{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:42:01Z","timestamp":1729644121582,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1109\/comsnets.2015.7098707","type":"proceedings-article","created":{"date-parts":[[2015,5,5]],"date-time":"2015-05-05T10:41:46Z","timestamp":1430822506000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["A robust mutual authentication scheme for data security in cloud architecture"],"prefix":"10.1109","author":[{"given":"Mrudula","family":"Sarvabhatla","sequence":"first","affiliation":[]},{"given":"Chandra Sekhar","family":"Vorugunti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11767-012-0712-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33469-6_34"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41674-3_77"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/978-3-642-34041-3_59","article-title":"Cryptanalysis of Wang's Auditing Protocol for Data Storage Security in Cloud Computing","volume":"308","author":"xu","year":"2012","journal-title":"Information Computing and Applications Communications in Computer and Information Science"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/978-81-322-1680-3_43","article-title":"A Multifactor Biometric Authentication for the Cloud","volume":"246","author":"shabana","year":"2014","journal-title":"Computational Intelligence Cyber Security and Computational Models Advances in Intelligent Systems and Computing"},{"key":"ref15","article-title":"Smart Environment as a Service: Three Factor Cloud Based User Authentication for Telecare Medical Information System","author":"siddiqui","year":"2013","journal-title":"J Med Syst Springer"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14254-8_17"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_62"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03584-0_25"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-010-0512-1"},{"key":"ref4","first-page":"514","article-title":"Examing smartcard security under the threat of power analysis attacks","volume":"5","author":"messerges","year":"2002","journal-title":"IEEE Transactions on Computers"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IAdCC.2013.6514197"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-1768-8_67"},{"key":"ref5","first-page":"135","article-title":"Correlation power analysis with a leakage model","volume":"3156","author":"brier","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"key":"ref8","first-page":"721","article-title":"A Pairing-Free Identity Based Authentication Framework for Cloud Computing","volume":"7873","author":"mishra","year":"2013","journal-title":"7th International Conference NSS 2013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-1680-3_43"},{"key":"ref2","first-page":"149","article-title":"Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing","volume":"37","author":"pippal","year":"2013","journal-title":"Informatica"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"227","DOI":"10.15837\/ijccc.2011.2.2170","article-title":"A time bound ticket-based mutual authentication scheme for cloud computing","volume":"6","author":"hao","year":"2011","journal-title":"International Journal of Computers Communications and Control"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0967-y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/719470"},{"key":"ref22","article-title":"A Novel Frequency Billing Service in Digital Television System","volume":"5","author":"lee","year":"2014","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"ref21","first-page":"125","article-title":"An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card","volume":"33","author":"liao","year":"2009","journal-title":"Informatica"},{"article-title":"Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System","year":"0","author":"choi","key":"ref23"}],"event":{"name":"2015 7th International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2015,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2015,1,10]]}},"container-title":["2015 7th International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7090755\/7098633\/07098707.pdf?arnumber=7098707","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T06:59:00Z","timestamp":1498201140000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7098707\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2015.7098707","relation":{},"subject":[],"published":{"date-parts":[[2015,1]]}}}