{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T06:29:00Z","timestamp":1777444140580,"version":"3.51.4"},"reference-count":22,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2002,8,1]],"date-time":"2002-08-01T00:00:00Z","timestamp":1028160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2002,8]]},"DOI":"10.1016\/s0167-4048(02)00415-7","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T17:19:10Z","timestamp":1034356750000},"page":"372-375","source":"Crossref","is-referenced-by-count":339,"title":["An Efficient and Practical Solution to Remote Authentication: Smart Card"],"prefix":"10.1016","volume":"21","author":[{"given":"Hung-Yu","family":"Chien","sequence":"first","affiliation":[]},{"given":"Jinn-Ke","family":"Jan","sequence":"additional","affiliation":[]},{"given":"Yuh-Min","family":"Tseng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(02)00415-7_BIB1","doi-asserted-by":"crossref","unstructured":"T.C. Wu, \u201cRemote Login Authentication Scheme Based on a Geometric Approach,\u201d Computer Communications 18 (12), pp. 959\u2013963, 1995.","DOI":"10.1016\/0140-3664(96)81595-7"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB2","doi-asserted-by":"crossref","unstructured":"M.-S. Hwang, \u201cCryptanalysis of a Remote Login Authentication Scheme,\u201d Computer Communications 22, 742\u2013744, 1999.","DOI":"10.1016\/S0140-3664(99)00036-5"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB3","doi-asserted-by":"crossref","unstructured":"K. Tan, and H. Zhu, \u201cRemote password authentication scheme based on cross-produc,t\u201d, Computer Communications 18, pp. 390\u2013393, 1999.","DOI":"10.1016\/S0140-3664(98)00215-1"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB4","doi-asserted-by":"crossref","unstructured":"W.-H. Yang, and S.-P. Shieh, \u201cPassword authentication schemes with smart card,\u201d Computer & Security, Vol. 18, No. 8, pp. 727\u2013733, 1999.","DOI":"10.1016\/S0167-4048(99)80136-9"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB5","doi-asserted-by":"crossref","unstructured":"S.-M. Yen, and K.-H. Liao, \u201cShared authentication token secure against replay and weak key attack,\u201d Information Processing Letters 62, pp.78\u201380, 1997.","DOI":"10.1016\/S0020-0190(97)00046-X"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB6","doi-asserted-by":"crossref","unstructured":"T.-C. Wu, and H.-S. Sung, \u201cAuthentication passwords over an insecure channel,\u201d Computer & Security, Vol. 15, No. 5, pp. 431\u2013439, 1996.","DOI":"10.1016\/0167-4048(96)00004-1"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB7","doi-asserted-by":"crossref","unstructured":"J.-K. Jan, and Y.-Y. Chen, \u201cParamita wisdom: password authentication scheme without verification tables,\u201d The Journal of Systems and Software 42, pp. 45\u201347.","DOI":"10.1016\/S0164-1212(98)00006-5"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB8","doi-asserted-by":"crossref","unstructured":"S,-J. Wang, and Jin-Fu Chang, \u201cSmart card based secure password authentication scheme,\u201d Computers & Security, Vol. 15, No. 3, pp. 231\u2013237, 1996.","DOI":"10.1016\/0167-4048(96)00005-3"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB9","doi-asserted-by":"crossref","unstructured":"H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng, \u201cImpersonation attack on Tan-Zhu\u2019s remote login scheme,\u201d Electronics Letters, Vol. 36, No. 14, pp. 1202\u20131203, 2000.","DOI":"10.1049\/el:20000851"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB10","unstructured":"H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng, \u201cA modified remote login authentication scheme based on geometric approach,\u201d accepted in The Journal of Systems and Software."},{"key":"10.1016\/S0167-4048(02)00415-7_BIB11","doi-asserted-by":"crossref","unstructured":"M.-S. Hwang, and L.-H. Li, \u201cA new remote user authentication scheme using smart cards,\u201d IEEE Trans. on Consumer Electronics, Vol. 46, No. 1, February 2000.","DOI":"10.1109\/30.826377"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB12","doi-asserted-by":"crossref","unstructured":"H.-M. Sun, \u201cAn efficient remote user authentication scheme using smart cards,\u201d IEEE Trans. on Consumer Electronics, Vol. 46, No. 4, November 2000.","DOI":"10.1109\/30.920446"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB13","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, The MD5 message-digest algorithm, RFC 1231, Internet Activities Board, Internet Privacy Task Force,1992.","DOI":"10.17487\/rfc1321"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB14","unstructured":"NIST FIP PUB 180, Secure hash standard, National Institute of Standards and Technology, US department of Commerce, DRAFT 1993."},{"key":"10.1016\/S0167-4048(02)00415-7_BIB15","doi-asserted-by":"crossref","unstructured":"T. T. May, J. W. James, P. H. Bosma, and J. D. Veatch, \u201dRequirements Driven Methodology for accessing the security and business use of smart cards,\u201d IEEE, pp. 72\u201388, 1996.","DOI":"10.1109\/CCST.1996.551845"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB16","doi-asserted-by":"crossref","unstructured":"M. L. Gemplus, \u201cSmart-cards: a cost-effective solution against electronic fraude,\u201d European Conference on Security and Detection, 28-30 April 1997, Conference Publication No. 437, pp. 81\u201385, IEE, 1997.","DOI":"10.1049\/cp:19970426"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB17","doi-asserted-by":"crossref","unstructured":"A. Jr Evans, W. Kantrowitz, and E. Weiss, \u201cA user authentication system not requiring secrecy in the computer,\u201d Communications of the ACM 17, pp. 437\u2013442, 1974.","DOI":"10.1145\/361082.361087"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB18","doi-asserted-by":"crossref","unstructured":"R. E. Lennon, S.M. Matyas, and C.H. Mayer, \u201cCryptographic authentication of time-invariant quantities,\u201d IEEE Trans. on Communications, COM-29, no. 6, pp. 773\u2013777, 1981.","DOI":"10.1109\/TCOM.1981.1095067"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB19","doi-asserted-by":"crossref","unstructured":"C.-C. Chang, and T.C. Wu, \u201cRemote password authentication with smart cards,\u201d IEE Proceedings-E, 138 (3), pp. 165\u2013168, 1991.","DOI":"10.1049\/ip-e.1991.0022"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB20","doi-asserted-by":"crossref","unstructured":"C.C. Chang, and C.S. Liah, \u201cComment on remote password authentication with smart cards, IEE Proccedings-E,139 (4), pp. 372\u2013372, 1992.","DOI":"10.1049\/ip-e.1992.0053"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB21","doi-asserted-by":"crossref","unstructured":"L. Lamport, \u201cPassword authentication with insecure communication,\u201d Communications of ACM, Vol. 24, pp. 77\u2013772, 1981.","DOI":"10.1145\/358790.358797"},{"key":"10.1016\/S0167-4048(02)00415-7_BIB22","doi-asserted-by":"crossref","unstructured":"D. Mcelroy, and E. Turban, \u201cusing smart cards in electronic commerce,\u201d International Journal of information management, Vol. 18, No. 1, pp. 61\u201372, 1998.","DOI":"10.1016\/S0268-4012(97)00040-6"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802004157?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404802004157?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T02:06:07Z","timestamp":1733709967000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404802004157"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,8]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2002,8]]}},"alternative-id":["S0167404802004157"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(02)00415-7","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2002,8]]}}}