{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:30:38Z","timestamp":1764570638528},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,5,6]],"date-time":"2016-05-06T00:00:00Z","timestamp":1462492800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s11277-016-3342-5","type":"journal-article","created":{"date-parts":[[2016,5,6]],"date-time":"2016-05-06T13:50:33Z","timestamp":1462542633000},"page":"217-244","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Efficient Remote User Password Authentication Scheme based on Rabin\u2019s Cryptosystem"],"prefix":"10.1007","volume":"90","author":[{"given":"Pratik","family":"Ranjan","sequence":"first","affiliation":[]},{"given":"Hari","family":"Om","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,6]]},"reference":[{"issue":"3","key":"3342_CR1","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"H Debiao","year":"2012","unstructured":"Debiao, H., Jianhua, C., & Rui, Z. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989\u20131995.","journal-title":"Journal of Medical Systems"},{"key":"3342_CR2","doi-asserted-by":"crossref","unstructured":"Yang, Y., Zhou, J., Weng, J., & Bao, F. (2009). A new approach for anonymous password authentication. In Annual computer security applications conference, 2009. ACSAC\u201909, pp. 199\u2013208.","DOI":"10.1109\/ACSAC.2009.26"},{"issue":"11","key":"3342_CR3","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770\u2013772.","journal-title":"Communications of the ACM"},{"issue":"3","key":"3342_CR4","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1049\/ip-e.1991.0022","volume":"138","author":"CC Chang","year":"1991","unstructured":"Chang, C. C., & Wu, T. C. (1991). Remote password authentication with smart cards. Computers and Digital Techniques, IEE Proceedings E, 138(3), 165\u2013168.","journal-title":"Computers and Digital Techniques, IEE Proceedings E"},{"issue":"7","key":"3342_CR5","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/0898-1221(93)90048-Z","volume":"26","author":"CC Chang","year":"1993","unstructured":"Chang, C. C., & Hwang, S. J. (1993). Using smart cards to authenticate remote passwords. Computers & Mathematics with Applications, 26(7), 19\u201327.","journal-title":"Computers & Mathematics with Applications"},{"issue":"1","key":"3342_CR6","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"MS Hwang","year":"2000","unstructured":"Hwang, M. S., & Li, L. H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28\u201330.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"8","key":"3342_CR7","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/S0167-4048(99)80136-9","volume":"18","author":"WH Yang","year":"1999","unstructured":"Yang, W. H., & Shieh, S. P. (1999). Password authentication schemes with smart cards. Computers & Security, 18(8), 727\u2013733.","journal-title":"Computers & Security"},{"issue":"4","key":"3342_CR8","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"IE Liao","year":"2006","unstructured":"Liao, I. E., Lee, C. C., & Hwang, M. S. (2006). A password authentication scheme over insecure networks. Journal of Computer and System Sciences, 72(4), 727\u2013740.","journal-title":"Journal of Computer and System Sciences"},{"issue":"7","key":"3342_CR9","doi-asserted-by":"crossref","first-page":"1160","DOI":"10.1016\/j.jcss.2008.04.002","volume":"74","author":"G Yang","year":"2008","unstructured":"Yang, G., Wong, D. S., Wang, H., & Deng, X. (2008). Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences, 74(7), 1160\u20131172.","journal-title":"Journal of Computer and System Sciences"},{"issue":"6","key":"3342_CR10","doi-asserted-by":"crossref","first-page":"1914","DOI":"10.1016\/j.camwa.2012.03.044","volume":"64","author":"D He","year":"2012","unstructured":"He, D., Padhye, S., & Chen, J. (2012). An efficient certificateless two-party authenticated key agreement protocol. Computers & Mathematics with Applications, 64(6), 1914\u20131926.","journal-title":"Computers & Mathematics with Applications"},{"issue":"2","key":"3342_CR11","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1007\/s11277-014-2157-5","volume":"81","author":"M Luo","year":"2014","unstructured":"Luo, M., & Zhao, H. (2014). An authentication and key agreement mechanism for multi-domain wireless networks using certificateless public-key cryptography. Wireless Personal Communications, 81(2), 779\u2013798.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"3342_CR12","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TCE.2004.1277867","volume":"50","author":"J Zhu","year":"2004","unstructured":"Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 231\u2013235.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"6","key":"3342_CR13","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1016\/j.adhoc.2012.01.002","volume":"10","author":"D He","year":"2012","unstructured":"He, D. (2012). An efficient remote user authentication and key agreement protocol for mobile clientserver environment from pairings. Ad Hoc Networks, 10(6), 1009\u20131016.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"3342_CR14","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s11071-012-0335-0","volume":"69","author":"D He","year":"2012","unstructured":"He, D., Chen, Y., & Chen, J. (2012). Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dynamics, 69(3), 1149\u20131157.","journal-title":"Nonlinear Dynamics"},{"issue":"2","key":"3342_CR15","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11277-013-1282-x","volume":"74","author":"D He","year":"2014","unstructured":"He, D., Zhang, Y., & Chen, J. (2014). Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications, 74(2), 229\u2013243.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"3342_CR16","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s11277-010-0033-5","volume":"61","author":"D He","year":"2011","unstructured":"He, D., Chan, S., Chen, C., Bu, J., & Fan, R. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465\u2013476.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"3342_CR17","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477\u20131491.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"3342_CR18","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1023\/B:WIRE.0000047070.38334.5e","volume":"29","author":"YM Tseng","year":"2004","unstructured":"Tseng, Y. M., Yang, C. C., & Su, J. H. (2004). Authentication and billing protocols for the integration of WLAN and 3G networks. Wireless Personal Communications, 29(3), 351\u2013366.","journal-title":"Wireless Personal Communications"},{"issue":"3\u20134","key":"3342_CR19","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.cose.2008.04.001","volume":"27","author":"JL Tsai","year":"2008","unstructured":"Tsai, J. L. (2008). Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers & Security, 27(3\u20134), 115\u2013121.","journal-title":"Computers & Security"},{"issue":"2","key":"3342_CR20","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s11277-011-0456-7","volume":"68","author":"B Wang","year":"2013","unstructured":"Wang, B., & Ma, M. (2013). A smart card based efficient and secured multi-server authentication scheme. Wireless Personal Communications, 68(2), 361\u2013378.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"3342_CR21","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s11277-012-0696-1","volume":"70","author":"D He","year":"2013","unstructured":"He, D., & Wu, S. (2013). Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications, 70(1), 323\u2013329.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"3342_CR22","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.1007\/s11277-012-0918-6","volume":"71","author":"JL Tsai","year":"2013","unstructured":"Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). A new password-based multi-server authentication scheme robust to password guessing attacks. Wireless personal communications, 71(3), 1977\u20131988.","journal-title":"Wireless personal communications"},{"issue":"1","key":"3342_CR23","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1007\/s11277-013-1039-6","volume":"72","author":"RS Pippal","year":"2013","unstructured":"Pippal, R. S., Jaidhar, C. D., & Tapaswi, S. (2013). Robust smart card authentication scheme for multi-server architecture. Wireless Personal Communications, 72(1), 729\u2013745.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"3342_CR24","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1109\/TCE.2004.1309424","volume":"50","author":"SW Lee","year":"2004","unstructured":"Lee, S. W., Kim, H. S., & Yoo, K. Y. (2004). Improved efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 50(2), 565\u2013567.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"3342_CR25","unstructured":"Yoon, E. J., & Yoo, K. Y. (2005). More efficient and secure remote user authentication scheme using smart cards. In 11th international conference on parallel and distributed systems, 2005. Proceedings (Vol. 2, pp. 73\u201377). IEEE."},{"issue":"6","key":"3342_CR26","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1016\/j.comcom.2008.11.026","volume":"32","author":"SK Kim","year":"2009","unstructured":"Kim, S. K., & Chung, M. G. (2009). More secure remote user authentication scheme. Computer Communications, 32(6), 1018\u20131021.","journal-title":"Computer Communications"},{"issue":"6","key":"3342_CR27","doi-asserted-by":"crossref","first-page":"1426","DOI":"10.1587\/transfun.E94.A.1426","volume":"94","author":"JY Kim","year":"2011","unstructured":"Kim, J. Y., Choi, H. K., & Copeland, J. A. (2011). Further improved remote user authentication scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 94(6), 1426\u20131433.","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"key":"3342_CR28","unstructured":"Rabin, M. O. (1979). Digitalized signatures and public-key functions as intractable as factorization. Technical Report MIT\/LCS\/TR-212, MIT Laboratory for Computer Science."