{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T02:55:40Z","timestamp":1720580140823},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11277-021-08501-4","type":"journal-article","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T16:31:08Z","timestamp":1619454668000},"page":"1003-1026","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Biometric based Remote User Authentication Technique Using Smart Card in Multi-Server Environment"],"prefix":"10.1007","volume":"120","author":[{"given":"Shyamalendu","family":"Kandar","sequence":"first","affiliation":[]},{"given":"Sumit","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Bibhas Chandra","family":"Dhara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"issue":"11","key":"8501_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L. (1981). Password authentication with insecure communication. Commun. ACM, 24(11), 770\u2013772.","journal-title":"Commun. ACM"},{"key":"8501_CR2","first-page":"47","volume-title":"Workshop on the Theory and Application of Cryptographic Techniques","author":"A Shamir","year":"1984","unstructured":"Shamir, A., et al. (1984). Identity-based cryptosystems and signature schemes. Workshop on the Theory and Application of Cryptographic Techniques (pp. 47\u201353). Berlin: Springer."},{"issue":"4","key":"8501_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory, 31(4), 469\u2013472.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"8501_CR4","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1049\/ip-e.1991.0022","volume":"138","author":"C-C Chang","year":"1991","unstructured":"Chang, C.-C., & Wu, T.-C. (1991). Remote password authentication with smart cards. IEE Proc. E (Comut. Digit. Tech.), 138(3), 165\u2013168.","journal-title":"IEE Proc. E (Comut. Digit. Tech.)"},{"issue":"1","key":"8501_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M-S Hwang","year":"2000","unstructured":"Hwang, M.-S., & Li, L.-H. (2000). A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron., 46(1), 28\u201330.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"6","key":"8501_CR6","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"L-H Li","year":"2001","unstructured":"Li, L.-H., Lin, L.-C., & Hwang, M.-S. (2001). A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural Netw., 12(6), 1498\u20131504.","journal-title":"IEEE Trans. Neural Netw."},{"issue":"1","key":"8501_CR7","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","volume":"19","author":"I-C Lin","year":"2003","unstructured":"Lin, I.-C., Hwang, M.-S., & Li, L.-H. (2003). A new remote user authentication scheme for multi-server architecture. Future Gener. Comput. Syst., 19(1), 13\u201322.","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"8501_CR8","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"ML Das","year":"2004","unstructured":"Das, M. L., Saxena, A., & Gulati, V. P. (2004). A dynamic id-based remote user authentication scheme. IEEE Trans. Consum. Electron., 50(2), 629\u2013631.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"8501_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"C-H Lin","year":"2004","unstructured":"Lin, C.-H., & Lai, Y.-Y. (2004). A flexible biometrics remote user authentication scheme. Comput. Standards Interfaces, 27(1), 19\u201323.","journal-title":"Comput. Standards Interfaces"},{"issue":"7","key":"8501_CR10","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.1016\/j.patcog.2005.10.025","volume":"39","author":"A Kong","year":"2006","unstructured":"Kong, A., Cheung, K.-H., Zhang, D., Kamel, M., & You, J. (2006). An analysis of biohashing and its variants. Pattern Recogn., 39(7), 1359\u20131368.","journal-title":"Pattern Recogn."},{"key":"8501_CR11","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2008","unstructured":"Mangard, S., Oswald, E., & Popp, T. (2008). Power Analysis Attacks: Revealing the Secrets of Smart Cards. Dodrecht: Springer."},{"issue":"4","key":"8501_CR12","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"Feng-xia Xiao","year":"2009","unstructured":"Xiao, Feng-xia, & Dan, Jing. (2009). A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun., 32(4), 583\u2013585.","journal-title":"Comput. Commun."},{"issue":"1","key":"8501_CR13","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"Y-P Liao","year":"2009","unstructured":"Liao, Y.-P., & Wang, S.-S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Standards Interfaces, 31(1), 24\u201329.","journal-title":"Comput. Standards Interfaces"},{"issue":"6","key":"8501_CR14","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","volume":"31","author":"H-C Hsiang","year":"2009","unstructured":"Hsiang, H.-C., & Shih, W.-K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Standards Interfaces, 31(6), 1118\u20131123.","journal-title":"Comput. Standards Interfaces"},{"issue":"11","key":"8501_CR15","first-page":"13863","volume":"38","author":"C-C Lee","year":"2011","unstructured":"Lee, C.-C., Lin, T.-H., & Chang, R.-X. (2011). A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Syst. Appl., 38(11), 13863\u201313870.","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"8501_CR16","doi-asserted-by":"publisher","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"H Debiao","year":"2012","unstructured":"Debiao, H., Jianhua, C., & Rui, Z. (2012). A more secure authenticatio, n scheme for telecare medicine information systems. J. Med. Syst., 36(3), 1989\u20131995.","journal-title":"J. Med. Syst."