{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:39:35Z","timestamp":1765438775921,"version":"3.37.3"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,3,12]],"date-time":"2022-03-12T00:00:00Z","timestamp":1647043200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,12]],"date-time":"2022-03-12T00:00:00Z","timestamp":1647043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11227-021-04280-8","type":"journal-article","created":{"date-parts":[[2022,3,12]],"date-time":"2022-03-12T13:02:59Z","timestamp":1647090179000},"page":"12792-12814","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2434-8928","authenticated-orcid":false,"given":"Chandrashekhar","family":"Meshram","sequence":"first","affiliation":[]},{"given":"Rabha W.","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Sarita Gajbhiye","family":"Meshram","sequence":"additional","affiliation":[]},{"given":"Agbotiname Lucky","family":"Imoize","sequence":"additional","affiliation":[]},{"given":"Sajjad Shaukat","family":"Jamal","sequence":"additional","affiliation":[]},{"given":"Sharad Kumar","family":"Barve","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,12]]},"reference":[{"key":"4280_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04039-1","author":"C Meshram","year":"2021","unstructured":"Meshram C, Ibrahim RW, Meshram SG, Jamal SS, Imoize AL (2021) An efficient authentication with key agreement procedure using Mittag\u2013Leffler\u2013Chebyshev summation chaotic map under the multi-server architecture. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-021-04039-1","journal-title":"J Supercomput"},{"key":"4280_CR2","doi-asserted-by":"publisher","unstructured":"Meshram C, Obaidat MS, Hsiao K-F, Imoize AL, Meshram A (2021) An effective fair off-line electronic cash protocol using extended chaotic maps with anonymity revoking trustee. In: 2021 International Conference on Communications, Computing, Cybersecurity, and Informatics, pp 1\u20135. https:\/\/doi.org\/10.1109\/ccci52664.2021.9583217","DOI":"10.1109\/ccci52664.2021.9583217"},{"key":"4280_CR3","doi-asserted-by":"publisher","first-page":"118624","DOI":"10.1109\/ACCESS.2021.3107608","volume":"9","author":"C-H Lin","year":"2021","unstructured":"Lin C-H et al (2021) Intelligent symmetric cryptography with chaotic map and quantum based key generator for medical images infosecurity. IEEE Access 9:118624\u2013118639","journal-title":"IEEE Access"},{"issue":"3","key":"4280_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2002","unstructured":"Kocarev L (2002) Chaos-based cryptography: a brief overview. IEEE Circ Syst Mag 1(3):6\u201321","journal-title":"IEEE Circ Syst Mag"},{"key":"4280_CR5","doi-asserted-by":"crossref","unstructured":"Ayd\u0131n Y, \u00d6zkaynak F (2021) Eligibility analysis of different chaotic systems derived from logistic map for design of cryptographic components. In: 2021 International Conference Engineering Technologies and Computer Science (EnT), pp 27\u201331","DOI":"10.1109\/EnT52731.2021.00011"},{"key":"4280_CR6","doi-asserted-by":"publisher","first-page":"105678","DOI":"10.1109\/ACCESS.2021.3099004","volume":"9","author":"N Munir","year":"2021","unstructured":"Munir N, Khan M, Hazzazi MM, Aijaedi A, Alharbi AR, Hussain I (2021) Cryptanalysis of internet of health things encryption scheme based on chaotic maps. IEEE Access 9:105678\u2013105685","journal-title":"IEEE Access"},{"issue":"5","key":"4280_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s21051709","volume":"21","author":"AL Imoize","year":"2021","unstructured":"Imoize AL, Adedeji O, Tandiya N, Shetty S (2021) 6G enabled smart infrastructure for sustainable society: opportunities, challenges, and research roadmap. Sensors 21(5):1\u201358. https:\/\/doi.org\/10.3390\/s21051709","journal-title":"Sensors"},{"issue":"1","key":"4280_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C-T Li","year":"2010","unstructured":"Li C-T, Hwang M-S (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1\u20135","journal-title":"J Netw Comput Appl"},{"key":"4280_CR9","doi-asserted-by":"publisher","unstructured":"Meshram C, Obaidat MS, Meshram A (2020) An efficient robust lightweight remote user authentication protocol using extended chaotic maps. In: Proceedings of the 2020 International Conference on Computer, Information, and Telecommunication Systems, CITS 2020, pp 8\u201313. https:\/\/doi.org\/10.1109\/CITS49457.2020.9232622","DOI":"10.1109\/CITS49457.2020.9232622"},{"key":"4280_CR10","doi-asserted-by":"crossref","unstructured":"Sun Q, Moon J, Choi Y, Won D (2016) An improved dynamic ID based remote user authentication scheme for multi-server environment. In: Green, Pervasive, and Cloud Computing, pp 