{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:30:40Z","timestamp":1730273440800,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1109\/isda.2010.5687101","type":"proceedings-article","created":{"date-parts":[[2011,1,13]],"date-time":"2011-01-13T21:33:25Z","timestamp":1294954405000},"page":"1371-1375","source":"Crossref","is-referenced-by-count":3,"title":["On security of a more efficient and secure dynamic ID-based remote user authentication scheme"],"prefix":"10.1109","author":[{"given":"Cheng-Chi","family":"Lee","sequence":"first","affiliation":[]},{"given":"Chin-Ling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chun-Ta","family":"Li","sequence":"additional","affiliation":[]},{"given":"Rui-Xiang","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"2181","article-title":"An online biometrics-based secret sharing scheme for multiparty cryptosystem using smart cards","volume":"6","author":"li","year":"2010","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"ref11","first-page":"5311","article-title":"A batch verifying and detecting the illegal signatures","volume":"6","author":"li","year":"2010","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.06.002"},{"key":"ref13","first-page":"2107","article-title":"An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks","volume":"5","author":"li","year":"2009","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"ref14","article-title":"A novel user authentication and privacy preserving scheme with smart cards for wireless communications","author":"li","year":"2010","journal-title":"Mathematical and Computer Modelling"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12156-2_45"},{"key":"ref16","first-page":"201","article-title":"A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels","volume":"5","author":"li","year":"2010","journal-title":"Journal of Information Assurance and Security"},{"key":"ref17","first-page":"4715","article-title":"A secure event update protocol for peer-to-peer massively multiplayer online games against masquerade attacks","volume":"5","author":"li","year":"2009","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"ref18","first-page":"5061","article-title":"A secure and undeniable billing protocol among charged parties for grid computing environments","volume":"6","author":"li","year":"2010","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/30.920446"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/30.826377"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/219282.219298"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1277863"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.1990.152647"},{"key":"ref8","first-page":"166","article-title":"Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks","volume":"8","author":"li","year":"2009","journal-title":"International Journal of Network Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1309441"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00415-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1309437"}],"event":{"name":"2010 10th International Conference on Intelligent Systems Design and Applications (ISDA)","start":{"date-parts":[[2010,11,29]]},"location":"Cairo, Egypt","end":{"date-parts":[[2010,12,1]]}},"container-title":["2010 10th International Conference on Intelligent Systems Design and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5681599\/5687016\/05687101.pdf?arnumber=5687101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T04:41:40Z","timestamp":1490071300000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5687101\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/isda.2010.5687101","relation":{},"subject":[],"published":{"date-parts":[[2010,11]]}}}