{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:39:56Z","timestamp":1777372796573,"version":"3.51.4"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,5,19]],"date-time":"2015-05-19T00:00:00Z","timestamp":1431993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s11277-015-2721-7","type":"journal-article","created":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T09:15:43Z","timestamp":1431940543000},"page":"2571-2598","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Smart Cards in Wireless Communication Systems"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6903-0361","authenticated-orcid":false,"given":"Vanga","family":"Odelu","sequence":"first","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,19]]},"reference":[{"key":"2721_CR1","unstructured":"Automated validation of internet security protocols and applications. http:\/\/www.avispa-project.org\/package\/usermanual . Accessed on March 2013."},{"key":"2721_CR2","unstructured":"Automated validation of internet security protocols and applications, avispa web tool. http:\/\/www.avispa-project.org\/web-interface\/expert.php\/ . Accessed on October 2014."},{"issue":"3","key":"2721_CR3","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D Basin","year":"2005","unstructured":"Basin, D., Modersheim, S., & Vigano, L. (2005). OFMC: A symbolic model checker for security protocols. International Journal of Information Security, 4(3), 181\u2013208.","journal-title":"International Journal of Information Security"},{"key":"2721_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Canetti, R., & Krawczyk, H. (1998). A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the thirtieth annual ACM symposium on theory of computing (pp. 419\u2013428). ACM.","DOI":"10.1145\/276698.276854"},{"issue":"1","key":"2721_CR5","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"key":"2721_CR6","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1007\/3-540-44987-6_28","volume-title":"Advances in Cryptology-EUROCRYPT 2001","author":"R Canetti","year":"2001","unstructured":"Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. Advances in Cryptology-EUROCRYPT 2001 (pp. 453\u2013474). Heidelberg: Springer."},{"key":"2721_CR7","doi-asserted-by":"crossref","unstructured":"Chatterjee, S., & Das, A. K. (2014). An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks. doi: 10.1002\/sec.1140 .","DOI":"10.1002\/sec.1140"},{"issue":"2","key":"2721_CR8","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1002\/dac.2368","volume":"27","author":"BL Chen","year":"2014","unstructured":"Chen, B. L., Kuo, W. C., & Wuu, L. C. (2014). Robust smart-card-based remote user password authentication scheme. International Journal of Communication Systems, 27(2), 377\u2013389.","journal-title":"International Journal of Communication Systems"},{"issue":"4","key":"2721_CR9","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1016\/j.future.2010.08.007","volume":"27","author":"TH Chen","year":"2011","unstructured":"Chen, T. H., Hsiang, H. C., & Shih, W. K. (2011). Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Generation Computer Systems, 27(4), 377\u2013380.","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"2721_CR10","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"HY Chien","year":"2002","unstructured":"Chien, H. Y., Jan, J. K., & Tseng, Y. M. (2002). An efficient and practical solution to remote authentication: Smart card. Computers and Security, 21(4), 372\u2013375.","journal-title":"Computers and Security"},{"issue":"4","key":"2721_CR11","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1002\/nem.739","volume":"20","author":"YH Chuang","year":"2010","unstructured":"Chuang, Y. H., & Tseng, Y. M. (2010). An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management, 20(4), 167\u2013180.","journal-title":"International Journal of Network Management"},{"issue":"3","key":"2721_CR12","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A. K. (2011). Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security, 5(3), 145\u2013151.","journal-title":"IET Information Security"},{"issue":"5","key":"2721_CR13","first-page":"1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A. K., & Bruhadeshwar, B. (2013). An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. Journal of Medical Systems, 37(5), 1\u201317.","journal-title":"Journal of Medical Systems"},{"issue":"3","key":"2721_CR14","first-page":"1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A. K., & Goswami, A. (2013). A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Journal of Medical Systems, 37(3), 1\u201316.","journal-title":"Journal of Medical Systems"},{"issue":"C","key":"2721_CR15","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A. K., Paul, N. R., & Tripathy, L. (2012). Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences, 209(C), 80\u201392.","journal-title":"Information Sciences"},{"issue":"2","key":"2721_CR16","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198\u2013208.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2721_CR17","unstructured":"Goldwasser, S., & Bellare, M. (2008). Lecture notes on cryptography. Summer course \u201cCryptography and Computer Security\u201d at MIT (pp. 1\u2013289). http:\/\/cseweb.ucsd.edu\/mihir\/papers\/gb.html . Accessed on September 2014."},{"issue":"3","key":"2721_CR18","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/S0920-5489(03)00094-1","volume":"26","author":"CL Hsu","year":"2004","unstructured":"Hsu, C. L. (2004). Security of Chien et al.\u2019s remote user authentication scheme using smart cards. Computer Standards and Interfaces, 26(3), 167\u2013169.","journal-title":"Computer Standards and Interfaces"},{"issue":"7","key":"2721_CR19","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1109\/TPDS.2013.230","volume":"25","author":"X Huang","year":"2014","unstructured":"Huang, X., Chen, X., Li, J., Xiang, Y., & Xu, L. (2014). Further observations on smart-card-based password-authenticated key agreement in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 25(7), 1767\u20131775.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"2721_CR20","doi-asserted-by":"crossref","unstructured":"Islam, S. K. (2014). Design and analysis of an improved smartcard-based remote user password authentication scheme. International Journal of Communication Systems. doi: 10.1002\/dac.2793 .","DOI":"10.1002\/dac.2793"},{"key":"2721_CR21","doi-asserted-by":"crossref","unstructured":"Katz, J., & Lindell, Y. (2007). Introduction to modern cryptography: Principles and protocols. CRC Press. http:\/\/www.cs.ucdavis.edu\/rogaway\/classes\/227\/fall03\/book\/index.html . Accessed on September 2014","DOI":"10.1201\/9781420010756"},{"key":"2721_CR22","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. Advances in Cryptology-CRYPTO\u201999 (pp. 388\u2013397). California: Springer."},{"issue":"11","key":"2721_CR23","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770\u2013772.","journal-title":"Communications of the ACM"},{"issue":"2","key":"2721_CR24","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.csi.2004.06.001","volume":"27","author":"NY Lee","year":"2005","unstructured":"Lee, N. Y., & Chiu, Y. C. (2005). Improved remote authentication scheme with smart card. Computer Standards and Interfaces, 27(2), 177\u2013180.","journal-title":"Computer Standards and Interfaces"},{"issue":"2","key":"2721_CR25","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.csi.2004.02.002","volume":"27","author":"SW Lee","year":"2005","unstructured":"Lee, S. W., Kim, H. S., & Yoo, K. Y. (2005). Improvement of Chien et al.\u2019s remote user authentication scheme using smart cards. Computer Standards and Interfaces, 27(2), 181\u2013183.","journal-title":"Computer Standards and Interfaces"},{"issue":"5","key":"2721_CR26","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X., Niu, J., Khan, M. K., & Liao, J. (2013). An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications, 36(5), 1365\u20131371.","journal-title":"Journal of Network and Computer Applications"},{"key":"2721_CR27","doi-asserted-by":"crossref","unstructured":"Lin, H. Y. (2014). Efficient mobile dynamic id authentication and key agreement scheme without trusted servers. International Journal of Communication Systems. doi: 10.1002\/dac.2818 .","DOI":"10.1002\/dac.2818"},{"issue":"1","key":"2721_CR28","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.jnca.2012.04.006","volume":"36","author":"C Lv","year":"2013","unstructured":"Lv, C., Ma, M., Li, H., Ma, J., & Zhang, Y. (2013). An novel three-party authenticated key exchange protocol using one-time key. Journal of Network and Computer Applications, 36(1), 498\u2013503.","journal-title":"Journal of Network and Computer Applications"},{"issue":"5","key":"2721_CR29","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"key":"2721_CR30","doi-asserted-by":"crossref","unstructured":"Mishra, D., Das, A. K., & Mukhopadhyay, S. (2014). A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Networking and Applications 