{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:23:27Z","timestamp":1771457007481,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:00:00Z","timestamp":1622160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11227-021-03857-7","type":"journal-article","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T14:15:28Z","timestamp":1622211328000},"page":"497-522","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0824-5195","authenticated-orcid":false,"given":"Mariem","family":"Bouchaala","sequence":"first","affiliation":[]},{"given":"Cherif","family":"Ghazel","sequence":"additional","affiliation":[]},{"given":"Leila Azouz","family":"Saidane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,28]]},"reference":[{"key":"3857_CR1","first-page":"156","volume":"1807","author":"V Boyko","year":"2000","unstructured":"Boyko V, MacKenzie P, Patel S (2000) Provably secure password-authenticated key exchange using diffie-hellman. International Conference on the Theory and Applications of Cryptographic Techniques 1807:156\u2013171","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"issue":"1","key":"3857_CR2","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S0167-4048(03)00114-7","volume":"22","author":"C-L Lin","year":"2003","unstructured":"Lin C-L, Hwang T (2003) A password authentication scheme with secure password updating. Comp Secur 22(1):68\u201372","journal-title":"Comp Secur"},{"issue":"5","key":"3857_CR3","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1016\/j.comcom.2005.07.025","volume":"29","author":"M Peyravian","year":"2006","unstructured":"Peyravian M, Jeffries C (2006) Secure remote user access over insecure networks. Comp Commun 29(5):660\u2013667","journal-title":"Comp Commun"},{"key":"3857_CR4","doi-asserted-by":"crossref","unstructured":"Merdassi I, Bouchaala M, Ghazel C, Leila S (October 2019) Private security for the cloud mobile via a strong authentication method. Coop Design Vis Eng, pages 190\u2013200","DOI":"10.1007\/978-3-030-30949-7_22"},{"key":"3857_CR5","doi-asserted-by":"crossref","unstructured":"Cherdmuangpak N, Anusas-amonkul T, Limthan B (July 2017) Two factor image-based password authentication for junior high school students. International Joint Conference on Computer Science and Software Engineering (JCSSE)","DOI":"10.1109\/JCSSE.2017.8025913"},{"key":"3857_CR6","doi-asserted-by":"crossref","unstructured":"Das R, Manna S, Dutta S (2018) Secure user authentication system using image-based otp and randomize numeric otp based on user unique biometric image and digit repositioning scheme. Commun Devices Comput. pages 83\u201393","DOI":"10.1007\/978-981-10-8585-7_8"},{"key":"3857_CR7","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.compeleceng.2017.01.026","volume":"59","author":"L Trupil","year":"2017","unstructured":"Trupil L, Nishant D (2017) An analytical study of biometric based remote user authentication schemes using smart cards. Comput Electr Eng 59:305\u2013321","journal-title":"Comput Electr Eng"},{"key":"3857_CR8","doi-asserted-by":"crossref","unstructured":"Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun, pages 1086 \u2013 1090","DOI":"10.1109\/TWC.2008.080128"},{"key":"3857_CR9","doi-asserted-by":"crossref","unstructured":"Lee CC, Li CT, Der Chen S (2011) Two attacks on a two-factor user authentication in wireless sensor networks. Parallel Process Lett, pages 21\u201326","DOI":"10.1142\/S0129626411000047"},{"key":"3857_CR10","unstructured":"He D, Gao Y, CHAN S (2010) An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens Wirel Netw, page 361\u2013371"},{"issue":"2","key":"3857_CR11","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s13369-017-2709-6","volume":"43","author":"C Preeti","year":"2018","unstructured":"Preeti C, Hari O (2018) An efficient two-factor remote user authentication and session key agreement scheme using rabin cryptosystem. Arab J Sci Eng 43(2):661\u2013673","journal-title":"Arab J Sci Eng"},{"issue":"11","key":"3857_CR12","doi-asserted-by":"publisher","first-page":"13401","DOI":"10.1007\/s11042-016-3704-8","volume":"76","author":"N