{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:54:15Z","timestamp":1730202855159,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T00:00:00Z","timestamp":1697587200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T00:00:00Z","timestamp":1697587200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,18]]},"DOI":"10.1109\/ccci58712.2023.10290808","type":"proceedings-article","created":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:48:42Z","timestamp":1698691722000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Robust Remote Client Password Authentication Technique for Smart Cities E-Governance Applications"],"prefix":"10.1109","author":[{"given":"Mohammad S.","family":"Obaidat","sequence":"first","affiliation":[{"name":"King Abdullah II School of Information Technology, The University of Jordan,,Amman,Jordan,11942"}]},{"given":"Chandrashekhar","family":"Meshram","sequence":"additional","affiliation":[{"name":"Jayawanti Haksar Government Post Graduation College, College of Barkatullah University,Department of Post Graduation Studies and Research in Mathematics,Betul,M.P.,India,460001"}]},{"given":"Deepak","family":"Kartikey","sequence":"additional","affiliation":[{"name":"S.S.P. Govt. College Waraseoni,Department of Mathematics,Balaghat,M.P.,India"}]},{"given":"Kuei-Fang","family":"Hsiao","sequence":"additional","affiliation":[{"name":"University of Texas-Permian Basin,Computer Science Department,Odessa,TX,USA,79762"}]},{"given":"Agbotiname Lucky","family":"Imoize","sequence":"additional","affiliation":[{"name":"University of Lagos,Faculty of Engineering,Department of Electrical and Electronics Engineering,Lagos,Nigeria,100213"}]},{"given":"Sharad Kumar","family":"Barve","sequence":"additional","affiliation":[{"name":"Pandit S. N. Shukla University Shahdol,Department of Mathematics,Shahdol,Madhya Pradesh,India,484001"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Smart Cities and Homes Key Enabling Technologies","author":"Obaidat","year":"2016","journal-title":"Elsevier"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4067"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3485058"},{"issue":"2","key":"ref4","first-page":"358","article-title":"An enhanced secure smart card-based password authentication scheme","volume":"22","author":"Pan","year":"2020","journal-title":"Int. J. Netw. Secur."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/ropr.12470"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.landusepol.2020.105201"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s21051709"},{"key":"ref8","first-page":"24","article-title":"Object oriented modelling of RSA digital signature in e-governance security","volume-title":"Int. J. Comput. Eng. Inf. Technol. (IJCEIT), Summer Ed.","volume":"26","author":"Roy","year":"2011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1158"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2010.03.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ncc.2010.5430153"},{"key":"ref13","first-page":"323","article-title":"Analysis of Smart Card-Based Remote User Authentication Schemes","author":"Song","year":"2007","journal-title":"in Security and Management"},{"key":"ref14","article-title":"Side-channel analysis, Encyclopedia of Cryptography and Security","author":"Joye","year":"2005","journal-title":"Kluwer Academic Publishers Berlin"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2368"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.034"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2793"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4307"},{"issue":"8","key":"ref19","first-page":"855","article-title":"Pseudonoise sequences by chaotic nonlinear maps and their correlation properties","volume":"76","author":"Kohda","year":"1993","journal-title":"IEICE Trans. Commun."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9892.00180"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-017-0046-x"}],"event":{"name":"2023 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)","start":{"date-parts":[[2023,10,18]]},"location":"Chongqing, China","end":{"date-parts":[[2023,10,20]]}},"container-title":["2023 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10290136\/10290139\/10290808.pdf?arnumber=10290808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T10:21:03Z","timestamp":1709374863000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10290808\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,18]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ccci58712.2023.10290808","relation":{},"subject":[],"published":{"date-parts":[[2023,10,18]]}}}