{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T18:30:52Z","timestamp":1763058652723,"version":"3.37.3"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,16]],"date-time":"2022-01-16T00:00:00Z","timestamp":1642291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,16]],"date-time":"2022-01-16T00:00:00Z","timestamp":1642291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11277-021-09382-3","type":"journal-article","created":{"date-parts":[[2022,1,16]],"date-time":"2022-01-16T00:03:25Z","timestamp":1642291405000},"page":"763-781","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Novel Three-Factor Authentication Scheme with High Security for Multi-Server Environments"],"prefix":"10.1007","volume":"124","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7005-5416","authenticated-orcid":false,"given":"Rui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yongcong","family":"Mou","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,16]]},"reference":[{"issue":"24","key":"9382_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L. (1981). Password authentication with insecure communication. Communications of the Acm, 24(24), 770\u2013772.","journal-title":"Communications of the Acm"},{"issue":"3","key":"9382_CR2","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.1007\/s11277-012-0918-6","volume":"71","author":"JL Tsai","year":"2013","unstructured":"Tsai, J. L., & Lo, N. W. (2013). A new password-based multi-server authentication scheme robust to password guessing attacks. Wireless Personal Communications, 71(3), 1977\u20131988.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"9382_CR3","doi-asserted-by":"publisher","first-page":"105","DOI":"10.3390\/sym7010105","volume":"7","author":"J Nam","year":"2015","unstructured":"Nam, J., Choo, K. K., Han, S., Paik, J., & Won, D. (2015). Two-round password-only authenticated key exchange in the three-party setting. Symmetry, 7(1), 105\u2013124.","journal-title":"Symmetry"},{"issue":"3","key":"9382_CR4","first-page":"165","volume":"138","author":"CC Chang","year":"1991","unstructured":"Chang, C. C., & Wu, T. C. (1991). Remote password authentication with smart cards. IEE Proceedings-E, 138(3), 165\u2013168.","journal-title":"IEE Proceedings-E"},{"issue":"2","key":"9382_CR5","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s11277-016-3293-x","volume":"89","author":"L Xiong","year":"2016","unstructured":"Xiong, L., Niu, J., Kumari, S., Islam, S. H., Fan, W., Khan, M. K., & Das, A. K. (2016). A novel chaotic maps-based user authentication and key agreement protocol for multi-server environment with provable security. Wireless Personal Communications, 89(2), 569\u2013597.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"9382_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-017-3956-2","volume":"95","author":"S Jangirala","year":"2017","unstructured":"Jangirala, S., Mukhopadhyay, S., & Das, A. K. (2017). A multi-server environment with secure and efficient remote user authentication scheme based on dynamic id using smart cards. Wireless Personal Communications, 95(3), 1\u201333.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"9382_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-015-2975-0","volume":"86","author":"D Mishra","year":"2016","unstructured":"Mishra, D. (2016). Design and analysis of a provably secure multi-server authentication scheme. Wireless Personal Communications, 86(3), 1\u201325.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"9382_CR8","first-page":"1","volume":"99","author":"D Mishra","year":"2017","unstructured":"Mishra, D., & Dhal, S. (2017). Privacy preserving password-based multi-server authenticated key agreement protocol using smart card. Wireless Personal Communications, 99(3), 1\u201321.","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"9382_CR9","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang, Q., Ma, J., Lu, X., & Tian, Y. (2015). An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications, 8(6), 1070\u20131081.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"4","key":"9382_CR10","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang, D., He, D., Wang, P., & Chu, C. H. (2015). Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. Dependable & Secure Computing IEEE Transactions on, 12(4), 428\u2013442.","journal-title":"Dependable & Secure Computing IEEE Transactions on"},{"issue":"17","key":"9382_CR11","doi-asserted-by":"publisher","first-page":"4615","DOI":"10.1002\/sec.1653","volume":"9","author":"T Maitra","year":"2016","unstructured":"Maitra, T., Islam, S. H., Amin, R., Giri, D., Khan, M. K., & Kumar, N. (2016). An enhanced multi-server authentication protocol using password and smart-card: Cryptanalysis and design. Security & Communication Networks, 9(17), 4615\u20134638.","journal-title":"Security & Communication Networks"},{"issue":"11","key":"9382_CR12","first-page":"e3242.1","volume":"30","author":"T Maitra","year":"2016","unstructured":"Maitra, T., Obaidat, M. S., Amin, R., Islam, S. H., Chaudhry, S. A., & Giri, D. (2016). A robust elgamal-based password-authentication protocol using smart card for client-server communication. International Journal of Communication Systems, 30(11), e3242.1-e3242.12.","journal-title":"International Journal of Communication Systems"},{"issue":"11","key":"9382_CR13","doi-asserted-by":"publisher","first-page":"e3336","DOI":"10.1002\/dac.3336","volume":"30","author":"C Wang","year":"2017","unstructured":"Wang, C., Ding, W., Xu, G., & Guo, Y. (2017). A lightweight password-based authentication protocol using smart card. International Journal of Communication Systems, 30(11), e3336.","journal-title":"International Journal of Communication Systems"},{"issue":"6","key":"9382_CR14","first-page":"870","volume":"19","author":"M Azrour","year":"2017","unstructured":"Azrour, M., Farhaoui, Y., & Ouanan, M. (2017). A new secure authentication and key exchange protocol for session initiation protocol using smart card. International Journal of Network Security, 19(6), 870\u2013879.","journal-title":"International Journal of Network Security"},{"issue":"5","key":"9382_CR15","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"9382_CR16","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver environment. IEEE Systems Journal, 9(3), 816\u2013823.","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"9382_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C. T., & Hwang, M. S. (2010). An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network & Computer Applications, 33(1), 1\u20135.","journal-title":"Journal of Network & Computer Applications"},{"issue":"3","key":"9382_CR18","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A. K. (2011). Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. Iet Information Security, 5(3), 145\u2013151.","journal-title":"Iet Information Security"},{"issue":"8","key":"9382_CR19","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang, X., Yang, X., Chonka, A., Zhou, J., & Deng, R. H. (2011). A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Transactions on Parallel & Distributed Systems, 22(8), 1390\u20131397.","journal-title":"IEEE Transactions on Parallel & Distributed Systems"},{"issue":"C","key":"9382_CR20","first-page":"274","volume":"45","author":"W Fan","year":"2015","unstructured":"Fan, W., Xu, L., Kumari, S., & Xiong, L. (2015). A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Computers & Electrical Engineering, 45(C), 274\u2013285.","journal-title":"Computers & Electrical Engineering"},{"issue":"10","key":"9382_CR21","doi-asserted-by":"publisher","first-page":"3826","DOI":"10.1007\/s11227-015-1610-x","volume":"72","author":"J Qi","year":"2016","unstructured":"Qi, J., Khan, M. K., Xiang, L., Ma, J., & He, D. (2016). A privacy preserving three-factor authentication protocol for e-health clouds. Journal of Supercomputing, 72(10), 3826\u20133849.","journal-title":"Journal of Supercomputing"},{"issue":"5","key":"9382_CR22","first-page":"997","volume":"18","author":"MC Chuang","year":"2014","unstructured":"Chuang, M. C., & Chen, M. C. (2014). An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. International Journal of Network Security, 18(5), 997\u20131000.","journal-title":"International Journal of Network Security"},{"issue":"1","key":"9382_CR23","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s12083-014-0321-z","volume":"9","author":"D Mishra","year":"2016","unstructured":"Mishra, D., Das, A. K., & Mukhopadhyay, S. (2016). A secure and efficient ecc-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Networking & Applications, 9(1), 171\u2013192.","journal-title":"Peer-to-Peer Networking & Applications"},{"issue":"3","key":"9382_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0422-0","volume":"40","author":"J Moon","year":"2016","unstructured":"Moon, J., Choi, Y., Kim, J., & Won, D. (2016). An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. Journal of Medical Systems, 40(3), 1\u201311.","journal-title":"Journal of Medical Systems"},{"key":"9382_CR25","doi-asserted-by":"crossref","unstructured":"S.