229\u2013242","DOI":"10.1007\/978-3-319-39077-2_15"},{"issue":"11","key":"4280_CR11","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770\u2013772","journal-title":"Commun ACM"},{"issue":"7","key":"4280_CR12","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1016\/S0167-4048(02)01118-5","volume":"21","author":"L Fan","year":"2002","unstructured":"Fan L, Li J-H, Zhu H-W (2002) An enhancement of timestamp-based password authentication scheme. Comput Secur 21(7):665\u2013667","journal-title":"Comput Secur"},{"issue":"3","key":"4280_CR13","first-page":"201","volume":"9","author":"C-C Lee","year":"2009","unstructured":"Lee C-C (2009) On security of an efficient nonce-based authentication scheme for SIP. Int J Netw Secur 9(3):201\u2013203","journal-title":"Int J Netw Secur"},{"issue":"7","key":"4280_CR14","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/S0167-4048(03)00709-0","volume":"22","author":"J-J Shen","year":"2003","unstructured":"Shen J-J, Lin C-W, Hwang M-S (2003) Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput Secur 22(7):591\u2013595","journal-title":"Comput Secur"},{"issue":"2 Part 1","key":"4280_CR15","first-page":"437","volume":"10","author":"HK Sarohi","year":"2013","unstructured":"Sarohi HK, Khan FU (2013) Graphical password authentication schemes: current status and key issues. Int J Comput Sci Issues 10(2 Part 1):437","journal-title":"Int J Comput Sci Issues"},{"issue":"2","key":"4280_CR16","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1109\/TIFS.2011.2169958","volume":"7","author":"H-M Sun","year":"2011","unstructured":"Sun H-M, Chen Y-H, Lin Y-H (2011) oPass: a user authentication protocol resistant to password stealing and password reuse attacks. IEEE Trans Inf Forensics Secur 7(2):651\u2013663","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"4280_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0221-7","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):1\u20138","journal-title":"J Med Syst"},{"issue":"8","key":"4280_CR18","doi-asserted-by":"publisher","first-page":"3504","DOI":"10.1007\/s11227-015-1601-y","volume":"74","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry SA, Naqvi H, Farash MS, Shon T, Sher M (2018) An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J Supercomput 74(8):3504\u20133520","journal-title":"J Supercomput"},{"issue":"3","key":"4280_CR19","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2014","unstructured":"He D, Wang D (2014) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816\u2013823","journal-title":"IEEE Syst J"},{"issue":"9","key":"4280_CR20","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Inf Forensics Secur 10(9):1953\u20131966","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"4280_CR21","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol 14(1):4\u201320","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"4","key":"4280_CR22","first-page":"5","volume":"3","author":"C-T Li","year":"2010","unstructured":"Li C-T, Hwang M-S (2010) An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards. Network 3(4):5","journal-title":"Network"},{"key":"4280_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of fingerprint recognition","author":"D Maltoni","year":"2009","unstructured":"Maltoni D, Maio D, Jain AK, Prabhakar S (2009) Handbook of fingerprint recognition. Springer"},{"issue":"2","key":"4280_CR24","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSECP.2003.1193209","volume":"1","author":"S Prabhakar","year":"2003","unstructured":"Prabhakar S, Pankanti S, Jain AK (2003) Biometric recognition: security and privacy concerns. IEEE Secur Priv 1(2):33\u201342","journal-title":"IEEE Secur Priv"},{"issue":"3","key":"4280_CR25","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das AK (2011) Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf Secur 5(3):145\u2013151","journal-title":"IET Inf Secur"},{"issue":"4","key":"4280_CR26","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1016\/j.eswa.2013.08.040","volume":"41","author":"M-C Chuang","year":"2014","unstructured":"Chuang M-C, Chen MC (2014) An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst Appl 41(4):1411\u20131418","journal-title":"Expert Syst Appl"},{"issue":"18","key":"4280_CR27","doi-asserted-by":"publisher","first-page":"8129","DOI":"10.1016\/j.eswa.2014.07.004","volume":"41","author":"D Mishra","year":"2014","unstructured":"Mishra D, Das AK, Mukhopadhyay S (2014) A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst Appl 41(18):8129\u20138143","journal-title":"Expert Syst Appl"},{"issue":"4","key":"4280_CR28","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.1007\/s11277-015-2708-4","volume":"84","author":"H Lin","year":"2015","unstructured":"Lin H, Wen F, Du C (2015) An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Wirel Pers Commun 84(4):2351\u20132362","journal-title":"Wirel Pers Commun"},{"issue":"5","key":"4280_CR29","first-page":"e1026323","volume":"10","author":"Y Lu","year":"2015","unstructured":"Lu Y, Li L, Yang X, Yang Y (2015) Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards. PLoS ONE 10(5):e1026323","journal-title":"PLoS ONE"},{"issue":"4","key":"4280_CR30","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1007\/s11277-015-2538-4","volume":"83","author":"O Mir","year":"2015","unstructured":"Mir O, Nikooghadam M (2015) A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services. Wirel Pers Commun 83(4):2439\u20132461","journal-title":"Wirel Pers Commun"},{"issue":"5","key":"4280_CR31","doi-asserted-by":"publisher","first-page":"5503","DOI":"10.1007\/s11042-017-4464-9","volume":"77","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry SA, Naqvi H, Khan MK (2018) An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimed Tools Appl 77(5):5503\u20135524","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"4280_CR32","first-page":"803","volume":"18","author":"H Zhu","year":"2016","unstructured":"Zhu H, Zhang Y, Sun Y (2016) Provably secure multi-server privacy-protection system based on Chebyshev chaotic maps without using symmetric cryptography. Int J Netw Secur 18(5):803\u2013815","journal-title":"Int J Netw Secur"},{"issue":"18","key":"4280_CR33","doi-asserted-by":"publisher","first-page":"23335","DOI":"10.1007\/s11042-018-5683-4","volume":"77","author":"M Qi","year":"2018","unstructured":"Qi M, Chen J (2018) New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography. Multimed Tools Appl 77(18):23335\u201323351","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"4280_CR34","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s11277-019-06897-8","volume":"111","author":"SS Sahoo","year":"2020","unstructured":"Sahoo SS, Mohanty S, Majhi B (2020) Improved biometric-based mutual authentication and key agreement scheme using ECC. Wirel Pers Commun 111(2):991\u20131017","journal-title":"Wirel Pers Commun"},{"key":"4280_CR35","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3043358","author":"C Meshram","year":"2020","unstructured":"Meshram C, Obaidat MS, Tembhurne JV, Shende SW, Kalare KW, Meshram SG (2020) A lightweight provably secure digital short-signature technique using extended chaotic maps for human-centered IoT systems. IEEE Syst J. https:\/\/doi.org\/10.1109\/JSYST.2020.3043358","journal-title":"IEEE Syst J"},{"key":"4280_CR36","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.jare.2020.08.015","volume":"32","author":"C Meshram","year":"2021","unstructured":"Meshram C, Ibrahim RW, Obaid AJ, Meshram SG, Meshram A, Abd El-Latif AM (2021) Fractional chaotic maps based short signature scheme under human-centered IoT environments. J Adv Res 32:139\u2013148","journal-title":"J Adv Res"},{"key":"4280_CR37","doi-asserted-by":"publisher","first-page":"80063","DOI":"10.1109\/ACCESS.2020.2991348","volume":"8","author":"C Meshram","year":"2020","unstructured":"Meshram C, Lee CC, Meshram SG, Meshram A (2020) OOS-SSS: an efficient online\/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network. IEEE Access 8:80063\u201380073. https:\/\/doi.org\/10.1109\/ACCESS.2020.2991348","journal-title":"IEEE Access"},{"issue":"3","key":"4280_CR38","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1007\/s00500-018-3112-2","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Li C-T, Meshram SG (2019) An efficient online\/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747\u2013753. https:\/\/doi.org\/10.1007\/s00500-018-3112-2","journal-title":"Soft Comput"},{"issue":"15","key":"4280_CR39","doi-asserted-by":"publisher","first-page":"10037","DOI":"10.1007\/s00500-021-05929-5","volume":"25","author":"C Meshram","year":"2021","unstructured":"Meshram C, Ibrahim RW, Deng L, Shende SW, Meshram SG, Barve SK (2021) A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment. Soft Comput 25(15):10037\u201310051. https:\/\/doi.org\/10.1007\/s00500-021-05929-5","journal-title":"Soft Comput"},{"key":"4280_CR40","doi-asserted-by":"publisher","unstructured":"Meshram C, Obaidat MS, Meshram A (2020) An efficient robust lightweight remote user authentication protocol using extended chaotic maps. In: 2020 International Conference on Computer, Information and Telecommunication Systems (CITS), pp 1\u20136. https:\/\/doi.org\/10.1109\/CITS49457.2020.9232622","DOI":"10.1109\/CITS49457.2020.9232622"},{"issue":"7","key":"4280_CR41","doi-asserted-by":"publisher","first-page":"7965","DOI":"10.1007\/s11042-018-6444-0","volume":"78","author":"L Zou","year":"2019","unstructured":"Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed