{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T23:14:25Z","timestamp":1648854865444},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T00:00:00Z","timestamp":1500336000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s11277-017-4641-1","type":"journal-article","created":{"date-parts":[[2017,7,18]],"date-time":"2017-07-18T16:14:10Z","timestamp":1500394450000},"page":"2911-2924","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Mutual Authentication Mechanism for Securing Smart Phones"],"prefix":"10.1007","volume":"97","author":[{"given":"Wen-Bin","family":"Hsieh","sequence":"first","affiliation":[]},{"given":"Jenq-Shiou","family":"Leu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,18]]},"reference":[{"issue":"2","key":"4641_CR1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MITP.2011.17","volume":"13","author":"C-H Wei","year":"2011","unstructured":"Wei, C.-H., Hwang, M.-S., & Chin, A. Y. (2011). A mutual authentication protocol for RFID. IT Professional, 13(2), 20\u201324.","journal-title":"IT Professional"},{"issue":"5","key":"4641_CR2","doi-asserted-by":"crossref","first-page":"1573","DOI":"10.1109\/TIE.2009.2037098","volume":"57","author":"Y-J Huang","year":"2010","unstructured":"Huang, Y.-J., Yuan, C.-C., Chen, M.-K., Lin, W.-C., & Teng, H.-C. (2010). Hardware implementation of RFID mutual authentication protocol. IEEE Transactions on Industrial Electronics, 57(5), 1573\u20131582.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"9","key":"4641_CR3","doi-asserted-by":"crossref","first-page":"2569","DOI":"10.1109\/TWC.2006.05063","volume":"5","author":"Y Jiang","year":"2006","unstructured":"Jiang, Y., Lin, C., Shen, X., & Shi, M. (2006). Mutual authentication and key exchange protocols for roaming services in wireless mobile networks. IEEE Transactions on Wireless Communications, 5(9), 2569\u20132577.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"1","key":"4641_CR4","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","volume":"36","author":"K Xue","year":"2013","unstructured":"Xue, K., Ma, C., Hong, P., & Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316\u2013323.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"4641_CR5","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.adhoc.2010.07.007","volume":"9","author":"Z Li","year":"2011","unstructured":"Li, Z., & Gong, G. (2011). Computationally efficient mutual entity authentication in wireless sensor networks. Ad Hoc Networks, 9(2), 204\u2013215.","journal-title":"Ad Hoc Networks"},{"issue":"11","key":"4641_CR6","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770\u2013772.","journal-title":"Communications of the ACM"},{"issue":"1","key":"4641_CR7","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M-S Hwang","year":"2000","unstructured":"Hwang, M.-S., & Li, L.-H. (2000). A new remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(1), 28\u201330.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"4641_CR8","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"32","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 32(4), 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"4641_CR9","first-page":"1947","volume":"43","author":"T Hwang","year":"1995","unstructured":"Hwang, T., & Ku, W.-C. (1995). Reparable key distribution protocols for Internet environments. IEEE Transactions on Consumer Electronics, 43(5), 1947\u20131949.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"4641_CR10","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"HM Sun","year":"2000","unstructured":"Sun, H. M. (2000). An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(4), 958\u2013961.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"4641_CR11","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/TCE.2003.1209534","volume":"49","author":"J-J Shen","year":"2003","unstructured":"Shen, J.-J., Lin, C.-W., & Hwang, M.-S. (2003). A modified remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 49(2), 414\u2013416.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"4641_CR12","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1109\/TCE.2004.1309430","volume":"50","author":"AK Awashti","year":"2004","unstructured":"Awashti, A. K., & Lal, S. (2004). An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 50(2), 583\u2013586.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"3","key":"4641_CR13","doi-asserted-by":"crossref","first-page":"289","DOI":"10.15388\/Informatica.2003.022","volume":"14","author":"C-C Chang","year":"2003","unstructured":"Chang, C.-C., & Hwang, K.-F. (2003). Some forgery attacks on a remote user authentication scheme using smart cards. Informatics, 14(3), 289\u2013294.","journal-title":"Informatics"},{"issue":"2","key":"4641_CR14","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"ML Das","year":"2004","unstructured":"Das, M. L., Saxena, A., & Gulati, V. P. (2004). A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics, 50(2), 629\u2013631.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"4641_CR15","first-page":"2165","volume":"5","author":"Ku Wei-Chi","year":"2005","unstructured":"Wei-Chi, Ku, & Chang, S.-T. (2005). Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Transactions on Communications, 5, 2165\u20132167.","journal-title":"IEICE Transactions on Communications"},{"issue":"1\u20132","key":"4641_CR16","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S0895-7177(02)00106-1","volume":"36","author":"M-S Hwang","year":"2002","unstructured":"Hwang, M.-S., Lee, C.-C., & Tang, Y.-L. (2002). A simple remote user authentication scheme. Mathematical and Computer Modelling, 36(1\u20132), 103\u2013107.","journal-title":"Mathematical and Computer Modelling"},{"issue":"1","key":"4641_CR17","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"W-C Ku","year":"2004","unstructured":"Ku, W.