{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T06:10:07Z","timestamp":1761718207157},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,1,14]],"date-time":"2012-01-14T00:00:00Z","timestamp":1326499200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1007\/s11277-011-0456-7","type":"journal-article","created":{"date-parts":[[2012,1,16]],"date-time":"2012-01-16T11:13:10Z","timestamp":1326712390000},"page":"361-378","source":"Crossref","is-referenced-by-count":56,"title":["A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme"],"prefix":"10.1007","volume":"68","author":[{"given":"Bin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,14]]},"reference":[{"issue":"11","key":"456_CR1","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport L. (1981) Password authentication with insecure communication. Communications of the ACM 24(11): 770\u2013772","journal-title":"Communications of the ACM"},{"key":"456_CR2","unstructured":"Hwang, R., & Shiau, S. (2005). Password authenticated key agreement protocol for multi-servers architecture. In Proceedings of the international conference on wireless networks, communications and mobile computing (Vol. 1, pp. 279\u2013284)."},{"key":"456_CR3","doi-asserted-by":"crossref","unstructured":"Cao, Z., & Sun, D. (2006). Cryptanalysis and improvement of user authentication scheme using smart cards for multi-server environments. In Proceedings of the international conference on machine learning and cybernetics (pp. 2818\u20132822).","DOI":"10.1109\/ICMLC.2006.259062"},{"key":"456_CR4","doi-asserted-by":"crossref","unstructured":"Hwang, T., Chen, Y., & Laih C. S. (1990). Non-interactive password authentication without password tables. In Proceedings of IEEE region conference on computer and communication system (Vol. 1, pp. 429\u201331).","DOI":"10.1109\/TENCON.1990.152647"},{"issue":"4","key":"456_CR5","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H. M. Sun","year":"2000","unstructured":"Sun H. M. (2000) An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics 46(4): 958\u2013961","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"6","key":"456_CR6","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"L. H. Li","year":"2001","unstructured":"Li L. H., Lin I. C., Hwang M. S. (2001) A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Network 12(6): 1498\u20131504","journal-title":"IEEE Transactions on Neural Network"},{"key":"456_CR7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","volume":"19","author":"I. C. Lin","year":"2003","unstructured":"Lin I. C., Hwang M. S., Li. L. H. (2003) A new remote user authentication scheme for multi-server architecture. Future Generation Computer System 19: 13\u201322","journal-title":"Future Generation Computer System"},{"key":"456_CR8","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.csi.2004.03.004","volume":"27","author":"W. J. Tsaur","year":"2004","unstructured":"Tsaur W. J., Wu C. C., Lee W. B. (2004) A smart card-based remote scheme for password authentication in multi-server internet services. Computer Standard & Interfaces 27: 39\u201351","journal-title":"Computer Standard & Interfaces"},{"issue":"1","key":"456_CR9","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"W. Juang","year":"2004","unstructured":"Juang W. (2004) Efficient multi-Server password authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics 50(1): 251\u2013255","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"456_CR10","doi-asserted-by":"crossref","unstructured":"Chang, C., & Lee, J. (2004). An efficient and secure multi-server password authentication scheme using smart cards. In Proceedings of the international conference on cyberworlds (pp. 417\u2013442).","DOI":"10.1109\/CW.2004.17"},{"issue":"1","key":"456_CR11","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"Y.-P. Liao","year":"2009","unstructured":"Liao Y.-P., Wang S.-S. (2009) A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 31(1): 24\u201329","journal-title":"Computer Standards & Interfaces"},{"issue":"3\u20134","key":"456_CR12","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.cose.2008.04.001","volume":"27","author":"J.-L. Tsai","year":"2008","unstructured":"Tsai J.-L. (2008) Efficient multi-server authentication scheme based on one way hash function without verification table. Computers & Security 27(3\u20134): 115\u2013121","journal-title":"Computers & Security"},{"issue":"2","key":"456_CR13","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/LCOMM.2009.081884","volume":"3","author":"R.-C. Wang","year":"2009","unstructured":"Wang R.-C., Juang W.-S., Lei C.-L. (2009) User authentication scheme with privacy-preservation for multi-server environment. IEEE Communications Letters 3(2): 157\u2013159","journal-title":"IEEE Communications Letters"},{"key":"456_CR14","doi-asserted-by":"crossref","unstructured":"Geng, J., & Zhang, L. (2008). A dynamic ID-based user authentication and key agreement scheme for multi-server environment using bilinear pairings. In PEITS \u201908. Workshop on power electronics and intelligent transportation system (pp. 33\u201337).","DOI":"10.1109\/PEITS.2008.35"},{"key":"456_CR15","unstructured":"Song, L., Hu, J., & Zhong, C. (2010). A novel threshold distributed authentication scheme using bilinear pairings. In Proceedings of the second international workshop on education technology and computer science (ETCS) (Vol. 3, pp. 124\u2013127)."},{"key":"456_CR16","doi-asserted-by":"crossref","unstructured":"Zhu, H., Liu, T., & Liu, J. (2009). Robust and Simple multi-server authentication protocol without verification table. In HIS \u201909. Proceedings of the ninth international conference on hybrid intelligent systems (Vol. 3, pp. 51\u201356).","DOI":"10.1109\/HIS.2009.223"},{"key":"456_CR17","doi-asserted-by":"crossref","unstructured":"Yoon, E., & Yoo, K. (2009). Robust multi-server authentication scheme. In NPC \u201909. Proceedings of the sixth IFIP international conference on network and parallel computing (pp. 197\u2013203).","DOI":"10.1109\/NPC.2009.42"},{"key":"456_CR18","doi-asserted-by":"crossref","unstructured":"Lim, M., Lee S., & Lee H. (2008). An efficient multi-server password authenticated key agreement scheme revisited. In ICCIT \u201908. Proceedings of the third international conference on convergence and hybrid information technology (pp. 396\u2013400).","DOI":"10.1109\/ICCIT.2008.73"},{"key":"456_CR19","doi-asserted-by":"crossref","unstructured":"Lee, Y., & Won, D. (2008). Security weaknesses in Chang and Wu\u2019s key agreement protocol for a multi-server environment. In ICEBE \u201908. Proceedings of the IEEE international conference on e-business engineering (pp. 308\u2013314).","DOI":"10.1109\/ICEBE.2008.56"},{"issue":"3","key":"456_CR20","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/LCOMM.2009.081609","volume":"13","author":"J. Nam","year":"2009","unstructured":"Nam J., Paik J., Kang H.-K., Kim U. M., Won D. (2009) An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communication Letters 13(3): 205\u2013207","journal-title":"IEEE Communication Letters"},{"key":"456_CR21","unstructured":"Sotirov, A., Stevens, M., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D., et\u00a0al. (2008). MD5 considered harmful today: Creating a rogue CA certificate. 25th Chaos Communications Congress, Berlin, Germany, Talk or Presentation."},{"key":"456_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/b95112","volume-title":"Colored petri nets: Modelling and validation of concurrent systems","author":"K. Jensen","year":"2009","unstructured":"Jensen K., Kristensen L. M. (2009) Colored petri nets: Modelling and validation of concurrent systems. Springer, New York"},{"key":"456_CR23","volume-title":"CPN tools state space manual","author":"K. Jensen","year":"2006","unstructured":"Jensen K., Christensen S., Kristensen L. M. (2006) CPN tools state space manual. University of Aarhus, Aabogade"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-011-0456-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-011-0456-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-011-0456-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T14:37:57Z","timestamp":1561214277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-011-0456-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,14]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["456"],"URL":"https:\/\/doi.org\/10.1007\/s11277-011-0456-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,14]]}}}