\u00a0Ibjaoun, A.\u00a0A.\u00a0E. Kalam, V.\u00a0Poirriez, A.\u00a0A. Ouahman, & M.\u00a0D. Montfort, (2017). Analysis and enhancements of an efficient biometric-based remote user authentication scheme using smart cards, in 2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications, 1\u20138.","DOI":"10.1109\/AICCSA.2016.7945790"},{"issue":"1","key":"9382_CR26","doi-asserted-by":"publisher","first-page":"e2946.1","DOI":"10.1002\/dac.2946","volume":"30","author":"D Mishra","year":"2017","unstructured":"Mishra, D., Kumari, S., Khan, M. K., & Mukhopadhyay, S. (2017). An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. International Journal of Communication Systems, 30(1), e2946.1-e2946.14.","journal-title":"International Journal of Communication Systems"},{"issue":"8","key":"9382_CR27","doi-asserted-by":"publisher","first-page":"155014771772430","DOI":"10.1177\/1550147717724308","volume":"13","author":"YH Park","year":"2017","unstructured":"Park, Y. H., Park, K. S., Lee, K. K., Song, H., & Park, Y. H. (2017). Security analysis and enhancements of an improved multi-factor biometric authentication scheme. International Journal of Distributed Sensor Networks, 13(8), 155014771772430.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"12","key":"9382_CR28","first-page":"1","volume":"99","author":"M Shingala","year":"2017","unstructured":"Shingala, M., Patel, C., & Doshi, N. (2017). An improve three factor remote user authentication scheme using smart card. Wireless Personal Communications, 99(12), 1\u201325.","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"9382_CR29","first-page":"491289","volume":"2013","author":"MK Khan","year":"2013","unstructured":"Khan, M. K., & Kumari, S. (2013). An improved biometrics-based remote user authentication scheme with user anonymity. BioMed Research International, 2013(5), 491289.","journal-title":"BioMed Research International"},{"issue":"4","key":"9382_CR30","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1007\/s11277-014-2111-6","volume":"80","author":"F Wen","year":"2015","unstructured":"Wen, F., Susilo, W., & Yang, G. (2015). Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications, 80(4), 1747\u20131760.","journal-title":"Wireless Personal Communications"},{"issue":"13","key":"9382_CR31","first-page":"1916","volume":"9","author":"L Xiong","year":"2014","unstructured":"Xiong, L., Niu, J., Khan, M. K., Liao, J., & Zhao, X. (2014). Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Security & Communication Networks, 9(13), 1916\u20131927.","journal-title":"Security & Communication Networks"},{"issue":"9","key":"9382_CR32","first-page":"154","volume":"128","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Wu, L., & Wang, H. (2016). Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography. Computer Networks, 128(9), 154\u2013163.","journal-title":"Computer Networks"},{"issue":"18","key":"9382_CR33","doi-asserted-by":"publisher","first-page":"8129","DOI":"10.1016\/j.eswa.2014.07.004","volume":"41","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Das, A. K., & Mukhopadhyay, S. (2014). A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Systems with Applications, 41(18), 8129\u20138143.","journal-title":"Expert Systems with Applications"},{"issue":"17","key":"9382_CR34","doi-asserted-by":"publisher","first-page":"3219","DOI":"10.1002\/sec.1246","volume":"8","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Yang, X., & Yang, Y. (2015). A biometrics and smart cards-based authentication scheme for multi-server environment. Security & Communication Networks, 8(17), 3219\u20133228.","journal-title":"Security & Communication Networks"},{"issue":"5","key":"9382_CR35","doi-asserted-by":"publisher","first-page":"e0126323","DOI":"10.1371\/journal.pone.0126323","volume":"10","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Yang, X., & Yang, Y. (2015). Robust biometrics based authentication and key