},{"issue":"1\u20132","key":"8501_CR17","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s11071-012-0652-3","volume":"71","author":"C-C Lee","year":"2013","unstructured":"Lee, C.-C., & Hsu, C.-W. (2013). A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn., 71(1\u20132), 201\u2013211.","journal-title":"Nonlinear Dyn."},{"issue":"1\u20132","key":"8501_CR18","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","volume":"58","author":"X Li","year":"2013","unstructured":"Li, X., Ma, J., Wang, W., Xiong, Y., & Zhang, J. (2013). A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math. Comput. Modell., 58(1\u20132), 85\u201395.","journal-title":"Math. Comput. Modell."},{"issue":"4","key":"8501_CR19","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1016\/j.eswa.2013.08.040","volume":"41","author":"M-C Chuang","year":"2014","unstructured":"Chuang, M.-C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst. Appl., 41(4), 1411\u20131418.","journal-title":"Expert Syst. Appl."},{"issue":"18","key":"8501_CR20","doi-asserted-by":"publisher","first-page":"8129","DOI":"10.1016\/j.eswa.2014.07.004","volume":"41","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Kumar, A., & Mukhopadhyay, S. (2014). A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst. Appl., 41(18), 8129\u20138143.","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"8501_CR21","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2014","unstructured":"He, D., & Wang, D. (2014). Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J., 9(3), 816\u2013823.","journal-title":"IEEE Syst. J."},{"issue":"3","key":"8501_CR22","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J., 9(3), 816\u2013823.","journal-title":"IEEE Syst. J."},{"issue":"9","key":"8501_CR23","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., & Das, A. K. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forens. Secur., 10(9), 1953\u20131966.","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"17","key":"8501_CR24","doi-asserted-by":"publisher","first-page":"3219","DOI":"10.1002\/sec.1246","volume":"8","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Peng, H., & Yang, Y. (2015). A biometrics and smart cards-based authentication scheme for multi-server environments. Secur. Commun. Netw., 8(17), 3219\u20133228.","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"8501_CR25","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/JSYST.2015.2471095","volume":"12","author":"T-F Lee","year":"2015","unstructured":"Lee, T.-F. (2015). Provably secure anonymous single-sign-on authentication mechanisms using extended Chebyshev chaotic maps for distributed computer networks. IEEE Syst. J., 12(2), 1499\u20131505.","journal-title":"IEEE Syst. J."},{"issue":"3","key":"8501_CR26","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s10916-015-0218-2","volume":"39","author":"AK Das","year":"2015","unstructured":"Das, A. K. (2015). A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems. J. Med. Syt., 39(3), 30.","journal-title":"J. Med. Syt."},{"issue":"1","key":"8501_CR27","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2015","unstructured":"Giri, D., Tanmoy, M., Ruhul, A., & Srivastava, P. D. (2015). An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst., 39(1), 145.","journal-title":"J. Med. Syst."},{"key":"8501_CR28","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.cose.2015.06.001","volume":"53","author":"H Saevanee","year":"2015","unstructured":"Saevanee, H., Clarke, N., Furnell, S., & Biscione, V. (2015). Continuous user authentication using multi-modal biometrics. Comput. Secur., 53, 234\u2013246.","journal-title":"Comput. Secur."},{"issue":"2","key":"8501_CR29","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s11277-016-3293-x","volume":"89","author":"X Li","year":"2016","unstructured":"Li, X., Niu, J., Kumari, S., Islam, S. K. H., Wu, F., Khan, M. K., & Das, A. K. (2016). A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security. Wirel. Pers. Commun., 89(2), 569\u2013597.","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"8501_CR30","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/s10916-015-0422-0","volume":"40","author":"J Moon","year":"2016","unstructured":"Moon, J., Choi, Y., Kim, J., & Won, D. (2016). An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J. Med. Syst., 40(3), 70.","journal-title":"J. Med. Syst."},{"key":"8501_CR31","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.procs.2016.05.187","volume":"85","author":"D Jagadiswary","year":"2016","unstructured":"Jagadiswary, D., & Saraswady, D. (2016). Biometric authentication using fused multimodal biometric. Procedia Comput. Sci., 85, 109\u2013116.","journal-title":"Procedia Comput. Sci."},{"issue":"3","key":"8501_CR32","doi-asserted-by":"publisher","first-page":"2785","DOI":"10.1007\/s11277-017-3961-5","volume":"95","author":"T-T Truong","year":"2017","unstructured":"Truong, T.-T., Tran, M.-T., Duong, A.