{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T19:54:50Z","timestamp":1760385290179},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,6,18]],"date-time":"2013-06-18T00:00:00Z","timestamp":1371513600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s11277-013-1282-x","type":"journal-article","created":{"date-parts":[[2013,6,17]],"date-time":"2013-06-17T13:59:58Z","timestamp":1371477598000},"page":"229-243","source":"Crossref","is-referenced-by-count":57,"title":["Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks"],"prefix":"10.1007","volume":"74","author":[{"given":"Debiao","family":"He","sequence":"first","affiliation":[]},{"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,18]]},"reference":[{"key":"1282_CR1","doi-asserted-by":"crossref","first-page":"1502","DOI":"10.1016\/S0140-3664(99)00108-5","volume":"22","author":"W Juang","year":"1999","unstructured":"Juang, W., Lei, C., & Chang, C. (1999). Anonymous channel and authentication in wireless communications. Computer Communications, 22, 1502\u20131511.","journal-title":"Computer Communications"},{"issue":"2","key":"1282_CR2","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1019968506856","volume":"22","author":"M Rahman","year":"2002","unstructured":"Rahman, M., & Imai, H. (2002). Security in wireless communication. Wireless Personal Communications, 22(2), 213\u2013228.","journal-title":"Wireless Personal Communications"},{"key":"1282_CR3","unstructured":"Harn, L., & Lin, H. (1993). Authentication in wireless communications. In IEEE Global Telecommunications Conference (GLOBECOM \u201993) (pp. 550\u2013554)."},{"key":"1282_CR4","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1016\/S1389-1286(03)00318-9","volume":"43","author":"A Barbancho","year":"2003","unstructured":"Barbancho, A., & Peinado, A. (2003). Cryptanalysis of anonymous channel protocol for large-scale area in wireless communications. Computer Networks, 43, 777\u2013785.","journal-title":"Computer Networks"},{"issue":"5","key":"1282_CR5","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C Lee","year":"2006","unstructured":"Lee, C., Hwang, M., & Liao, I. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683\u20131687.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"1282_CR6","doi-asserted-by":"crossref","first-page":"1709","DOI":"10.1016\/j.comcom.2004.05.018","volume":"27","author":"A Peinado","year":"2004","unstructured":"Peinado, A. (2004). Privacy and authentication protocol providing anonymous channels in GSM. Computer Communications, 27, 1709\u20131715.","journal-title":"Computer Communications"},{"key":"1282_CR7","unstructured":"Lin, W., & Jan, J. (2001). A wireless-based authentication and anonymous channels for large scale area. In Proceedings of the IEEE symposium on computers and communications, 2001 (pp. 36\u201341)."},{"key":"1282_CR8","doi-asserted-by":"crossref","unstructured":"Fathi, H., Shin, S., Kobara, K., & Imai, H. (2007) Protocols for authenticated anonymous communications. In 18th International symposium on personal, indoor and mobile radio, communications (PIMRC07) (pp. 1\u20135).","DOI":"10.1109\/PIMRC.2007.4394579"},{"issue":"3","key":"1282_CR9","doi-asserted-by":"crossref","first-page":"482","DOI":"10.4218\/etrij.12.0211.0340","volume":"34","author":"D He","year":"2012","unstructured":"He, D. (2012). Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications. ETRI Journal, 34(3), 482\u2013484.","journal-title":"ETRI Journal"},{"issue":"1","key":"1282_CR10","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TCE.2004.1277867","volume":"50","author":"J Zhu","year":"2004","unstructured":"Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 231\u2013235.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"1282_CR11","unstructured":"Lee, C., Chang, C., & Lin, C. (2005). User authentication with anonymity for global mobility networks. In 2th Asia pacific conference on mobile technology, applications and systems (pp. 1\u20135)."},{"key":"1282_CR12","doi-asserted-by":"crossref","first-page":"1366","DOI":"10.1002\/wcm.933","volume":"11","author":"Y Chen","year":"2011","unstructured":"Chen, Y., Chuang, S., Yeh, L., & Huang, J. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366\u20131375.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"2","key":"1282_CR13","doi-asserted-by":"crossref","first-page":"1431","DOI":"10.1016\/j.amc.2004.10.073","volume":"169","author":"C Yang","year":"2005","unstructured":"Yang, C., Tang, Y., Wang, R., & Yang, H. (2005). A secure and efficient authentication protocol for anonymous channel in wireless communications. Applied Mathematics and Computation, 169(2), 1431\u20131439.","journal-title":"Applied Mathematics and Computation"},{"key":"1282_CR14","doi-asserted-by":"crossref","unstructured":"Hsieh, W., & Leu, J. (2012). Anonymous authentication protocol based on elliptic curve Diffie\u2013Hellman for wireless access networks. Wireless Communications and Mobile Computing, doi: 10.1002\/wcm.2252 .","DOI":"10.1002\/wcm.2252"},{"key":"1282_CR15","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48, 203\u2013209.","journal-title":"Mathematics of Computation"},{"issue":"1","key":"1282_CR16","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transaction on Computer System, 8(1), 18\u201336.","journal-title":"ACM Transaction on Computer System"},{"key":"1282_CR17","doi-asserted-by":"crossref","unstructured":"He, D., & Wu, S. (2012). Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications, doi: 10.1007\/s11277-012-0696-1 .","DOI":"10.1007\/s11277-012-0696-1"},{"issue":"2","key":"1282_CR18","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763\u2013769.","journal-title":"Journal of Network and Computer Applications"},{"key":"1282_CR19","doi-asserted-by":"crossref","unstructured":"Wang, B., & Ma, M. (2012). A smart card based efficient and securedmulti-server authentication scheme. Wireless Personal Communications, doi: 10.1007\/s11277-011-0456-7 .","DOI":"10.1007\/s11277-011-0456-7"},{"key":"1282_CR20","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., & Jun, J. (1999) Differential power analysis. In Proceedings of advances in cryptology (CRYPTO 99) (pp. 388\u2013397).","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"1282_CR21","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T Messerges","year":"2002","unstructured":"Messerges, T., Dabbish, E., & Sloan, R. (2002). Examining smart- card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"key":"1282_CR22","doi-asserted-by":"crossref","first-page":"2803","DOI":"10.1016\/j.comcom.2007.12.005","volume":"31","author":"C Li","year":"2008","unstructured":"Li, C., Hwang, M., & Chung, Y. (2008). A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communication, 31, 2803\u20132814.","journal-title":"Computer Communication"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1282-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-013-1282-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1282-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T18:32:38Z","timestamp":1563215558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-013-1282-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,18]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["1282"],"URL":"https:\/\/doi.org\/10.1007\/s11277-013-1282-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,18]]}}}