-C., & Chen, S.-M. (2004). Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 50(1), 204\u2013207.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"3","key":"4641_CR18","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/567331.567335","volume":"36","author":"C-C Lee","year":"2002","unstructured":"Lee, C.-C., Hwang, M.-S., & Yang, W.-P. (2002). A flexible remote user authentication scheme using smart cards. ACM Operating Systems Review, 36(3), 46\u201352.","journal-title":"ACM Operating Systems Review"},{"issue":"3","key":"4641_CR19","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1109\/TNET.2009.2036366","volume":"18","author":"C-I Fan","year":"2010","unstructured":"Fan, C.-I., Ho, P.-H., & Hsu, R.-H. (2010). Provably secure nested one-time secret mechanisms for fast mutual authentication and key exchange in mobile communications. IEEE\/ACM Transactions on Networking, 18(3), 996\u20131009.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"4641_CR20","doi-asserted-by":"crossref","first-page":"2267","DOI":"10.1109\/TCE.2010.5681099","volume":"56","author":"S-H Lin","year":"2010","unstructured":"Lin, S.-H., Chiu, J.-H., & Lee, G.-R. (2010). A fast iterative localized re-authentication protocol for heterogeneous mobile networks. IEEE Transactions on Consumer Electronics, 56(4), 2267\u20132275.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"6","key":"4641_CR21","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1109\/TIE.2008.921677","volume":"55","author":"W-S Juang","year":"2008","unstructured":"Juang, W.-S., Chen, S.-T., & Liaw, H.-T. (2008). Robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 55(6), 2551\u20132556.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"2","key":"4641_CR22","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1109\/TIE.2009.2028351","volume":"57","author":"X Li","year":"2010","unstructured":"Li, X., Qiu, W., Zheng, D., Chen, K., & Li, J. (2010). Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Transactions on Industrial Electronics, 57(2), 793\u2013800.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"6","key":"4641_CR23","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1016\/j.csi.2009.03.002","volume":"31","author":"N-W Lo","year":"2009","unstructured":"Lo, N.-W., & Yeh, K.-H. (2009). Cryptanalysis of two three-party encrypted key exchange protocols. Computer Standards & Interfaces, 31(6), 1167\u20131174.","journal-title":"Computer Standards & Interfaces"},{"issue":"4","key":"4641_CR24","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1109\/TNN.2005.849781","volume":"16","author":"W-C Ku","year":"2005","unstructured":"Ku, W.-C. (2005). Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture. IEEE Transactions on Neural Networks, 16(4), 1002\u20131005.","journal-title":"IEEE Transactions on Neural Networks"},{"issue":"9","key":"4641_CR25","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/LCOMM.2006.1714545","volume":"10","author":"JW Byun","year":"2006","unstructured":"Byun, J. W., Lee, D. H., & Lim, J. I. (2006). Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol. IEEE Communications Letters, 10(9), 683\u2013685.","journal-title":"IEEE Communications Letters"},{"issue":"4","key":"4641_CR26","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1016\/j.csi.2008.09.020","volume":"31","author":"H-R Chung","year":"2009","unstructured":"Chung, H.-R., Ku, W.-C., & Tsaur, M.-J. (2009). Weaknesses and improvement of Wang et al\u2019.s remote user password authentication scheme for resource-limited environments. Computer Standards & Interfaces, 31(4), 863\u2013868.","journal-title":"Computer Standards & Interfaces"},{"key":"4641_CR27","doi-asserted-by":"crossref","unstructured":"Xu, Z., Bai, K., Zhu, S. (2012) TapLogger, inferring user inputs on smartphone touchscreens using on-board motion sensors. In Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC \u201812). ACM, New York, NY, USA, (pp. 113\u2013124).","DOI":"10.1145\/2185448.2185465"},{"issue":"4","key":"4641_CR28","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1109\/TNET.2011.2180922","volume":"20","author":"C Shen","year":"2012","unstructured":"Shen, C., Nahum, E., Schulzrinne, H., & Wright, C. P. (2012). The impact of TLS on SIP server performance: Measurement and modeling. IEEE\/ACM Transactions on Networking, 20(4), 1217\u20131230.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"4641_CR29","doi-asserted-by":"crossref","unstructured":"Eastlake, D. E., Jones, P. E. (2001) US Secure Hash Algorithm 1 (SHA1),\u201d RFC 3174.","DOI":"10.17487\/rfc3174"},{"issue":"Suppl. 1","key":"4641_CR30","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/S1005-8885(11)60455-X","volume":"19","author":"J-z Yang","year":"2012","unstructured":"Yang, J-z, Wanf, Y.-J., Qian, H.-F., & Zhou, Y. (2012). On the security of two password authenticated key agreement scheme using smart cards. The Journal of China Universities of Posts and Telecommunications, 19(Suppl. 1), 137\u2013141.","journal-title":"The Journal of China Universities of Posts and Telecommunications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4641-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4641-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4641-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T21:42:32Z","timestamp":1602538952000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4641-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,18]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["4641"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4641-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,18]]}}}