-D., & Echizen, I. (2017). Provable identity based user authentication scheme on ECC in multi-server environment. Wirel. Pers. Commun., 95(3), 2785\u20132801.","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"8501_CR33","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1007\/s13369-016-2341-x","volume":"42","author":"P Chandrakar","year":"2017","unstructured":"Chandrakar, P., & Om, H. (2017). Cryptanalysis and extended three-factor remote user authentication scheme in multi-server environment. Arabian J. Sci. Eng., 42(2), 765\u2013786.","journal-title":"Arabian J. Sci. Eng."},{"issue":"17","key":"8501_CR34","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3351","volume":"30","author":"A Irshad","year":"2017","unstructured":"Irshad, A., Chaudhry, S. A., Kumari, S., Usman, M., Mahmood, K., & Faisal, M. S. (2017). An improved lightweight multiserver authentication scheme. International Journal of Communication Systems, 30(17).","journal-title":"International Journal of Communication Systems"},{"issue":"4","key":"8501_CR35","doi-asserted-by":"publisher","first-page":"5355","DOI":"10.1007\/s11277-016-3745-3","volume":"96","author":"SA Chaudhry","year":"2017","unstructured":"Chaudhry, S. A., Naqvi, H., Mahmood, K., Ahmad, H. F., & Khan, M. K. (2017). An improved remote user authentication scheme using elliptic curve cryptography. Wirel. Pers. Commun., 96(4), 5355\u20135373.","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"8501_CR36","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3390\/computers7010009","volume":"7","author":"C-L Chen","year":"2018","unstructured":"Chen, C.-L., Deng, Y.-Y., Tang, Y.-W., Chen, J.-H., & Lin, Y.-F. (2018). An Improvement on Remote User Authentication Schemes Using Smart Cards. Computers, 7(1), 9.","journal-title":"Computers"},{"issue":"1","key":"8501_CR37","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s11277-017-5055-9","volume":"99","author":"M Shingala","year":"2018","unstructured":"Shingala, M., Patel, C., & Doshi, N. (2018). An improve three factor remote user authentication scheme using smart card. Wirel. Pers. Commun., 99(1), 227\u2013251.","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"8501_CR38","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.3233\/JIFS-169435","volume":"34","author":"S Roy","year":"2018","unstructured":"Roy, S., Chatterjee, S., & Mahapatra, G. (2018). An efficient biometric based remote user authentication scheme for secure internet of things environment. J. Intell. Fuzzy Syst., 34(3), 1403\u20131410.","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"2","key":"8501_CR39","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s13369-017-2709-6","volume":"43","author":"P Chandrakar","year":"2018","unstructured":"Chandrakar, P., & Om, H. (2018). An efficient two-factor remote user authentication and session key agreement scheme using rabin cryptosystem. Arabian J. Sci. Eng., 43(2), 661\u2013673.","journal-title":"Arabian J. Sci. Eng."},{"key":"8501_CR40","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1016\/j.future.2017.04.012","volume":"83","author":"X Li","year":"2018","unstructured":"Li, X., Niu, J., Kumari, S., Wu, F., & Choo. , K. K. K. R. (2018). A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Future Gener. Comput. Syst., 83, 607\u2013618.","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"8501_CR41","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1007\/s12652-017-0516-2","volume":"9","author":"Q Jiang","year":"2018","unstructured":"Jiang, Q., Chen, Z., Li, B., Shen, J., Yang, L., & Ma, J. (2018). Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J. Ambient Intell. Human. Comput., 9(4), 1061\u20131073.","journal-title":"J. Ambient Intell. Human. Comput."},{"issue":"8","key":"8501_CR42","doi-asserted-by":"publisher","first-page":"3504","DOI":"10.1007\/s11227-015-1601-y","volume":"74","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry, S. A., Naqvi, H., Farash, M. S., Shon, T., & Sher, M. (2018). An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J. Supercomput., 74(8), 3504\u20133520.","journal-title":"J. Supercomput."},{"key":"8501_CR43","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9178941","author":"Y Zhao","year":"2018","unstructured":"Zhao, Y., Li, S., & Jiang, L. (2018). Secure and efficient user authentication scheme based on password and smart card for multiserver environment. Secur. Commun. Netw.https:\/\/doi.org\/10.1155\/2018\/9178941.","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"8501_CR44","doi-asserted-by":"publisher","first-page":"2359","DOI":"10.1007\/s11042-017-4390-x","volume":"77","author":"S Kumari","year":"2018","unstructured":"Kumari, S., Das, A. K., Li, X., Wu, F., Khan, M. K., et al. (2018). A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multimed. Tools Appl., 77(2), 2359\u20132389.","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"8501_CR45","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1007\/s11042-016-4236-y","volume":"77","author":"A Irshad","year":"2018","unstructured":"Irshad, A., Sher, M., Chaudhry, S. A., Xie, Q., Kumari, S., & Fan, W. (2018). An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multimed. Tools Appl., 77(1), 1167\u20131204.","journal-title":"Multimed. Tools Appl."