agreement scheme for multi-server environment using smart cards. Plos One, 10(5), e0126323.","journal-title":"Plos One"},{"issue":"20","key":"9382_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-015-3194-0","volume":"75","author":"SA Chaudhry","year":"2016","unstructured":"Chaudhry, S. A. (2016). A secure biometric based multi-server authentication scheme for social multimedia networks. Multimedia Tools & Applications, 75(20), 1\u201321.","journal-title":"Multimedia Tools & Applications"},{"issue":"12","key":"9382_CR37","doi-asserted-by":"publisher","first-page":"e0145263","DOI":"10.1371\/journal.pone.0145263","volume":"10","author":"J Moon","year":"2015","unstructured":"Moon, J., Choi, Y., Jung, J., & Won, D. (2015). An improvement of robust biometrics-based authentication and key agreement scheme for multi-server environment using smart cards. Plos One, 10(12), e0145263.","journal-title":"Plos One"},{"issue":"11","key":"9382_CR38","doi-asserted-by":"publisher","first-page":"e0187403","DOI":"10.1371\/journal.pone.0187403","volume":"12","author":"H Guo","year":"2017","unstructured":"Guo, H., Wang, P., Zhang, X., Huang, Y., & Ma, F. (2017). A robust anonymous biometric-based authenticated key agreement scheme for multi-server environment. Plos One, 12(11), e0187403.","journal-title":"Plos One"},{"key":"9382_CR39","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s11277-019-06280-7","volume":"107","author":"A Tomar","year":"2019","unstructured":"Tomar, A., & Dhar, J. (2019). An ECC based secure authentication and key exchange scheme in multi-server environment. Wireless Personal Communications, 107, 351\u2013372.","journal-title":"Wireless Personal Communications"},{"issue":"19","key":"9382_CR40","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/s11042-019-07812-w","volume":"78","author":"M Qi","year":"2019","unstructured":"Qi, M., & Chen, J. (2019). Anonymous biometrics-based authentication with key agreement scheme for multi-server environment using ECC. Multimedia Tools and Applications, 78(19), 553\u2013568.","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"9382_CR41","first-page":"4909","volume":"26","author":"T Sudhakar","year":"2019","unstructured":"Sudhakar, T., & Natarajan, V. (2019). A new three-factor authentication and key agreement protocol for multi-server environment. Wireless Networks, 26(3), 4909\u20134920.","journal-title":"Wireless Networks"},{"key":"9382_CR42","doi-asserted-by":"crossref","first-page":"e4660","DOI":"10.1002\/dac.4660","volume":"34","author":"Y Chuang","year":"2020","unstructured":"Chuang, Y., & Lei, C. (2020). An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey. International Journal of Communication Systems, 34, e4660.","journal-title":"International Journal of Communication Systems"},{"key":"9382_CR43","doi-asserted-by":"crossref","unstructured":"Mo, J., Chen, H., & Shen, W. (2020). Cryptanalysis of anonymous three factor-based authentication schemes for multi-server environment. International Conference on Security with Intelligent Computing and Big-data Services, 456\u2013468.","DOI":"10.1007\/978-3-030-16946-6_36"},{"key":"9382_CR44","first-page":"239","volume":"84","author":"F Qi","year":"2017","unstructured":"Qi, F., He, D., Zeadally, S., & Wang, H. (2017). Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Generation Computer Systems, 84, 239\u2013251.","journal-title":"Future Generation Computer Systems"},{"issue":"9","key":"9382_CR45","doi-asserted-by":"publisher","first-page":"2511","DOI":"10.3390\/s20092511","volume":"20","author":"MK Wong","year":"2020","unstructured":"Wong, M. K., Hsu, C. L., Le, T. V., Hsieh, M. C., & Lin, T. W. (2020). Three-factor fast authentication scheme with time bound and user anonymity for multi-server e-health systems in 5g-based wireless sensor networks. Sensors, 20(9), 2511.","journal-title":"Sensors"},{"issue":"2","key":"9382_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-021-08501-4","volume":"120","author":"S Kandar","year":"2021","unstructured":"Kandar, S., Pal, S., & Dhara, B. C. (2021). A biometric based remote user authentication technique using smart card in multi-server environment. Wireless Personal Communications, 120(2), 1\u201324.","journal-title":"Wireless Personal Communications"},{"key":"9382_CR47","doi-asserted-by":"publisher","first-page":"53408","DOI":"10.1109\/ACCESS.2021.3070641","volume":"9","author":"TV