{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T14:33:44Z","timestamp":1776350024633,"version":"3.51.2"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T00:00:00Z","timestamp":1651795200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T00:00:00Z","timestamp":1651795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11042-022-12227-1","type":"journal-article","created":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T06:03:36Z","timestamp":1651817016000},"page":"22425-22448","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A secure and improved two factor authentication scheme using elliptic curve and bilinear pairing for cyber physical systems"],"prefix":"10.1007","volume":"81","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4625-2353","authenticated-orcid":false,"given":"Aritro","family":"Sengupta","sequence":"first","affiliation":[]},{"given":"Amit","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Pankaj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Tapobrata","family":"Dhar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"key":"12227_CR1","unstructured":"(2012) NIST, Cyber-physical systems: situation analysis of current trends, technologies, and challenges, Natl. Inst. Stand. Technol (NIST), Columbia, Maryland"},{"key":"12227_CR2","unstructured":"An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem Jen-Ho Yanga, Chin-Chen Changa"},{"key":"12227_CR3","unstructured":"An YH (2013) Security improvements of dynamic id-based remote user authentication scheme with session key agreement. In: 15th International conference on advanced communication technology (ICACT)"},{"key":"12227_CR4","doi-asserted-by":"crossref","unstructured":"Barreto Paulo SLM, Libert B, McCullagh N, Quisquater J-J Efficient and provably-secure identity-based signatures and sign encryption from bilinear maps. Advances in Cryptology - ASIACRYPT 2005; Volume 3788 of the series Lecture Notes in Computer Science; pp 515\u2013532","DOI":"10.1007\/11593447_28"},{"key":"12227_CR5","unstructured":"Chou JS, Huang CH, Huang YS, Chen Y (2013) Efficient two-pass anonymous identity authentication using smart card. IACR Cryptology ePrint Archive; [eprint.iacr.org\/2013\/402.pdf]"},{"key":"12227_CR6","doi-asserted-by":"publisher","unstructured":"Chang YF, Tai WL, Chang HC (2013) Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst. https:\/\/doi.org\/10.1002\/dac.2552","DOI":"10.1002\/dac.2552"},{"key":"12227_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"12227_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory Vol IT 31:469\u2013472","journal-title":"IEEE Trans Inf Theory Vol IT"},{"key":"12227_CR9","unstructured":"Jacobsen MJ Jr., Koblitz N, Silverman JH, Stein A, Teske E (2000) Analysis of the Xedni calculus attack. Des Codes Crypt, vol 19. Available from http:\/\/www.cacr.math.uwaterloo.ca"},{"issue":"8","key":"12227_CR10","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing Q, Vasilakos AV, Wan J (2014) Security of the internet of things:perspectives and challenges. Wirel Netw 20(8):2481\u2013501","journal-title":"Wirel Netw"},{"key":"12227_CR11","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/0-387-23483-7_394","volume-title":"Side-channel analysis: Encyclopedia of cryptography and security","author":"M Joye","year":"2005","unstructured":"Joye M, Olivier F (2005) Side-channel analysis: Encyclopedia of cryptography and security. Kluwer (Academic) Publishers: Springer, USA, pp 571\u2013576"},{"issue":"6","key":"12227_CR12","doi-asserted-by":"publisher","first-page":"1997","DOI":"10.1016\/j.compeleceng.2014.05.007","volume":"40","author":"S Kumari","year":"2014","unstructured":"Kumari S, Khan MK, Li X (2014) An improved remote user authentication scheme with key agreement. Comput Electr Eng 40(6):1997\u20132012","journal-title":"Comput Electr Eng"},{"key":"12227_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:203\u2013209","journal-title":"Math Comput"},{"key":"12227_CR14","first-page":"388","volume-title":"Differential power analysis; Proceedings of Advances in Cryptology (Crypto\u201999), LNCS","author":"P Kocher","year":"1999","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis; Proceedings of Advances in Cryptology (Crypto\u201999), LNCS. Springer, Berlin Heidelberg, pp 388\u2013397"},{"key":"12227_CR15","doi-asserted-by":"publisher","unstructured":"Li X, Niu J, Khan MK, Liao J An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl. https:\/\/doi.org\/10.1016\/j.jnca.2013.02.034","DOI":"10.1016\/j.jnca.2013.02.034"},{"key":"12227_CR16","doi-asserted-by":"crossref","unstructured":"Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11)","DOI":"10.1145\/358790.358797"},{"key":"12227_CR17","unstructured":"Lynn