Morteza","year":"2017","unstructured":"Morteza N, Reza J, Hamed A (2017) A lightweight authentication and key agreement protocol preserving user anonymity. Multimed Tools Appl 76(11):13401\u201313423","journal-title":"Multimed Tools Appl"},{"key":"3857_CR13","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.compeleceng.2017.12.045","volume":"66","author":"L Trupil","year":"2018","unstructured":"Trupil L, Mukesh S, Kumar MS (2018) Advanced formal authentication protocol using smart cards for network applicants. Comput Electr Eng 66:50\u201363","journal-title":"Comput Electr Eng"},{"key":"3857_CR14","doi-asserted-by":"crossref","unstructured":"Qu J, Tan XL(2014) Two-factor user authentication with key agreement scheme based on elliptic curve cryptosystem. J Electr Comput Eng","DOI":"10.1155\/2014\/423930"},{"key":"3857_CR15","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s11277-015-2735-1","volume":"85","author":"B Huang","year":"2015","unstructured":"Huang B, Khan MK, Libing W, Muhaya Fahad T, He BD (2015) An efficient remote user authentication with key agreement scheme using elliptic curve cryptography. Wirel Personal Commun 85:225\u2013240","journal-title":"Wirel Personal Commun"},{"key":"3857_CR16","doi-asserted-by":"crossref","unstructured":"Chaudhry SA, Naqvi H, Mahmood K (2017) An improved remote user authentication scheme using elliptic curve cryptography. Wirel Pers Commun, pp 1\u201319","DOI":"10.1007\/s11277-016-3745-3"},{"key":"3857_CR17","doi-asserted-by":"publisher","first-page":"4166","DOI":"10.1002\/sec.1596","volume":"9","author":"T Maitra","year":"2016","unstructured":"Maitra T, Obaidat Mohammad S, Hafizul Islam SK (2016) Security analysis and design of an efficient ecc-based two-factor password authentication scheme. Secur Commun Netw 9:4166\u20134181","journal-title":"Secur Commun Netw"},{"issue":"16","key":"3857_CR18","first-page":"336","volume":"30","author":"W Chenyu","year":"2017","unstructured":"Chenyu W, Wang D, Guoai X, Guo Y (2017) A lightweight password-based authentication protocol using smart card. Int J Commun Syst 30(16):336","journal-title":"Int J Commun Syst"},{"key":"3857_CR19","first-page":"1","volume":"51","author":"J Srinivas","year":"2019","unstructured":"Srinivas J, Vinod K, Adesh K (2019) Eseap: Ecc based secure and efficient mutual authentication protocol using smart card. J Inf Secur Appl 51:1\u201319","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"3857_CR20","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/s11227-013-0962-3","volume":"66","author":"CH Chou","year":"2013","unstructured":"Chou CH, Tsai KY, Chung-Fu L (2013) Two id-based authenticated schemes with key agreement for mobile environments. J Supercomput 66(2):973\u2013988","journal-title":"J Supercomput"},{"issue":"1","key":"3857_CR21","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11227-014-1170-5","volume":"69","author":"Farash Mohammad Sabzinejad","year":"2014","unstructured":"Sabzinejad Farash Mohammad, Ahmadian Attari Mahmoud (2014) A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks. J Supercomput 69(1):395\u2013411","journal-title":"J Supercomput"},{"key":"3857_CR22","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1007\/s11042-015-3166-4","volume":"76","author":"L Yanrong","year":"2017","unstructured":"Yanrong L, Li L, Peng H, Yang Y (2017) An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography. Multimed Tools Appl 76:1801\u20131815","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"3857_CR23","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.1007\/s11277-015-2699-1","volume":"84","author":"Imran Memon","year":"2015","unstructured":"Memon Imran, Hussain Ibrar, Akhtar Rizwan, Gencai Chen (2015) Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel Pers Commun 84(2):1487\u20131508","journal-title":"Wirel Pers Commun"},{"key":"3857_CR24","doi-asserted-by":"publisher","first-page":"4394","DOI":"10.1109\/ACCESS.2016.2596292","volume":"4","author":"Goutham Reddy Alavalapati","year":"2016","unstructured":"Alavalapati Goutham Reddy, Ashok