{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:23:50Z","timestamp":1729664630520,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1109\/comswa.2008.4554411","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T15:19:59Z","timestamp":1215098399000},"page":"214-218","source":"Crossref","is-referenced-by-count":6,"title":["Dynamic authentication: Need than a choice"],"prefix":"10.1109","author":[{"given":"Ashutosh","family":"Saxena","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/30.920446"},{"key":"ref11","first-page":"221","article-title":"Cryptanalysis of password authentication schemes with smart cards","author":"sun","year":"2001","journal-title":"Information Security Conference 2001"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/0167-4048(96)00005-3","article-title":"Smart card based secure password authentication scheme","volume":"15","author":"wang","year":"1996","journal-title":"Computers and Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(99)80136-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)05032-X"},{"key":"ref15","first-page":"823","article-title":"Improvement on Peyravian-Zunic's password authentication schemes","volume":"e85 b","author":"hwang","year":"2002","journal-title":"IEICE Transactions on Communications"},{"key":"ref16","first-page":"1363","article-title":"Simple and secure password authentication protocol","volume":"e83 b","author":"sandirigama","year":"2000","journal-title":"IEICE Transactions on Communications"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/583800.583803"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1309441"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/el:20010022"},{"key":"ref4","first-page":"1666","article-title":"A password authentication methods for contents communication on the internet","volume":"e81 b","author":"shimizu","year":"1998","journal-title":"IEICE Transactions on Communications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-7177(02)00106-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00415-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/el:20047658"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/ietcom\/e88-b.5.2165"},{"journal-title":"IEEE P1363 Working Group","year":"2003","key":"ref2"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","article-title":"Handbook of Applied Cryptography","author":"menezes","year":"1996"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1095067"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/30.826377"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/30.920451"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"}],"event":{"name":"Middleware and Workshops (COMSWARE '08)","start":{"date-parts":[[2008,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2008,1,10]]}},"container-title":["2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4545865\/4554360\/04554411.pdf?arnumber=4554411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:38:31Z","timestamp":1497778711000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4554411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/comswa.2008.4554411","relation":{},"subject":[],"published":{"date-parts":[[2008,1]]}}}