Tools Appl 78(7):7965\u20137980","journal-title":"Multimed Tools Appl"},{"key":"4280_CR42","doi-asserted-by":"publisher","first-page":"31918","DOI":"10.1109\/ACCESS.2018.2840119","volume":"6","author":"Z Yu","year":"2018","unstructured":"Yu Z, Gao C, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918\u201331923","journal-title":"IEEE Access"},{"issue":"4","key":"4280_CR43","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1007\/s11042-017-4637-6","volume":"77","author":"C Yu","year":"2018","unstructured":"Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585\u20134608","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"4280_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.4307","volume":"33","author":"C Meshram","year":"2020","unstructured":"Meshram C, Lee CC, Ranadive AS, Li CT, Meshram SG, Tembhurne JV (2020) A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int J Commun Syst 33(7):1\u201315. https:\/\/doi.org\/10.1002\/dac.4307","journal-title":"Int J Commun Syst"},{"issue":"16","key":"4280_CR45","doi-asserted-by":"publisher","first-page":"6937","DOI":"10.1007\/s00500-018-3332-5","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Lee C-C, Meshram SG, Li C-T (2019) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937\u20136946. https:\/\/doi.org\/10.1007\/s00500-018-3332-5","journal-title":"Soft Comput"},{"issue":"1","key":"4280_CR46","first-page":"28","volume":"10","author":"PK Premkamal","year":"2020","unstructured":"Premkamal PK, Pasupuleti SK, Alphonse PJA (2020) Efficient escrow-free CP-ABE with constant size ciphertext and secret key for big data storage in cloud. Int J Cloud Appl Comput 10(1):28\u201345","journal-title":"Int J Cloud Appl Comput"},{"key":"4280_CR47","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1109\/ACCESS.2017.2775038","volume":"6","author":"Q Zheng","year":"2017","unstructured":"Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6:711\u2013722","journal-title":"IEEE Access"},{"issue":"3","key":"4280_CR48","first-page":"22","volume":"9","author":"A Kumar","year":"2019","unstructured":"Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22\u201336","journal-title":"Int J Cloud Appl Comput"},{"issue":"14","key":"4280_CR49","doi-asserted-by":"publisher","first-page":"8905","DOI":"10.1007\/s00500-021-05781-7","volume":"25","author":"C Meshram","year":"2021","unstructured":"Meshram C, Ibrahim RW, Obaidat MS, Sadoun B, Meshram SG, Tembhurne JV (2021) An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps. Soft Comput 25(14):8905\u20138920. https:\/\/doi.org\/10.1007\/s00500-021-05781-7","journal-title":"Soft Comput"},{"key":"4280_CR50","doi-asserted-by":"publisher","DOI":"10.1049\/cmu2.12251","author":"M Poongodi","year":"2021","unstructured":"Poongodi M, Malviya M, Hamdi M, Vijayakumar V, Mohammed MA, Rauf HT, Al-Dhlan KA (2021) 5G based Blockchain network for authentic and ethical keyword search engine. IET Commun. https:\/\/doi.org\/10.1049\/cmu2.12251","journal-title":"IET Commun"},{"issue":"1","key":"4280_CR51","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1515\/jisys-2021-0045","volume":"30","author":"MA Mohammed","year":"2021","unstructured":"Mohammed MA, Ibrahim DA, Salman AO (2021) Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language. J Intell Syst 30(1):774\u2013792","journal-title":"J Intell Syst"},{"issue":"19","key":"4280_CR52","doi-asserted-by":"publisher","first-page":"2444","DOI":"10.3390\/electronics10192444","volume":"10","author":"MJ Awan","year":"2021","unstructured":"Awan MJ et al (2021) Image-based malware classification using VGG19 network and spatial convolutional attention. Electronics 10(19):2444","journal-title":"Electronics"},{"issue":"1","key":"4280_CR53","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1504\/IJHPCN.2019.099744","volume":"14","author":"Z Li","year":"2019","unstructured":"Li Z, Zhao M, Jiang H, Xu Q (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1):60\u201368","journal-title":"Int J High Perform Comput Netw"},{"key":"4280_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03553-y","author":"VP Gaikwad","year":"2021","unstructured":"Gaikwad VP, Tembhurne JV, Meshram C, Lee C-C (2021) Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-020-03553-y","journal-title":"J Supercomput"},{"key":"4280_CR55","doi-asserted-by":"publisher","DOI":"10.1201\/9781420036114","volume-title":"Chebyshev polynomials","author":"JC Mason","year":"2002","unstructured":"Mason JC, Handscomb DC (2002) Chebyshev polynomials. CRC Press"},{"issue":"7","key":"4280_CR56","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo P, D\u2019Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst I Regul Pap 