{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:27:23Z","timestamp":1759134443750},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T00:00:00Z","timestamp":1486425600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-017-3990-0","type":"journal-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T17:15:49Z","timestamp":1486487749000},"page":"3185-3208","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo\u2019s Scheme"],"prefix":"10.1007","volume":"95","author":[{"given":"Azeem","family":"Irshad","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Sher","sequence":"additional","affiliation":[]},{"given":"Muhammad Usman","family":"Ashraf","sequence":"additional","affiliation":[]},{"given":"Bander A.","family":"Alzahrani","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,7]]},"reference":[{"key":"3990_CR1","doi-asserted-by":"crossref","first-page":"1598","DOI":"10.1016\/j.ins.2007.11.001","volume":"178","author":"D Xiao","year":"2008","unstructured":"Xiao, D., Liao, X., & Deng, S. (2008). Using time-stamp to improve the security of a chaotic maps-based key agreement protocol. Information Sciences, 178, 1598\u201311602.","journal-title":"Information Sciences"},{"key":"3990_CR2","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.chaos.2007.01.017","volume":"38","author":"S Han","year":"2008","unstructured":"Han, S. (2008). Security of a key agreement protocol based on chaotic maps. Chaos, Solitons & Fractals, 38, 764\u2013768.","journal-title":"Chaos, Solitons & Fractals"},{"key":"3990_CR3","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1016\/j.ins.2006.07.026","volume":"177","author":"D Xiao","year":"2007","unstructured":"Xiao, D., Liao, X., & Deng, S. (2007). A novel key agreement protocol based on chaotic maps. Information Sciences, 177, 1136\u20131142.","journal-title":"Information Sciences"},{"issue":"2","key":"3990_CR4","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1016\/j.chaos.2007.08.012","volume":"40","author":"T Xiang","year":"2009","unstructured":"Xiang, T., Wong, K., & Liao, X. (2009). On the security of a novel key agreement protocol based on chaotic maps. Chaos, Solitons & Fractals, 40(2), 672\u2013675.","journal-title":"Chaos, Solitons & Fractals"},{"key":"3990_CR5","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1016\/j.chaos.2007.06.030","volume":"39","author":"S Han","year":"2009","unstructured":"Han, S., & Chang, E. (2009). Chaotic map based key agreement with\/out clock synchronization. Chaos, Solitons & Fractals, 39, 1283\u20131289.","journal-title":"Chaos, Solitons & Fractals"},{"key":"3990_CR6","doi-asserted-by":"crossref","first-page":"897","DOI":"10.1007\/978-3-540-78582-8_91","volume-title":"Agent and multi-agent systems: Technologies and applications","author":"EJ Yoon","year":"2008","unstructured":"Yoon, E. J., & Yoo, K. Y. (2008). A new key agreement protocol based on chaotic maps. In N. T. Nguyen, G. S. Jo, R. J. Howlett, & L. C. Jain (Eds.), Agent and multi-agent systems: Technologies and applications (pp. 897\u2013906). Springer: Heidelberg."},{"issue":"4","key":"3990_CR7","doi-asserted-by":"crossref","first-page":"2401","DOI":"10.1007\/s11071-012-0628-3","volume":"70","author":"P Gong","year":"2012","unstructured":"Gong, P., Li, P., & Shi, W. B. (2012). A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dynamics, 70(4), 2401\u20132406.","journal-title":"Nonlinear Dynamics"},{"key":"3990_CR8","doi-asserted-by":"crossref","first-page":"4069","DOI":"10.1016\/j.ins.2010.06.013","volume":"180","author":"X Guo","year":"2010","unstructured":"Guo, X., & Zhang, J. (2010). Secure group key agreement protocol based on chaotic hash. Information Sciences, 180, 4069\u20134074.","journal-title":"Information Sciences"},{"issue":"4","key":"3990_CR9","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"Y Niu","year":"2011","unstructured":"Niu, Y., & Wang, X. (2011). An anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 16(4), 1986\u20131992.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"12","key":"3990_CR10","doi-asserted-by":"crossref","first-page":"4052","DOI":"10.1016\/j.cnsns.2010.02.014","volume":"15","author":"X Wang","year":"2010","unstructured":"Wang, X., & Zhao, J. (2010). An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation, 15(12), 4052\u20134057.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"3990_CR11","doi-asserted-by":"crossref","unstructured":"Tseng, H., Jan, R., & Yang, W. (2009). A chaotic maps-based key agreement protocol that preserves user anonymity. In IEEE international conference on communications (ICC09) (pp. 1\u20136).","DOI":"10.1109\/ICC.2009.5198581"},{"issue":"3","key":"3990_CR12","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s11071-012-0335-0","volume":"69","author":"D He","year":"2012","unstructured":"He, D., Chen, Y., & Chen, J. H. (2012). Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dynamics, 69(3), 1149\u20131157.","journal-title":"Nonlinear Dynamics"},{"key":"3990_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3745-3","author":"SA Chaudhry","year":"2016","unstructured":"Chaudhry, S. A., Naqvi, H., Mahmood, K., Ahmad, H. F., & Khan, M. K. (2016). An improved remote user authentication scheme using elliptic curve cryptography. Wireless Personal Communication. doi: 10.1007\/s11277-016-3745-3 .","journal-title":"Wireless Personal Communication"},{"key":"3990_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1886-5","author":"I Khan","year":"2016","unstructured":"Khan, I., Chaudhry, S. A., Sher, M., Khan, J. I., & Khan, M. K. (2016). An anonymous and provably secure biometric based authentication scheme using chaotic maps for accessing medical drop box data. Journal of Supercomputing. doi: 10.1007\/s11227-016-1886-5 .","journal-title":"Journal of Supercomputing"},{"issue":"6","key":"3990_CR15","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1016\/j.cnsns.2012.09.032","volume":"18","author":"C Guo","year":"2013","unstructured":"Guo, C., & Chang, C. C. (2013). Chaotic maps-based password-authenticated key agreement using smart cards. Communications in Nonlinear Science and Numerical Simulation, 18(6), 1433\u20131440.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"issue":"7","key":"3990_CR16","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1016\/j.cnsns.2011.11.010","volume":"17","author":"EJ Yoon","year":"2012","unstructured":"Yoon, E. J. (2012). Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2735\u20132740.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"3990_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3194-0","author":"SA Chaudhry","year":"2016","unstructured":"Chaudhry, S. A. (2016). A secure biometric based multi-server authentication scheme for social multimedia networks. Multimedia Tools and Applications. doi: 10.1007\/s11042-015-3194-0 .","journal-title":"Multimedia Tools and Applications"},{"issue":"1\u20132","key":"3990_CR18","first-page":"125","volume":"73","author":"CC Lee","year":"2013","unstructured":"Lee, C. C., Li, C. T., & Hsu, C. W. (2013). A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dynamics, 73(1\u20132), 125\u2013132.","journal-title":"Nonlinear Dynamics"},{"key":"3990_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0400-9","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, S. A., Naqvi, H., Sher, M., Farash, M. S., & Hassan, M. U. (2015). An improved and provably secure privacy preserving authentication protocol for SIP. Peer to Peer Networking and Applications. doi: 10.1007\/s12083-015-0400-9 .","journal-title":"Peer to Peer Networking and Applications"},{"key":"3990_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0244-0","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., & Farash, M. S. (2015). Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. Journal of Medical Systems. doi: 10.1007\/s10916-015-0244-0 .","journal-title":"Journal of Medical Systems"},{"key":"3990_CR21","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1299","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, S. A., Farash, M. S., Naqvi, H., Kumari, S., & Khan, M. K. (2015). An enhanced privacy preserving remote user authentication scheme with provable security. Security and Communication Networks. doi: 10.1002\/sec.1299 .","journal-title":"Security and Communication Networks"},{"issue":"3","key":"3990_CR22","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/7384.963463","volume":"1","author":"L Kocarev","year":"2001","unstructured":"Kocarev, L. (2001). Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine, 1(3), 6\u201321.","journal-title":"IEEE Circuits and Systems Magazine"},{"issue":"1\u20132","key":"3990_CR23","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/S0375-9601(98)00086-3","volume":"240","author":"MS Baptista","year":"1998","unstructured":"Baptista, M. S. (1998). Cryptography with chaos. Physics Letters A, 240(1\u20132), 50\u201354.","journal-title":"Physics Letters A"},{"key":"3990_CR24","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/S0960-0779(04)00456-4","volume":"24","author":"D Xiao","year":"2005","unstructured":"Xiao, D., Liao, X., & Deng, S. (2005). One-way hash function construction based on the chaotic map with changeable parameter. Chaos, Solitons & Fractals, 24, 65\u201371.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"7","key":"3990_CR25","doi-asserted-by":"crossref","first-page":"3089","DOI":"10.1016\/j.cnsns.2008.12.005","volume":"14","author":"Y Wang","year":"2009","unstructured":"Wang, Y., Wong, K., Liao, X., & Xiang, T. (2009). A block cipher with dynamic s-boxes based on tent map. Communications in Nonlinear Science and Numerical Simulation, 14(7), 3089\u20133099.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"3990_CR26","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.chaos.2005.10.022","volume":"31","author":"G Chen","year":"2007","unstructured":"Chen, G., Chen, Y., & Liao, X. (2007). An extended method for obtaining s-boxes based on three-dimensional chaotic Baker maps. Chaos, Solitons & Fractals, 31, 571\u2013579.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"1","key":"3990_CR27","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"WS Juang","year":"2004","unstructured":"Juang, W. S. (2004). Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics, 50(1), 251\u2013255.