{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T03:14:19Z","timestamp":1775358859314,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2018,9,1]]},"DOI":"10.1109\/tdsc.2016.2616876","type":"journal-article","created":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T18:17:47Z","timestamp":1476296267000},"page":"824-839","source":"Crossref","is-referenced-by-count":182,"title":["Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment"],"prefix":"10.1109","volume":"15","author":[{"given":"Santanu","family":"Chatterjee","sequence":"first","affiliation":[]},{"given":"Sandip","family":"Roy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-3947","authenticated-orcid":false,"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref38","year":"2016"},{"key":"ref33","author":"stallings","year":"2003","journal-title":"Cryptography and Network Security Principles and Practices"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0285-z"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.040"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.007"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.030"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"ref35","first-page":"180","year":"1995","journal-title":"Secure Hash Standard"},{"key":"ref34","first-page":"1382","article-title":"IEEE transactions on circuits and\n systems I","volume":"52","author":"bergamo","year":"2005","journal-title":"Applied Mathematics & Information Sciences"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","article-title":"A novel smart card and dynamic ID based remote user authentication scheme for\n multi-server environments","volume":"58","author":"li","year":"2012","journal-title":"Math Comput Modelling"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"2085","DOI":"10.1007\/s11071-015-2467-5","article-title":"Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template\n privacy","volume":"83","author":"jiang","year":"2015","journal-title":"Nonlinear Dyn"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.09.047"},{"key":"ref2","first-page":"255","article-title":"Enhancing side-channel analysis of binary-field multiplication with bit reliability","author":"pessl","year":"2016","journal-title":"Proc The Cryptographer s Track at RSA Conf"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1610-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1135-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1594-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.15388\/Informatica.2008.214"},{"key":"ref23","article-title":"An\n efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server\n environment","author":"zhao","year":"2013","journal-title":"CoRR"},{"key":"ref26","first-page":"90","article-title":"Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev\n chaotic map","author":"hsu","year":"2013","journal-title":"Proc IEEE Int Conf Pervasive Comput Commun"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PEITS.2008.35"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2288-3"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1140"},{"key":"ref56","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-20542-2","author":"kocarev","year":"2011","journal-title":"Chaos-Based Cryptography Theory Algorithms and Applications"},{"key":"ref55","first-page":"1123","article-title":"A biometric-based password authentication with key exchange scheme using mobile device for\n multi-server environment","volume":"9","author":"li","year":"2015","journal-title":"Appl Math Inf Sci"},{"key":"ref54","article-title":"SPAN, the Security Protocol ANimator for AVISPA","year":"2016"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0055-7"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0324-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2590"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.120610.101018"},{"key":"ref40","article-title":"Automated Validation of Internet Security Protocols and Applications","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2013.6689693"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9314-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0335-y"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-010-0512-1"},{"key":"ref16","first-page":"391","article-title":"Cryptanalysis and improvement of a biometrics-based multi-server authentication with key\n agreement scheme","author":"kim","year":"2012","journal-title":"Proc 12th Int Conf Comput Sci Its Appl"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2301517"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2439964"},{"key":"ref19","first-page":"1","article-title":"Security flaws in a biometrics-based multi-server authentication with key\n agreement scheme","author":"he","year":"2011","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref4","first-page":"388","article-title":"Differential\n power analysis","author":"kocher","year":"1999","journal-title":"Proc 19th Annu Int Cryptology Conf Advances Cryptology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2230639"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355850"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.230"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2933"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1002\/sec.315","article-title":"Robust smart-cards-based user\n authentication scheme with user anonymity","volume":"5","author":"pu","year":"2012","journal-title":"Secur Commun Netw"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0125"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/328236.328110"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2866-4"},{"key":"ref47","first-page":"1","article-title":"The high-level protocol specification language HLPSL developed in\n the EU project AVISPA","author":"von oheimb","year":"2005","journal-title":"Proc 3rd APPSEM II Workshop Appl Semantics (APPSEM)"},{"key":"ref42","article-title":"Sequences of games: A tool for taming complexity in security\n proofs","author":"shoup","year":"2004","journal-title":"Cryptology-eprint-archive"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_17"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.09.006"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/8452067\/07589015.pdf?arnumber=7589015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:45:05Z","timestamp":1643208305000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7589015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,1]]},"references-count":56,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2016.2616876","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,1]]}}}