{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T15:54:51Z","timestamp":1771602891801,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:00:00Z","timestamp":1590451200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:00:00Z","timestamp":1590451200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11277-020-07462-4","type":"journal-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T21:04:25Z","timestamp":1590527065000},"page":"2779-2803","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An Enhanced Authentication Protocol for Multi-server Environment Using Password and Smart Card"],"prefix":"10.1007","volume":"115","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1396-3223","authenticated-orcid":false,"given":"T.","family":"Sudhakar","sequence":"first","affiliation":[]},{"given":"V.","family":"Natarajan","sequence":"additional","affiliation":[]},{"given":"M.","family":"Gopinath","sequence":"additional","affiliation":[]},{"given":"J.","family":"Saranyadevi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,26]]},"reference":[{"key":"7462_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24, 770\u2013772.","journal-title":"Communications of the ACM"},{"key":"7462_CR2","doi-asserted-by":"crossref","unstructured":"Chang, C. C., & Wu, T. C. (1991). Remote password authentication with smart cards. In Proceedings of the computers and digital techniques (pp. 165\u2013168).","DOI":"10.1049\/ip-e.1991.0022"},{"key":"7462_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2605087","author":"D Wang","year":"2016","unstructured":"Wang, D., & Wang, P. (2016). Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/TDSC.2016.2605087.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"7462_CR4","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0164-1212(98)00006-5","volume":"42","author":"JK Jan","year":"1998","unstructured":"Jan, J. K., & Chen, Y. Y. (1998). 'Paramita wisdom\u2019 password authentication scheme without verification tables. Journal of Systems and Software, 42, 45\u201357.","journal-title":"Journal of Systems and Software"},{"key":"7462_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"MS Hwang","year":"2000","unstructured":"Hwang, M. S., & Li, L. H. (2000). New remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46, 28\u201330.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"7462_CR6","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1109\/TCE.2004.1309430","volume":"50","author":"AK Awashti","year":"2004","unstructured":"Awashti, A. K., & Lal, S. (2004). An enhanced remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 50(2), 583\u2013586.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"7462_CR7","first-page":"1498","volume":"2","author":"LH Li","year":"2001","unstructured":"Li, L. H., Lin, L. C., & Hwang, M. S. (2001). A remote password authentication scheme for multi-server architecture using neural networks. IEEE Transactions on Neural Networks, 2, 1498\u20131504.","journal-title":"IEEE Transactions on Neural Networks"},{"key":"7462_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","volume":"19","author":"IC Lin","year":"2003","unstructured":"Lin, I. C., Hwang, M. S., & Li, L. H. (2003). A new remote user authentication scheme for multi-server architecture. Future Generation Computer Systems, 19, 13\u201322.","journal-title":"Future Generation Computer Systems"},{"key":"7462_CR9","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"WS Juang","year":"2004","unstructured":"Juang, W. S. (2004). Efficient multi-server password-authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics, 50, 251\u2013255.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"7462_CR10","first-page":"550","volume":"29","author":"J Chao","year":"2012","unstructured":"Chao, J. (2012). An Improved remote password authentication scheme with a smart card. Journal of Electronics, 29, 550\u2013555.","journal-title":"Journal of Electronics"},{"key":"7462_CR11","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1109\/TCE.2004.1309425","volume":"50","author":"EJ Yoon","year":"2004","unstructured":"Yoon, E. J., Ryu, E. K., & Yoo, K. Y. (2004). Efficient remote user authentication scheme based on generalized ElGamal signature scheme. IEEE Transactions on Consumer Electronics, 50, 568\u2013570.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"7462_CR12","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M Das","year":"2014","unstructured":"Das, M., Saxena, A., & Gulati, V. (2014). A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics, 50, 629\u2013631.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"7462_CR13","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"YP Liao","year":"2009","unstructured":"Liao, Y. P., & Wang, S. S. (2009). A secure dynamic ID-based remote user authentication scheme for a multi-server environment. Computer Standards & Interfaces, 31, 24\u201329.","journal-title":"Computer Standards & Interfaces"},{"key":"7462_CR14","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","volume":"31","author":"HC Hsiang","year":"2009","unstructured":"Hsiang, H. C., & Shih, W. K. (2009). Improvement of the secure dynamic ID-based remote user authentication scheme for a multi-server environment. Computer Standards & Interfaces, 31, 1118\u20131123.","journal-title":"Computer Standards & Interfaces"},{"key":"7462_CR15","first-page":"13863","volume":"38","author":"CC