{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T21:51:10Z","timestamp":1774389070612,"version":"3.50.1"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T00:00:00Z","timestamp":1386633600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11277-013-1547-4","type":"journal-article","created":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T03:48:17Z","timestamp":1386560897000},"page":"979-989","source":"Crossref","is-referenced-by-count":32,"title":["A Robust User Authentication Scheme Using Dynamic Identity in Wireless Sensor Networks"],"prefix":"10.1007","volume":"77","author":[{"given":"Wen-Bin","family":"Hsieh","sequence":"first","affiliation":[]},{"given":"Jenq-Shiou","family":"Leu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,10]]},"reference":[{"issue":"1","key":"1547_CR1","first-page":"62","volume":"2","author":"MK Jain","year":"2011","unstructured":"Jain, M. K. (2011). Wireless sensor networks: Security issues and challenges. International Journal of Computer and Information Technology, 2(1), 62\u201367.","journal-title":"International Journal of Computer and Information Technology"},{"key":"1547_CR2","doi-asserted-by":"crossref","DOI":"10.1002\/047168659X.ch2","volume-title":"Wireless sensor networks","author":"F Lewis","year":"2004","unstructured":"Lewis, F. (2004). Smart environments: Technologies, protocols, and application. In D. J. Cook & S. K. Das (Eds.), Wireless sensor networks. New York: Wiley."},{"issue":"8","key":"1547_CR3","doi-asserted-by":"crossref","first-page":"1247","DOI":"10.1109\/JPROC.2003.814918","volume":"91","author":"CY Chong","year":"2003","unstructured":"Chong, C. Y., & Kumar, S. (2003). Sensor networks: Evolution, opportunities and challenges. Proceedings of IEEE, 91(8), 1247\u20131256.","journal-title":"Proceedings of IEEE"},{"key":"1547_CR4","unstructured":"IEEE Std 802.15.4-2006, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), 2006."},{"key":"1547_CR5","unstructured":"IEEE, WPAN Task Group 6. http:\/\/www.ieee802.org\/15\/pub\/TG6.html ."},{"key":"1547_CR6","unstructured":"IEEE Std 802.15.4-2003, Institute of Electrical and Electronics Engineers Inc, 1 October 2003."},{"key":"1547_CR7","unstructured":"IEEE802.15.4 WPANTaskGroup4(TG4). http:\/\/ieee802.org\/15\/pub\/TG4.html ."},{"key":"1547_CR8","unstructured":"Kinney, P. (2010). ZigBee technology: Wireless control that simply works. http:\/\/www.zigbee.org\/en\/press_kits\/2009_12_16\/documents\/white_papers\/wp_zigbeetechwireless_final.pdf Accessed on June 2010."},{"key":"1547_CR9","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8, 1086\u20131090.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"1547_CR10","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan, M. K., & Alghathbar, K. (2010). Cryptanalysis and security improvements of \u2018two-factor user authentication in wireless sensor networks\u2019. Sensors, 10(3), 2450\u20132459.","journal-title":"Sensors"},{"key":"1547_CR11","doi-asserted-by":"crossref","unstructured":"Vaidya, B., Makrakis, D., & Mouftah, H. T. (2010). Improved two-factor user authentication in wireless sensor networks. In IEEE 6th international conference on wireless and mobile computing, networking and communications (WiMob), 2000 (pp. 600\u2013606)","DOI":"10.1109\/WIMOB.2010.5645004"},{"issue":"3","key":"1547_CR12","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., & Chen, C. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367\u2013374.","journal-title":"Computer Communications"},{"issue":"5","key":"1547_CR13","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"key":"1547_CR14","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Proceedings of Advances in Cryptology (Crypto\u201999) (pp. 388\u2013397). Santa Barbara, USA.","DOI":"10.1007\/3-540-48405-1_25"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1547-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-013-1547-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1547-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T13:36:00Z","timestamp":1564925760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-013-1547-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,10]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["1547"],"URL":"https:\/\/doi.org\/10.1007\/s11277-013-1547-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,10]]}}}