},{"key":"8501_CR46","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jnca.2017.07.001","volume":"103","author":"X Li","year":"2018","unstructured":"Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A. K., & Choo, K. K. K. R. (2018). A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl., 103, 194\u2013204.","journal-title":"J. Netw. Comput. Appl."},{"key":"8501_CR47","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.future.2017.05.002","volume":"81","author":"K Mahmood","year":"2018","unstructured":"Mahmood, K., Chaudhry, S. A., Naqvi, H., Kumari, S., Li, X., & Sangaiah, A. K. (2018). An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst., 81, 557\u2013565.","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"8501_CR48","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/s12652-017-0460-1","volume":"9","author":"S Kumari","year":"2018","unstructured":"Kumari, S., Karuppiah, M., Das, A. K., Li, X., Wu, F., & Gupta, V. (2018). Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J. Ambient Intell. Human. Comput., 9(3), 643\u2013653.","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"8501_CR49","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.future.2017.08.029","volume":"84","author":"X Li","year":"2018","unstructured":"Li, X., Wu, F., Khan, M. K., Xu, L., Shen, J., & Jo, M. (2018). A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener. Comput. Syst., 84, 149\u2013159.","journal-title":"Future Gener. Comput. Syst."},{"issue":"12","key":"8501_CR50","doi-asserted-by":"publisher","first-page":"16345","DOI":"10.1007\/s11042-018-7012-3","volume":"78","author":"A Abozaid","year":"2018","unstructured":"Abozaid, A., Haggag, A., Kasban, H., & Eltokhy, M. (2018). Multimodal biometric scheme for human authentication technique based on voice and face recognition fusion. Multimed. Tools Appl., 78(12), 16345\u201316361.","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"8501_CR51","doi-asserted-by":"publisher","first-page":"1046","DOI":"10.1007\/s11036-018-1061-8","volume":"24","author":"M Karuppiah","year":"2019","unstructured":"Karuppiah, M., Das, A. K., Li, X., Wu, F., Chaudhry, S. A., Niranchana, R., & Kumari, S. (2019). Secure remote user mutual authentication scheme with key agreement for cloud environment. Mob. Netw. Appl., 24(3), 1046\u20131062.","journal-title":"Mob. Netw. Appl."},{"key":"8501_CR52","first-page":"1","volume":"12","author":"M Adeli","year":"2020","unstructured":"Adeli, M., Bagheri, N., & Meimani, H. R. (2020). On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments. J. Ambient Intell. Human. Comput., 12, 1\u201315.","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"8501_CR53","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-981-13-7403-6_44","volume-title":"Emerging Technology in Modelling and Graphics","author":"S Sengupta","year":"2020","unstructured":"Sengupta, S. (2020). A secured biometric-based authentication scheme in IoT-based patient monitoring system. Emerging Technology in Modelling and Graphics (pp. 501\u2013518). Singapore: Springer."},{"key":"8501_CR54","first-page":"223","volume":"814","author":"Y Tian","year":"2020","unstructured":"Tian, Y., Li, Y., Sengupta, B., Li, N., & Su, C. (2020). Leakage-resilient biometric-based remote user authentication with fuzzy extractors. Theoretical Computer ScienceTheoretical Computer ScienceTheoretical Computer ScienceTheor. Comput. Sci., 814, 223\u2013233.","journal-title":"Theoretical Computer ScienceTheoretical Computer ScienceTheoretical Computer ScienceTheor. Comput. Sci."},{"key":"8501_CR55","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.patrec.2020.08.017","volume":"138","author":"B Bera","year":"2020","unstructured":"Bera, B., Das, A. K., Balzano, W., & Medaglia, , C. M. (2020). Carlo Maria On the design of biometric-based user authentication protocol in smart city environment. Pattern Recogn. Lett., 138, 439\u2013446.","journal-title":"Pattern Recogn. Lett."},{"key":"8501_CR56","first-page":"1","volume":"2021","author":"T-Y Wu","year":"2021","unstructured":"Wu, T.-Y., Yang, L., Lee, Z., Chen, C.-M., Pan, J.-S., & Islam, , S. K. (2021). SK Improved ECC-based three-factor multiserver authentication scheme. Secur. Commun. Netw., 2021, 1\u201314.","journal-title":"Secur. Commun. Netw."},{"key":"8501_CR57","doi-asserted-by":"crossref","unstructured":"Kumar, A., & Om, H. (2021). Analysis and Enhancement of Biometric-Based Multi-Server Authentication Scheme Using Chebyshev Chaotic Map. In: Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, (pp. 921\u2013929). Singapore, Springer","DOI":"10.1007\/978-981-15-5546-6_76"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08501-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08501-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08501-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,30]],"date-time":"2021-08-30T12:11:52Z","timestamp":1630325512000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08501-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":57,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["8501"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08501-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"13 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}