B PBC library manual 0.5.14. Retrieved October 28, 2016, from https:\/\/crypto.stanford.edu\/pbc\/manual\/"},{"issue":"5","key":"12227_CR18","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"key":"12227_CR19","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Use of elliptic curves in cryptography. Advances in Cryptology - Crypto \u201985, LNCS 218","author":"V Miller","year":"1986","unstructured":"Miller V (1986) Use of elliptic curves in cryptography. Advances in Cryptology - Crypto \u201985, LNCS 218. Springer-Verlag, New York, pp 417\u2013426"},{"key":"12227_CR20","first-page":"224","volume-title":"Discrete logarithms and their cryptographic significance; Advances in Cryptology: Proceedings of Eurocrypt 84","author":"AM Odlyzko","year":"1985","unstructured":"Odlyzko AM (1985) Discrete logarithms and their cryptographic significance; Advances in Cryptology: Proceedings of Eurocrypt 84. Springer-Verlag, New York, pp 224\u2013314"},{"issue":"2\u20133","key":"12227_CR21","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1023\/A:1008350005447","volume":"19","author":"A Odlyzko","year":"2000","unstructured":"Odlyzko A (2000) Discrete logarithms: The past and the future. Des Codes Crypt 19(2\u20133):129\u2013145","journal-title":"Des Codes Crypt"},{"key":"12227_CR22","doi-asserted-by":"crossref","unstructured":"Pateriya RK, Vasudevan S (2011) Elliptic curve cryptography in constrained environments: a review, IEEE 2011 International Conference on Communication Systems and Network Technologies, pp. 120\u2013124","DOI":"10.1109\/CSNT.2011.32"},{"key":"12227_CR23","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1008319518035","volume":"20","author":"JH Silverman","year":"2000","unstructured":"Silverman JH (2000) The Xedni calculus and the elliptic curve discrete logarithm problem. Des Codes Crypt 20:5\u201340","journal-title":"Des Codes Crypt"},{"issue":"2","key":"12227_CR24","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.compeleceng.2011.11.010","volume":"38","author":"F Wen","year":"2011","unstructured":"Wen F, Li X (2011) An improved dynamic id-based remote user authentication with key agreement scheme. Comp Elect Eng 38(2):381\u20137","journal-title":"Comp Elect Eng"},{"issue":"5","key":"12227_CR25","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.csi.2006.11.005","volume":"29","author":"XM Wang","year":"2007","unstructured":"Wang XM, Zhang WF, Zhang JS, Khan MK (2007) Cryptanalysis and improvement on two efficient remote user authentication scheme using cards. Com Stand Interf 29(5):507\u201312","journal-title":"Com Stand Interf"},{"issue":"4","key":"12227_CR26","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"YY Wang","year":"2009","unstructured":"Wang YY, Liu JY, Xiao FX, Dan J (2009) A more efficient and secure dynamic ID-based remote user authentication scheme. Comp Commun 32 (4):583\u20135","journal-title":"Comp Commun"},{"key":"12227_CR27","doi-asserted-by":"publisher","unstructured":"Wang Y (2017) Secure communication and authentication against off-line dictionary attacks in smart grid systems. pp 103\u2013120. https:\/\/doi.org\/10.1007\/978-3-319-61437-3","DOI":"10.1007\/978-3-319-61437-3"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12227-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12227-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12227-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T07:44:33Z","timestamp":1655883873000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12227-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,6]]},"references-count":27,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["12227"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12227-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,6]]},"assertion":[{"value":"31 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors have given due consideration to the protection of intellectual property associated with this work and that there are no impediments to publication, including the timing of publication, with respect to intellectual property.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Consent to publish or distribute the article or to enter into arrangements with others to publish or distribute the article is given","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Consent for Publication"}},{"value":"There are no known conflicts of interest associated with this article","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}