2005","unstructured":"Szydlo M, Kaliski B (2005) Proofs for two-server password authentication. Lect Notes Comput Sci 3376:227\u2013244","journal-title":"Lect Notes Comput Sci"},{"key":"1104_CR41","unstructured":"Tetrahedral Treats, Available from: <\n                    http:\/\/www.zebragraph.com\/Geometers_Corner_files\/tetrahedraltreats.pdf\n                    \n                  >"},{"key":"1104_CR42","doi-asserted-by":"crossref","unstructured":"Toorani M (2014) \u2018Security analysis of J-PAKE\u2019,in proceedings of IEEE symposium on computers and communication 1\u201316","DOI":"10.1109\/ISCC.2014.6912576"},{"key":"1104_CR43","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/BFb0054019","volume":"1431","author":"Y Tsiounis","year":"1998","unstructured":"Tsiounis Y, Yung M (1998) On the security of ElGamal based encryption. Lect Notes Comput Sci 1431:117\u2013134","journal-title":"Lect Notes Comput Sci"},{"key":"1104_CR44","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-77048-0_3","volume":"4861","author":"Z Wan","year":"2007","unstructured":"Wan Z, Deng RH, Bao F, Preneel B (2007) nPAKE+: a hierarchical group password-authenticated key exchange protocol using different passwords. Lect Notes Comput Sci 4861:31\u201343","journal-title":"Lect Notes Comput Sci"},{"key":"1104_CR45","unstructured":"Wu, T (1998) \u2018The secure remote password protocol\u2019, in proceedings of the internet society symposium on network and distributed system security 1\u201317"},{"key":"1104_CR46","doi-asserted-by":"crossref","unstructured":"Yang D, Yang B (2010) \u2018A novel two-server password authentication scheme with provable security\u2019,in proceedings of 10th IEEE international conference on computer and information technology 1605\u20131609","DOI":"10.1109\/CIT.2010.284"},{"issue":"2","key":"1104_CR47","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/TDSC.2006.16","volume":"3","author":"Y Yang","year":"2006","unstructured":"Yang Y, Deng RH, Bao F (2006) A practical password-based two-server authentication and key exchange system. IEEE Trans Dependable Secure Comput 3(2):105\u2013114","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"1104_CR48","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/583800.583802","volume":"36","author":"HT Yeh","year":"2002","unstructured":"Yeh HT, Sun HM (2002) Simple authenticated key agreement protocol resistant to password guessing attacks. ACM SIGOPS Operating Syst Rev 36(4):14\u201322","journal-title":"ACM SIGOPS Operating Syst Rev"},{"issue":"9","key":"1104_CR49","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1109\/TPDS.2012.282","volume":"24","author":"X Yi","year":"2013","unstructured":"Yi X, Ling S, Wang H (2013) Efficient two-server password-only authenticated key exchange. IEEE Trans Paral Distrib Syst 24(9):1773\u20131782","journal-title":"IEEE Trans Paral Distrib Syst"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1104-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1104-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1104-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T19:26:58Z","timestamp":1566242818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1104-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,20]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["1104"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1104-1","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2018,8,20]]},"assertion":[{"value":"20 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}