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"3990_CR28","doi-asserted-by":"crossref","unstructured":"Chang, C. C., & Lee, J. S. (2004). An efficient and secure multi-server password authentication scheme using smart card. In Proceedings of the international conference on cyberworlds (pp. 417\u2013422).","DOI":"10.1109\/CW.2004.17"},{"issue":"6","key":"3990_CR29","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"LH Li","year":"2001","unstructured":"Li, L. H., Lin, I. C., & Hwang, M. S. (2001). A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Networks, 12(6), 1498\u20131504.","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"8","key":"3990_CR30","first-page":"3467","volume":"6","author":"KH Yeh","year":"2010","unstructured":"Yeh, K. H., & Lo, N. W. (2010). A novel remote user authentication scheme for multi-server environment without using smart cards. International Journal of Innovative Computing Information and Control, 6(8), 3467\u20133478.","journal-title":"International Journal of Innovative Computing Information and Control"},{"issue":"6","key":"3990_CR31","first-page":"1357","volume":"4","author":"JS Lee","year":"2008","unstructured":"Lee, J. S., Chang, Y. F., & Chang, C. C. (2008). A novel authentication protocol for multi-server architecture without smart cards. International Journal of Innovative Computing Information and Control, 4(6), 1357\u20131364.","journal-title":"International Journal of Innovative Computing Information and Control"},{"issue":"3\u20134","key":"3990_CR32","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.cose.2008.04.001","volume":"27","author":"JL Tsai","year":"2008","unstructured":"Tsai, J. L. (2008). Efficient multi-server authentication scheme based on one-way hash function without verification table. Computers & Security, 27(3\u20134), 115\u2013121.","journal-title":"Computers & Security"},{"issue":"11","key":"3990_CR33","doi-asserted-by":"crossref","first-page":"1260","DOI":"10.1002\/sec.573","volume":"5","author":"MK Khan","year":"2012","unstructured":"Khan, M. K., & He, D. (2012). A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Security and Communication Networks, 5(11), 1260\u20131266.","journal-title":"Security and Communication Networks"},{"issue":"2","key":"3990_CR34","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An enhanced and security dynamic identity based authentication protocol for multiserver architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763\u2013769.","journal-title":"Journal of Network and Computer Applications"},{"issue":"7","key":"3990_CR35","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1002\/dac.1184","volume":"24","author":"KH Yeh","year":"2011","unstructured":"Yeh, K. H., Lo, N. W., & Li, Y. (2011). Cryptanalysis of Hsiang-Shih\u2019s authentication scheme for multi-server architecture. International Journal of Communication Systems, 24(7), 829\u2013836.","journal-title":"International Journal of Communication Systems"},{"issue":"13","key":"3990_CR36","doi-asserted-by":"crossref","first-page":"1955","DOI":"10.1002\/dac.2829","volume":"28","author":"JL Tsai","year":"2015","unstructured":"Tsai, J. L., & Lo, N. W. (2015). A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card. International Journal of Communication Systems, 28(13), 1955\u20131963.","journal-title":"International Journal of Communication Systems"},{"key":"3990_CR37","unstructured":"Han, W. (2012). Weaknesses of a dynamic identity based authentication protocol for multi-server architecture. arXiv:1201.0883v1 , 2012. http:\/\/arxiv.org\/abs\/1201.0883 ."},{"key":"3990_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0918-6","author":"JL Tsai","year":"2013","unstructured":"Tsai, J. L., Lo, N. W., & Wu, T. C. (2013). A new password-based multi-server authentication scheme robust to password guessing attacks. Wireless Personal Communications. doi: 10.1007\/s11277-012-0918-6 .","journal-title":"Wireless Personal Communications"},{"key":"3990_CR39","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1002\/sec.1417","volume":"9","author":"Y Lu","year":"2016","unstructured":"Lu, Y., Li, L., Peng, H., & Yang, Y. (2016). Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture. Security and Communication Networks, 9, 1321\u20131330.","journal-title":"Security and Communication Networks"},{"key":"3990_CR40","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume":"3027","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., & Smith, A. (2004). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Advances in Cryptology\u2014EUROCRYPT, 3027, 523\u2013540. doi: 10.1007\/978-3-540-24676-3_31 .","journal-title":"Advances in Cryptology\u2014EUROCRYPT"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-3990-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-3990-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-3990-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T01:13:28Z","timestamp":1601601208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-3990-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,7]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["3990"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-3990-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,7]]}}}