},{"key":"3342_CR29","doi-asserted-by":"crossref","unstructured":"Tai, W. L., Chang, Y. F., Li, Y. F., & Pan, S. M. (2012). A security enhancement on a remote user authentication scheme based on the rabin cryptosystem with secure password updating. In 2012 26th international conference on advanced information networking and applications workshops (WAINA), pp. 160\u2013164.","DOI":"10.1109\/WAINA.2012.13"},{"issue":"4","key":"3342_CR30","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"IE Liao","year":"2006","unstructured":"Liao, I. E., Lee, C. C., & Hwang, M. S. (2006). A password authentication scheme over insecure networks. Journal of Computer and System Sciences, 72(4), 727\u2013740.","journal-title":"Journal of Computer and System Sciences"},{"issue":"4","key":"3342_CR31","first-page":"419","volume":"3","author":"ZY Cheng","year":"2013","unstructured":"Cheng, Z. Y., Liu, Y., Chang, C. C., & Liu, C. X. (2013). A novel biometric-based remote user authentication scheme using quadratic residues. International Journal of Information and Electronics Engineering, 3(4), 419\u2013422.","journal-title":"International Journal of Information and Electronics Engineering"},{"key":"3342_CR32","doi-asserted-by":"crossref","unstructured":"Yang, F. Y., Hsu, C. W., & Chiu, S. H. (2014). Password authentication scheme preserving identity privacy. In 2014 sixth international conference on measuring technology and mechatronics automation (ICMTMA), pp. 443\u2013447.","DOI":"10.1109\/ICMTMA.2014.108"},{"key":"3342_CR33","doi-asserted-by":"crossref","unstructured":"Kim, Y., Choi, Y., & Won, D. (2014). Security improvement on smart card-based remote user authentication scheme using hash function. In 2014 international conference on information science and applications (ICISA), pp. 1\u20134.","DOI":"10.1109\/ICISA.2014.6847459"},{"issue":"1","key":"3342_CR34","first-page":"31","volume":"6","author":"B Padma","year":"2012","unstructured":"Padma, B., & Chandravathi, D. (2012). Selecting plaintext in rabin cryptosystems using padding generated by pseudo-random bit generators. The IUP Journal of Computer Sciences, 6(1), 31\u201338.","journal-title":"The IUP Journal of Computer Sciences"},{"key":"3342_CR35","unstructured":"Junod, P. (1999). Cryptographic secure pseudo-random bits generation: the blum-blum-shub generator. http:\/\/crypto.junod.info\/bbs.pdf . Accessed 02 May 2016."},{"issue":"2","key":"3342_CR36","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1137\/0215025","volume":"15","author":"L Blum","year":"1986","unstructured":"Blum, L., Blum, M., & Shub, M. (1986). A simple unpredictable pseudo-random number generator. SIAM Journal on computing, 15(2), 364\u2013383.","journal-title":"SIAM Journal on computing"},{"key":"3342_CR37","doi-asserted-by":"crossref","unstructured":"Blum, L., Blum, M., & Shub, M. (1983). Comparison of two pseudo-random number generators. In Advances in Cryptology, pp. 61\u201378.","DOI":"10.1007\/978-1-4757-0602-4_6"},{"issue":"4","key":"3342_CR38","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1016\/j.jnca.2006.10.003","volume":"30","author":"JS Lee","year":"2007","unstructured":"Lee, J. S., & Chang, C. C. (2007). Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications, 30(4), 1377\u20131396.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"3342_CR39","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.comcom.2011.09.003","volume":"35","author":"W Li","year":"2012","unstructured":"Li, W., Wen, Q., Su, Q., & Jin, Z. (2012). An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications, 35(2), 188\u2013195.","journal-title":"Computer Communications"},{"issue":"12","key":"3342_CR40","doi-asserted-by":"crossref","first-page":"2803","DOI":"10.1016\/j.comcom.2007.12.005","volume":"31","author":"CT Li","year":"2008","unstructured":"Li, C. T., Hwang, M. S., & Chu, Y. P. (2008). A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Computer Communications, 31(12), 2803\u20132814.","journal-title":"Computer Communications"},{"issue":"2","key":"3342_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0182-2","volume":"39","author":"L Xu","year":"2015","unstructured":"Xu, L., & Wu, F. (2015). Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. Journal of Medical Systems, 39(2), 1\u20139.","journal-title":"Journal of Medical Systems"},{"key":"3342_CR42","doi-asserted-by":"crossref","unstructured":"Wang, X., Yin, Y. L., & Yu, H. (2005). Finding collisions in the full SHA-1. In Advances in Cryptology, CRYPTO, 2005, pp. 17\u201336.","DOI":"10.1007\/11535218_2"},{"issue":"2","key":"3342_CR43","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/362848.362860","volume":"12","author":"WH Payne","year":"1969","unstructured":"Payne, W. H., Rabung, J. R., & Bogyo, T. P. (1969). Coding the Lehmer pseudo-random number generator. Communications of the ACM, 12(2), 85\u201386.","journal-title":"Communications of the ACM"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3342-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3342-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3342-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3342-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T10:47:18Z","timestamp":1567853238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3342-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,6]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["3342"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3342-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,6]]}}}