1\u201322.","DOI":"10.1007\/s12083-014-0321-z"},{"key":"2721_CR31","doi-asserted-by":"crossref","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2014). A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Security and Communication Networks. doi: 10.1002\/sec.1139 .","DOI":"10.1002\/sec.1139"},{"issue":"C","key":"2721_CR32","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.ins.2013.10.022","volume":"269","author":"V Odelu","year":"2014","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2014). A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Information Sciences, 269(C), 270\u2013285.","journal-title":"Information Sciences"},{"key":"2721_CR33","unstructured":"von Oheimb, D. (2005). The high-level protocol specification language HLPSL developed in the EU project AVISPA. In Proceedings of APPSEM 2005 Workshop (pp. 1\u201317). Tallinn."},{"issue":"4","key":"2721_CR34","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/1880022.1880027","volume":"13","author":"P Sarkar","year":"2010","unstructured":"Sarkar, P. (2010). A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security, 13(4), 33.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"5","key":"2721_CR35","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.csi.2010.03.008","volume":"32","author":"R Song","year":"2010","unstructured":"Song, R. (2010). Advanced smart card based password authentication protocol. Computer Standards and Interfaces, 32(5), 321\u2013325.","journal-title":"Computer Standards and Interfaces"},{"key":"2721_CR36","doi-asserted-by":"crossref","unstructured":"Sood, S. K., Sarje, A. K., & Singh, K. (2010). An improvement of Xu et al.\u2019s authentication scheme using smart cards. In Proceedings of the third annual ACM Bangalore conference (p. 15). ACM.","DOI":"10.1145\/1754288.1754303"},{"key":"2721_CR37","volume-title":"Cryptography and network security: Principles and practices","author":"W Stallings","year":"2003","unstructured":"Stallings, W. (2003). Cryptography and network security: Principles and practices (3rd ed.). New Delhi: Pearson Education.","edition":"3"},{"issue":"4","key":"2721_CR38","doi-asserted-by":"crossref","first-page":"2004","DOI":"10.1109\/TII.2012.2230639","volume":"9","author":"JL Tsai","year":"2013","unstructured":"Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). Novel anonymous authentication scheme using smart cards. IEEE Transactions on Industrial Informatics, 9(4), 2004\u20132013.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"2721_CR39","doi-asserted-by":"crossref","unstructured":"Wang, D., He, D., Wang, P., & Chu, C. (2014). Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing. doi: 10.1109\/TDSC.2014.2355850 .","DOI":"10.1109\/TDSC.2014.2355850"},{"issue":"4","key":"2721_CR40","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.inffus.2012.12.002","volume":"14","author":"D Wang","year":"2013","unstructured":"Wang, D., & Ma, C. G. (2013). Cryptanalysis of a remote user authentication scheme for mobile client\u2013server environment based on ECC. Information Fusion, 14(4), 498\u2013503.","journal-title":"Information Fusion"},{"issue":"2","key":"2721_CR41","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.csi.2008.01.002","volume":"31","author":"L Wu","year":"2009","unstructured":"Wu, L., Zhang, Y., & Wang, F. (2009). A new provably secure authentication and key agreement protocol for sip using ECC. Computer Standards and Interfaces, 31(2), 286\u2013291.","journal-title":"Computer Standards and Interfaces"},{"issue":"6","key":"2721_CR42","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1016\/S0167-4048(03)00616-3","volume":"22","author":"ST Wu","year":"2003","unstructured":"Wu, S. T., & Chieu, B. C. (2003). A user friendly remote authentication scheme with smart cards. Computers and Security, 22(6), 547\u2013550.","journal-title":"Computers and Security"},{"issue":"4","key":"2721_CR43","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu, J., Zhu, W. T., & Feng, D. G. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces, 31(4), 723\u2013728.","journal-title":"Computer Standards and Interfaces"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2721-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2721-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2721-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T02:05:39Z","timestamp":1717898739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2721-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,19]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["2721"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2721-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,19]]}}}