Lee","year":"2011","unstructured":"Lee, C. C., Lin, T. H., & Chang, R. X. (2011). A secure dynamic ID based remote user authentication scheme for multi-serverenvironment using smart cards. Expert Systems with Applications, 38, 13863\u201313870.","journal-title":"Expert Systems with Applications"},{"key":"7462_CR16","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.jnca.2010.11.011","volume":"34","author":"SK Sood","year":"2011","unstructured":"Sood, S. K., Sarje, A. K., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34, 609\u2013618.","journal-title":"Journal of Network and Computer Applications"},{"key":"7462_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","volume":"58","author":"XJ Li","year":"2013","unstructured":"Li, X. J., et al. (2013). A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Mathematical and Computer Modelling, 58, 85\u201395.","journal-title":"Mathematical and Computer Modelling"},{"key":"7462_CR18","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/CJECE.2014.2344447","volume":"38","author":"S Saraswathi","year":"2015","unstructured":"Saraswathi, S., Renukadevi, S., & Yogesh, P. (2015). Secure and efficient smart-card-based remote user authentication scheme for multi-server environment. IEEE Canadian Journal of Electrical and Computer Engineering, 38, 20\u201330.","journal-title":"IEEE Canadian Journal of Electrical and Computer Engineering"},{"key":"7462_CR19","first-page":"708","volume":"29","author":"SK Islam","year":"2016","unstructured":"Islam, S. K. (2016). Design and analysis of an improved smartcard based remote user password authentication scheme. International Journal of Communication Systems, 29, 708\u20131719.","journal-title":"International Journal of Communication Systems"},{"key":"7462_CR20","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s11277-017-3956-2","volume":"95","author":"J Srinivas","year":"2017","unstructured":"Srinivas, J., Sourav, M., & Ashok Kumar, D. (2017). A multi-server environment with secure and efficient remote user authentication scheme based on dynamic ID using smart cards. Wireless Personal Communications, 95, 2735\u20132767.","journal-title":"Wireless Personal Communications"},{"key":"7462_CR21","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1007\/s11277-018-5764-8","volume":"101","author":"SS Sahoo","year":"2018","unstructured":"Sahoo, S. S., Mohanty, S., & Majhi, B. (2018). An improved and secure two-factor dynamic ID based authenticated key agreement scheme for multi-server environment. Wireless Personal Communications, 101, 1307\u20131333.","journal-title":"Wireless Personal Communications"},{"issue":"8","key":"7462_CR22","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.cose.2005.03.006","volume":"24","author":"C Fan","year":"2005","unstructured":"Fan, C., Chan, Y., & Zhang, Z. (2005). Robust remote authentication scheme with smart cards. Computers & Security, 24(8), 619\u2013628.","journal-title":"Computers & Security"},{"issue":"7","key":"7462_CR23","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1016\/j.jcss.2008.04.002","volume":"74","author":"GM Yang","year":"2008","unstructured":"Yang, G. M., Wong, D. S., Wang, H. X., & Deng, X. T. (2008). Twofactor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences, 74(7), 1160\u20131172.","journal-title":"Journal of Computer and System Sciences"},{"issue":"4","key":"7462_CR24","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu, J., Zhu, W., & Feng, D. (2009). An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces, 31(4), 723\u2013728.","journal-title":"Computer Standards & Interfaces"},{"key":"7462_CR25","doi-asserted-by":"crossref","unstructured":"Shirvanian, M., Jarecki, S., Saxena, N., & Nathan, N. (2014). Two-factor authentication resilient to server compromise using mix-bandwidth devices. In Proceedings of the NDSS 2014 (pp. 1\u201316). The Internet Society.","DOI":"10.14722\/ndss.2014.23167"},{"issue":"2","key":"7462_CR26","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1002\/sec.315","volume":"5","author":"SH Wu","year":"2012","unstructured":"Wu, S. H., Zhu, Y. F., & Pu, Q. (2012). Robust smart-cards-based user authentication scheme with user anonymity. Security and Communication Networks, 5(2), 236\u2013248.","journal-title":"Security and Communication Networks"},{"key":"7462_CR27","doi-asserted-by":"crossref","unstructured":"Wang, D., Ma, C. G., & Wu, P. (2012). Secure password-based remote user authentication scheme with non-tamper resistant smart cards. In Proceedings of the DBSec 2012, ser. LNCS (pp. 114\u2013121). Springer.","DOI":"10.1007\/978-3-642-31540-4_9"},{"issue":"4","key":"7462_CR28","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TII.2012.2230639","volume":"9","author":"J-L Tsai","year":"2013","unstructured":"Tsai, J.-L., Lo, N.-W., & Wu, T.-C. (2013). Novel anonymous authentication scheme using smart cards. IEEE Transactions on Industrial Informatics, 9(4), 2004\u20132013.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"5","key":"7462_CR29","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X., Niu, J., Khan, M. K., & Liao, J. (2013). An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications, 36(5), 1365\u20131371.