Kumar Das, Yoon Eun-Jun (2016) A secure anonymous authentication protocol for mobile services on elliptic curve cryptographys. IEEE Access 4:4394\u20134407","journal-title":"IEEE Access"},{"key":"3857_CR25","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TIFS.2017.2659640","volume":"12","author":"Qi Xie","year":"2017","unstructured":"Xie Qi, Wong Duncan S, Wang Guilin (2017) Provably secure dynamic id-based anonymous two factor authenticated key exchange protocol with extended security model. IEEE Trans Inf Forensics Secur 12:1382\u20131392","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3857_CR26","unstructured":"Shehzad AC, Husnain N, Taeshik S (2015) Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J Med Syst. pp 1801\u20131815"},{"key":"3857_CR27","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"K Sheetal","year":"2015","unstructured":"Sheetal K, Sood Sandeep K (2015) Secure authentication scheme for iot and cloud servers. Pervasive Mobile Comput 24:210\u2013223","journal-title":"Pervasive Mobile Comput"},{"key":"3857_CR28","first-page":"95","volume":"42","author":"G Sharma","year":"2015","unstructured":"Sharma G, Kalra S (2015) A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-iot applications. J Inf Secur Appl 42:95\u2013106","journal-title":"J Inf Secur Appl"},{"key":"3857_CR29","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51:541\u2013552","journal-title":"IEEE Trans Comput"},{"key":"3857_CR30","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.comnet.2016.01.006","volume":"101","author":"Ruhul Amin","year":"2016","unstructured":"Amin Ruhul, Hafizul Islamb SK, Biswas GP (2016) Design of anonymity preserving three-factor authenticated key exchange protocol for wireless sensor network. Comput Netw 101:42\u2013622","journal-title":"Comput Netw"},{"key":"3857_CR31","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing effcient protocols. ACM Conference on Computer and Communications Security, pp 62\u201373","DOI":"10.1145\/168588.168596"},{"issue":"2","key":"3857_CR32","first-page":"2377","volume":"5","author":"F Wei","year":"2018","unstructured":"Wei F, Vijayakumar P, Qi J, Zhang R (2018) A mobile intelligent terminal based anonymous authenticated key exchange protocol for roaming service in global mobility networks. IEEE Trans Sustain Comput 5(2):2377\u20133782","journal-title":"IEEE Trans Sustain Comput"},{"key":"3857_CR33","unstructured":"s\u00a0Examining smart-card sMauwL. Operational semantics and verification of security protocols. Information Security and Cryptography series, Springer (2012)"},{"issue":"2","key":"3857_CR34","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/JSYST.2016.2633809","volume":"12","author":"H Debiao","year":"2018","unstructured":"Debiao H, Neeraj K, Khurram KM (2018) Efficient privacy-aware authentication scheme for mobile cloud computing services. IEEE Syst J 12(2):1621\u20131631","journal-title":"IEEE Syst J"},{"key":"3857_CR35","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.cose.2019.03.019","volume":"84","author":"C Nilesh","year":"2019","unstructured":"Nilesh C, Anand Vijay S, Samrat M (2019) Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services. Comput Secur 84:193\u2013205","journal-title":"Comput Secur"},{"issue":"2\u20133","key":"3857_CR36","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Designs Codes Cryptogr 19(2\u20133):173\u2013193","journal-title":"Designs Codes Cryptogr"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03857-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03857-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03857-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T12:17:49Z","timestamp":1641298669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03857-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,28]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["3857"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03857-7","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,28]]},"assertion":[{"value":"30 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}