52(7):1382\u20131393. https:\/\/doi.org\/10.1109\/TCSI.2005.851701","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"issue":"3","key":"4280_CR57","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1016\/j.chaos.2007.06.030","volume":"39","author":"S Han","year":"2009","unstructured":"Han S, Chang E (2009) Chaotic map based key agreement with\/out clock synchronization. Chaos Solitons Fract 39(3):1283\u20131289. https:\/\/doi.org\/10.1016\/j.chaos.2007.06.030","journal-title":"Chaos Solitons Fract"},{"issue":"3","key":"4280_CR58","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fract 37(3):669\u2013674. https:\/\/doi.org\/10.1016\/j.chaos.2006.09.047","journal-title":"Chaos Solitons Fract"},{"issue":"10","key":"4280_CR59","doi-asserted-by":"publisher","first-page":"3848","DOI":"10.1016\/j.cnsns.2012.02.021","volume":"17","author":"F Chen","year":"2012","unstructured":"Chen F, Liao X, Wong K, Han Q, Li Y (2012) Period distribution analysis of some linear maps. Commun Nonlinear Sci Numer Simul 17(10):3848\u20133856","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"4280_CR60","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1137\/0511012","volume":"11","author":"TP Laine","year":"1980","unstructured":"Laine TP (1980) The product formula and convolution structure for the generalized Chebyshev polynomials. SIAM J Math Anal 11(1):133\u2013146","journal-title":"SIAM J Math Anal"},{"issue":"3","key":"4280_CR61","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1007\/s11071-012-0335-0","volume":"69","author":"D He","year":"2012","unstructured":"He D, Chen Y, Chen J (2012) Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149\u20131157. https:\/\/doi.org\/10.1007\/s11071-012-0335-0","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"4280_CR62","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He D, Ma M, Zhang Y, Chen C, Bu J (2011) A strong user authentication scheme with smart cards for wireless communications. Comput Commun 34(3):367\u2013374. https:\/\/doi.org\/10.1016\/j.comcom.2010.02.031","journal-title":"Comput Commun"},{"key":"4280_CR63","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"4280_CR64","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"4280_CR65","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s11071-011-0247-4","volume":"69","author":"C-C Lee","year":"2012","unstructured":"Lee C-C, Chen C-L, Wu C-Y, Huang S-Y (2012) An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn 69(1):79\u201387. https:\/\/doi.org\/10.1007\/s11071-011-0247-4","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"4280_CR66","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s11071-012-0652-3","volume":"71","author":"C-C Lee","year":"2013","unstructured":"Lee C-C, Hsu C-W (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71(1):201\u2013211. https:\/\/doi.org\/10.1007\/s11071-012-0652-3","journal-title":"Nonlinear Dyn"},{"key":"4280_CR67","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.compeleceng.2015.02.015","volume":"45","author":"F Wu","year":"2015","unstructured":"Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client\u2013server networks. Comput Electr Eng 45:274\u2013285","journal-title":"Comput Electr Eng"},{"key":"4280_CR68","unstructured":"Secure Hash Standard, National Institute of Standards and Technology (NIST), Federal Information Processing Standards Publication. FIPS 180-4, 2015"},{"key":"4280_CR69","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.cmpb.2016.07.022","volume":"135","author":"MH Ibrahim","year":"2016","unstructured":"Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Programs Biomed 135:37\u201350","journal-title":"Comput Methods Programs Biomed"},{"issue":"8","key":"4280_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1550147717724308","volume":"13","author":"Y Park","year":"2017","unstructured":"Park Y, Park K, Lee K, Song H, Park Y (2017) Security analysis and enhancements of an improved multi-factor biometric authentication scheme. Int J Distrib Sens Netw 13(8):1\u201312","journal-title":"Int J Distrib Sens Netw"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04280-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04280-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04280-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:15:17Z","timestamp":1654820117000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04280-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,12]]},"references-count":70,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["4280"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04280-8","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,3,12]]},"assertion":[{"value":"21 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}