Le","year":"2021","unstructured":"Le, T. V., & Hsu, C. L. (2021). An anonymous key distribution scheme for group healthcare services in 5g-enabled multi-server environment. IEEE Access, 9, 53408\u201353422.","journal-title":"IEEE Access"},{"issue":"1","key":"9382_CR48","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.dcan.2020.05.001","volume":"7","author":"A Iuh","year":"2021","unstructured":"Iuh, A., Jian, W. A., Yz, A., & Sm, B. (2021). An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. Digital Communications and Networks, 7(1), 140\u2013150.","journal-title":"Digital Communications and Networks"},{"key":"9382_CR49","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.dcan.2017.09.004","volume":"4","author":"A Kumar","year":"2017","unstructured":"Kumar, A., & Om, H. (2017). An improved and secure multi-server authentication scheme based on biometrics and smartcard. Digital Communications and Networks, 4, 27\u201338.","journal-title":"Digital Communications and Networks"},{"issue":"9","key":"9382_CR50","doi-asserted-by":"publisher","first-page":"14163","DOI":"10.1007\/s11042-020-10320-x","volume":"80","author":"A Kumar","year":"2021","unstructured":"Kumar, A., & Om, H. (2021). An enhanced and provably secure authentication protocol using chebyshev chaotic maps for multi-server environment. Multimedia Tools and Applications, 80(9), 14163\u201314189.","journal-title":"Multimedia Tools and Applications"},{"key":"9382_CR51","doi-asserted-by":"publisher","first-page":"102024","DOI":"10.1016\/j.sysarc.2021.102024","volume":"115","author":"B Wwa","year":"2021","unstructured":"Wwa, B., Hha, C., Lxa, C., Qi, L., Rm, D., & Yz, B. (2021). Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment. Journal of Systems Architecture, 115, 102024.","journal-title":"Journal of Systems Architecture"},{"issue":"C","key":"9382_CR52","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","volume":"73","author":"D Wang","year":"2014","unstructured":"Wang, D., & Wang, P. (2014). On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Computer Networks, 73(C), 41\u201357.","journal-title":"Computer Networks"},{"issue":"1","key":"9382_CR53","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"key":"9382_CR54","doi-asserted-by":"crossref","unstructured":"M.\u00a0Abadi B.\u00a0Blanchet & H.C.L. (2009). Models and proofs of protocol security: A progress report, in a. bouajjani & o. maler (eds.). Computer aided verification, 35\u201349.","DOI":"10.1007\/978-3-642-02658-4_5"},{"key":"9382_CR55","doi-asserted-by":"crossref","unstructured":"Sklavos N., Koufopavlou O. (2003). On the hardware implementations of the SHA-2 (256, 384, 512) hash functions. Proceedings of the 2003 International Symposium on Circuits and Systems 5.","DOI":"10.1109\/ISCAS.2003.1206214"},{"key":"9382_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9003-7","volume-title":"Introduction to cryptography","author":"J Buchmann","year":"2004","unstructured":"Buchmann, J. (2004). Introduction to cryptography (2nd ed.). New York: Springer.","edition":"2"},{"key":"9382_CR57","unstructured":"https:\/\/www.openssl.org\/."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09382-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09382-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09382-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T21:56:42Z","timestamp":1700085402000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09382-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,16]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["9382"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09382-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2022,1,16]]},"assertion":[{"value":"7 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declared that they have no conflicts of interest to this work. We declare that we have no financial and personal relationships with other people or organizations that can inappropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and\/or company that could be construed as influencing the position presented in, or the review of, the manuscript entitled, \u201cA novel three-factor authentication scheme with high security for multi-server environments\u201d","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}