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"7462_CR30","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1016\/j.jnca.2012.01.007","volume":"35","author":"R Madhusudhan","year":"2012","unstructured":"Madhusudhan, R., & Mittal, R. (2012). Dynamic id-based remote user password authentication schemes using smart cards: A review. Journal of Network and Computer Applications, 35(4), 1235\u20131248.","journal-title":"Journal of Network and Computer Applications"},{"issue":"12","key":"7462_CR31","doi-asserted-by":"publisher","first-page":"3939","DOI":"10.1002\/dac.2590","volume":"27","author":"S Kumari","year":"2014","unstructured":"Kumari, S., & Khan, M. K. (2014). Cryptanalysis and improvement of \u2018a robust smart-card-based remote user password authentication scheme\u2019. International Journal of Communication Systems, 27(12), 3939\u20133955.","journal-title":"International Journal of Communication Systems"},{"issue":"17","key":"7462_CR32","doi-asserted-by":"publisher","first-page":"3028","DOI":"10.1002\/sec.1229","volume":"8","author":"JW Byun","year":"2015","unstructured":"Byun, J. W. (2015). Privacy preserving smartcard-based authentication system with provable security. Security and Communication Networks, 8(17), 3028\u20133044.","journal-title":"Security and Communication Networks"},{"issue":"2","key":"7462_CR33","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1002\/dac.2644","volume":"28","author":"Q Jiang","year":"2015","unstructured":"Jiang, Q., Ma, J., Li, G., & Li, X. (2015). Improvement of robust smart-cardbased password authentication scheme. International Journal of Communication Systems, 28(2), 383\u2013393.","journal-title":"International Journal of Communication Systems"},{"key":"7462_CR34","first-page":"479","volume":"2015","author":"T-T Truong","year":"2015","unstructured":"Truong, T.-T., Tran, M.-T., Duong, A.-D., & Echizen, I. (2015). Chaotic Chebyshev polynomials based remote user authentication scheme in client\u2013server environment. Proceedings of the SEC, 2015, 479\u2013494.","journal-title":"Proceedings of the SEC"},{"issue":"18","key":"7462_CR35","first-page":"1","volume":"2018","author":"X Guosheng","year":"2018","unstructured":"Guosheng, X., Shuming, Q., Haseeb, A., Guoai, X., Yanhui, G., Miao, Z., et al. (2018). A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors, 2018(18), 1\u201319.","journal-title":"Sensors"},{"key":"7462_CR36","first-page":"1","volume":"2018","author":"W Chenyu","year":"2018","unstructured":"Chenyu, W., Guoai, X., & Wenting, L. (2018). A secure and anonymous two-factor authentication protocol in multi-server environment. Security and Communication Networks, 2018, 1\u201315.","journal-title":"Security and Communication Networks"},{"issue":"84","key":"7462_CR37","first-page":"2351","volume":"2015","author":"L Hao","year":"2015","unstructured":"Hao, L., Fengtong, W., & Chunxia, D. (2015). An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Wireless Personal Communications, 2015(84), 2351\u20132362.","journal-title":"Wireless Personal Communications"},{"key":"7462_CR38","doi-asserted-by":"publisher","first-page":"38578","DOI":"10.1109\/ACCESS.2018.2854798","volume":"6","author":"B Subhas","year":"2018","unstructured":"Subhas, B., Ashok Kumar, D., Debasis, S., Samiran, C., Joel, J. P. C. R., & Youngho, P. (2018). Provably secure multi-server authentication protocol using fuzzy commitment. IEEE Access, 6, 38578\u201338594.","journal-title":"IEEE Access"},{"key":"7462_CR39","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, R., & Needham, A. (1990). Logic of authentication. ACM Transactions on Computer Systems, 8, 18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"key":"7462_CR40","unstructured":"Security Protocol Animator for AVISPA. Retrieved September, 2017, from http:\/\/www.irisa.fr\/celtique\/genet\/span\/."},{"key":"7462_CR41","unstructured":"AVISPA. Automated validation of internet security protocols and applications. Retrieved 2006, from http:\/\/www.avispa-project.org\/."},{"key":"7462_CR42","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Proceedings of 19th annual international cryptology conference CRYPTO\u201999 (pp. 388\u2013397).","DOI":"10.1007\/3-540-48405-1_25"},{"key":"7462_CR43","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messergers","year":"2002","unstructured":"Messergers, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51, 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"key":"7462_CR44","doi-asserted-by":"crossref","unstructured":"Bonneau, J. (2012). The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In Proceedings of the IEEE S&P (pp. 538\u2013552).","DOI":"10.1109\/SP.2012.49"},{"key":"7462_CR45","doi-asserted-by":"crossref","unstructured":"Ma, J., Yang, W., Luo, M., & Li, N. (2014). A study of probabilistic password models. In Proceedings of the IEEE S&P 2014 (pp. 538\u2013552). IEEE.","DOI":"10.1109\/SP.2014.50"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07462-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07462-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07462-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T23:55:49Z","timestamp":1621986949000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07462-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,26]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7462"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07462-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,26]]},"assertion":[{"value":"26 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}