{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T20:52:14Z","timestamp":1680295934808},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,3,8]],"date-time":"2013-03-08T00:00:00Z","timestamp":1362700800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s11277-013-1026-y","type":"journal-article","created":{"date-parts":[[2013,3,7]],"date-time":"2013-03-07T05:00:08Z","timestamp":1362632408000},"page":"509-519","source":"Crossref","is-referenced-by-count":2,"title":["A Time and Location Information Assisted OTP Scheme"],"prefix":"10.1007","volume":"72","author":[{"given":"Wen-Bin","family":"Hsieh","sequence":"first","affiliation":[]},{"given":"Jenq-Shiou","family":"Leu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,8]]},"reference":[{"key":"1026_CR1","unstructured":"Scoti, L., & Denning, D. (2003). Geo-encryption: Using GPS to enhance data security (pp. 40\u201349). GPS World."},{"issue":"1","key":"1026_CR2","doi-asserted-by":"crossref","first-page":"63","DOI":"10.3923\/itj.2008.63.69","volume":"7","author":"H-C Liao","year":"2008","unstructured":"Liao, H.-C., & Chao, Y.-H. (2008). A new data encryption algorithm based on the location of mobile users. Information Technology Journal, 7(1), 63\u201369.","journal-title":"Information Technology Journal"},{"key":"1026_CR3","doi-asserted-by":"crossref","unstructured":"Lu, X., Wicker, F., Leung, I., Lio, P., & Zhang, X. (2008). A location prediction algorithm for directional communication. In Wireless communications and mobile computing conference (pp. 159\u2013164).","DOI":"10.1109\/IWCMC.2008.28"},{"issue":"3","key":"1026_CR4","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TMC.2004.28","volume":"3","author":"D Son","year":"2004","unstructured":"Son, D., Helmy, A., & Krishnamachari, B. (2004). The effect of mobility-induced location errors on geographic routing in ad hoc and sensor networks: Analysis and improvement using mobility prediction. IEEE Transactions on Mobile Computing, 3(3), 233\u2013245.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1026_CR5","doi-asserted-by":"crossref","unstructured":"Jarusombat, S., & Kittitornkun, S. (2006). Digital signature on mobile devices based on location. In International symposium on communications and information technologies (pp. 866\u2013870).","DOI":"10.1109\/ISCIT.2006.339860"},{"key":"1026_CR6","unstructured":"Lichun, B. (2008). Location authentication methods for wireless network access control. Computing and communications conference: Performance (pp. 160\u2013167)."},{"issue":"3","key":"1026_CR7","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MPRV.2008.49","volume":"7","author":"AIG-T Ferreres","year":"2008","unstructured":"Ferreres, A. I. G.-T., Alvarez, B. R., & Garnacho, A. R. (2008). Guaranteeing the authenticity of location information. IEEE Pervasive Computing, 7(3), 72\u201380.","journal-title":"IEEE Pervasive Computing"},{"key":"1026_CR8","unstructured":"Me, G., Pirro, D., Sarrecchia, R. (2006). A mobile based approach to strong authentication on web. In International multi-conference on computing in the global inoformation technology (pp. 67\u201367)."},{"key":"1026_CR9","doi-asserted-by":"crossref","unstructured":"Alghathbar, K., & Mahmoud, H. A. (2009). Noisy password scheme: A new one time password system. In Canadian conference on electrical and computer engineering.","DOI":"10.1109\/CCECE.2009.5090247"},{"key":"1026_CR10","doi-asserted-by":"crossref","unstructured":"Cha, B. R., & Kim, C. W. (2008). Password generation of OTP system using fingerprint features. In 8th IEEE international conference on computer and information technology (pp. 420\u2013425).","DOI":"10.1109\/ISA.2008.73"},{"key":"1026_CR11","unstructured":"Goyal, V., Abraham, A., Sugata, S., Han, S. Y. (2005). The N\/R one time password system. In International conference on information technology: Coding and computing (Vol. 1, pp. 733\u2013738)."},{"key":"1026_CR12","unstructured":"One Time Password, http:\/\/us.zyxel.com\/"},{"key":"1026_CR13","unstructured":"UKey, http:\/\/www.microtronic.ch\/microtronicneu\/uk.php"},{"issue":"6","key":"1026_CR14","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"1026_CR15","doi-asserted-by":"crossref","unstructured":"Aloul, F., Zahidi, S., & El-Hajj, W. (2009). Two factor authentication using mobile phones. In 2009 IEEE\/ACS international conference on computer systems and application (pp. 641\u2013644).","DOI":"10.1109\/AICCSA.2009.5069395"},{"key":"1026_CR16","unstructured":"Hsiang, H.-C. & Shih, W.-K. (2008). Improvement of efficient remote authentication and key agreement. In International conference on future generation communication and networking."},{"key":"1026_CR17","unstructured":"Philip, H. (2008). OTP and challenge\/response algorithms for financial and e-government identity assurance: Current landscape and trends, ISSE."},{"key":"1026_CR18","first-page":"594","volume":"2","author":"L Mu","year":"2006","unstructured":"Mu, L., Kuo, G.-S., & Tao, N. (2006). A novel location algorithm based on dynamic compensation using linear location prediction in NLOS situations. Vehicular Technology Conference, 2, 594\u2013598.","journal-title":"Vehicular Technology Conference"},{"key":"1026_CR19","doi-asserted-by":"crossref","unstructured":"Su, W., Lee, S.-J. & Geria, M. (2000). Mobility prediction in wireless networks. In 21st Century military communications conference proceeding (Vol. 1, pp. 491\u2013495).","DOI":"10.1109\/MILCOM.2000.905001"},{"key":"1026_CR20","unstructured":"Jia, H., Tu, L., Yang, G., & Yang, Y. (2008). An improved mutual authentication scheme in multi-hop WiMax network. In International conference on computer and electrical engineering (pp. 296\u2013299)."},{"key":"1026_CR21","doi-asserted-by":"crossref","unstructured":"Torres, J., Sierra, J. M., & Izquierdo, A. (2007). A realistic approach on password-based mutual remote authentication schemes with smart-cards. In Digital EcoSystems and technology conference (pp. 334\u2013338).","DOI":"10.1109\/DEST.2007.371994"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1026-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-013-1026-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1026-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T11:56:10Z","timestamp":1562759770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-013-1026-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,8]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["1026"],"URL":"https:\/\/doi.org\/10.1007\/s11277-013-1026-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,8]]}}}