{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:14:27Z","timestamp":1774541667305,"version":"3.50.1"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"National Key Research and Development Plan of China","award":["2016YFB0800600"],"award-info":[{"award-number":["2016YFB0800600"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472016; 61501333"],"award-info":[{"award-number":["61472016; 61501333"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1109\/tdsc.2016.2605087","type":"journal-article","created":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T18:56:33Z","timestamp":1472756193000},"page":"1-1","source":"Crossref","is-referenced-by-count":254,"title":["Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1667-2237","authenticated-orcid":false,"given":"Ding","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"185","article-title":"Reverse-engineering a cryptographic\n RFID tag","author":"nohl","year":"0","journal-title":"Proc 17th Conf Security Symp"},{"key":"ref38","article-title":"Smart card security from a programming language and static\n analysis perspective","author":"leroy","year":"2013"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.03.070"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1229"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23167"},{"key":"ref37","first-page":"468","article-title":"Small tweaks do not\n help: Differential power analysis of milenage implementations in 3G\/4G USIM cards","author":"liu","year":"0","journal-title":"Proc 20th Eur Symp Res Comput Secur"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322514"},{"key":"ref35","first-page":"139","article-title":"Authenticated key exchange secure against dictionary attacks","author":"bellare","year":"0","journal-title":"Proc 19th Int Conf Theory and Appl Cryptographic Tech"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"ref60","first-page":"134","article-title":"Implementing cryptographic pairings on smartcards","author":"scott","year":"0","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref61","article-title":"Miracl library","author":"scott","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2230639"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.03.006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.006"},{"key":"ref2","first-page":"1","article-title":"The secure remote password protocol","author":"wu","year":"0","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2362979"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2008.04.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355850"},{"key":"ref24","first-page":"489","article-title":"Password protected smart card and memory stick authentication\n against off-line dictionary attacks","author":"wang","year":"0","journal-title":"Proc 27th IFIP TC 11 Inf Secur Privacy Conf Inf Secur Privacy Res"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.230"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/sec.315"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1235","DOI":"10.1016\/j.jnca.2012.01.007","article-title":"Dynamic ID-based remote user password authentication schemes using smart cards: A review","volume":"35","author":"madhusudhan","year":"2012","journal-title":"J Netw Comput Appl"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948142"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","article-title":"An enhanced smart card based remote user password\n authentication scheme","volume":"36","author":"li","year":"2013","journal-title":"J Netw Comput Appl"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2793"},{"key":"ref58","first-page":"479","article-title":"Chaotic Chebyshev polynomials based\n remote user authentication scheme in client-server environment","author":"truong","year":"0","journal-title":"Proc 30th IFIP Int Inf Secur Conf"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2644"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2439964"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.35"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"ref53","article-title":"Amid widespread data breaches in China","author":"martin","year":"2011"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.07.004"},{"key":"ref10","article-title":"Four years later, anthem breached again: Hackers stole credentials","author":"pham","year":"2015"},{"key":"ref11","article-title":"32 million RockYou passwords stolen","author":"allan","year":"2009"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2368"},{"key":"ref12","article-title":"15 Million passwords appear to have leaked from 000webhost","author":"fox-brewster","year":"2015"},{"key":"ref13","article-title":"PhpBB asking users to change passwords following hack","author":"kovacs","year":"2014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813722"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.10"},{"key":"ref17","first-page":"1","article-title":"On limitations of designing leakage-resilient password\n systems: Attacks, principles and usability","author":"yan","year":"0","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1049\/ip-e.1991.0022","article-title":"remote password authentication with smart cards","volume":"138","author":"chang","year":"1991","journal-title":"Computers and Digital Techniques IEE Proceedings-"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.2297110"},{"key":"ref4","first-page":"571","article-title":"Security of the J-PAKE password-authenticated key exchange protocol","author":"abdalla","year":"0","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1613676.1613679"},{"key":"ref6","first-page":"1","article-title":"On the implications of Zipf&#x2019;s law in passwords","author":"wang","year":"0","journal-title":"Proc Euro Symp Res Computer Security"},{"key":"ref5","article-title":"Hashdumps and passwords","author":"adeptus","year":"2014"},{"key":"ref8","article-title":"Password cracking HPC","author":"gosney","year":"0","journal-title":"Proc Password"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.50"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2005.10.001"},{"key":"ref9","article-title":"Bcrypt is great, but is password cracking infeasible?","author":"goldberg","year":"2015"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.07.010"},{"key":"ref45","first-page":"236","article-title":"A robust remote user authentication scheme using smart card","volume":"40","author":"li","year":"2011","journal-title":"Inform and Control"},{"key":"ref48","first-page":"546","article-title":"HMQV: A high-performance secure Diffie-Hellman protocol","author":"krawczyk","year":"0","journal-title":"Proc 25th Ann Int'l Conf Advances in Cryptology"},{"key":"ref47","first-page":"475","article-title":"The request for better measurement: A\n comparative evaluation of two-factor authentication schemes","author":"wang","year":"0","journal-title":"Proc 11th ACM Asia Conf Comput Commun Secur"},{"key":"ref42","first-page":"383","article-title":"On robust key agreement based on public key authentication","author":"hao","year":"0","journal-title":"Proc 14th Int Conf Financial Cryptogr Data Security"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2590"},{"key":"ref44","first-page":"114","article-title":"Secure\n password-based remote user authentication scheme with non-tamper resistant smart cards","author":"wang","year":"0","journal-title":"Proc 26th Annu IFIP WG 11 3 Conf Data Appl Secur Privacy"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"2284","DOI":"10.1109\/TIE.2009.2016508","article-title":"Improvements of Juang et\ufffdal.&#x2019;s password-authenticated key agreement scheme using\n smart cards","volume":"56","author":"sun","year":"2009","journal-title":"IEEE Trans Ind Electron"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/07558124.pdf?arnumber=7558124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:28:16Z","timestamp":1643210896000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7558124\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2016.2605087","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2016]]}}}