{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:13:51Z","timestamp":1771701231898,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1145\/3341325.3342020","type":"proceedings-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:04:52Z","timestamp":1567775092000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Lightweight Two-Factor Authentication Scheme for Mobile Cloud Computing"],"prefix":"10.1145","author":[{"given":"Abdelrahman","family":"Abuarqoub","sequence":"first","affiliation":[{"name":"Department of Computer Science, Middle East University, Amman, Jordan"}]}],"member":"320","published-online":{"date-parts":[[2019,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"V. L. \u010devi\u0107 Development of Portable Solar Device for Charging of Li-Ion Battery of Mobile Phone vol. 5 2016.  V. L. \u010devi\u0107 Development of Portable Solar Device for Charging of Li-Ion Battery of Mobile Phone vol. 5 2016.","DOI":"10.15662\/IJAREEIE.2016.0505001"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860006"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-012-0370-6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"N. Balasubramanian A. Balasubramanian and A. Venkataramani Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications 2009.  N. Balasubramanian A. Balasubramanian and A. Venkataramani Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications 2009.","DOI":"10.1145\/1644893.1644927"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"S. Binu A. Mohan K. T. Deepak Manohar.S M. Misbahuddin and P. Raj \"A proof of concept implementation of a mobile based authentication scheme without password table for cloud environment \" in 2015 IEEE International Advance Computing Conference (IACC) 2015 pp. 1224--1229.  S. Binu A. Mohan K. T. Deepak Manohar.S M. Misbahuddin and P. Raj \"A proof of concept implementation of a mobile based authentication scheme without password table for cloud environment \" in 2015 IEEE International Advance Computing Conference (IACC) 2015 pp. 1224--1229.","DOI":"10.1109\/IADCC.2015.7154897"},{"key":"e_1_3_2_1_6_1","unstructured":"M. Momeni A Lightweight Authentication Scheme for Mobile Cloud Computing vol. 14 2014.  M. Momeni A Lightweight Authentication Scheme for Mobile Cloud Computing vol. 14 2014."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2459976.2460024"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"N. F. Mo\u00e7o I. S. T\u00e9cnico I. d. Telecomunica\u00e7\u00f5es and P. L. Correia \"Smartphone-based palmprint recognition system \" in 2014 21st International Conference on Telecommunications (ICT) 2014 pp. 457--461.  N. F. Mo\u00e7o I. S. T\u00e9cnico I. d. Telecomunica\u00e7\u00f5es and P. L. Correia \"Smartphone-based palmprint recognition system \" in 2014 21st International Conference on Telecommunications (ICT) 2014 pp. 457--461.","DOI":"10.1109\/ICT.2014.6845158"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-016-0068-6"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813722"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-e.1991.0022"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"N. Radhakrishnan and M. Karuppiah \"An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems \" Informatics in Medicine Unlocked 2018\/02\/16\/ 2018.  N. Radhakrishnan and M. Karuppiah \"An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems \" Informatics in Medicine Unlocked 2018\/02\/16\/ 2018.","DOI":"10.1016\/j.imu.2018.02.003"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"C.-L. Chen Y.-Y. Deng Y.-W. Tang J.-H. Chen and Y.-F. Lin An Improvement on Remote User Authentication Schemes Using Smart Cards vol. 7 2018.  C.-L. Chen Y.-Y. Deng Y.-W. Tang J.-H. Chen and Y.-F. Lin An Improvement on Remote User Authentication Schemes Using Smart Cards vol. 7 2018.","DOI":"10.3390\/computers7010009"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Y. Zhao S. Li and L. Jiang Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment vol. 2018 2018.  Y. Zhao S. Li and L. Jiang Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment vol. 2018 2018.","DOI":"10.1155\/2018\/9178941"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355850"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1309441"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.007"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11915034_73"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/567331.567335"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491266.2491272"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1299"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1109"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"S. Chaudhry Comment on 'Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol based communications' vol. 9 2015.  S. Chaudhry Comment on 'Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol based communications' vol. 9 2015.","DOI":"10.1049\/iet-com.2014.1082"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.008"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.11.010"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2428"}],"event":{"name":"ICFNDS '19: 3rd International Conference on Future Networks and Distributed Systems","location":"Paris France","acronym":"ICFNDS '19","sponsor":["CNAM Conservatoire des Arts et M\u00e9tiers"]},"container-title":["Proceedings of the 3rd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342020","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341325.3342020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:57Z","timestamp":1750201977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342020"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":26,"alternative-id":["10.1145\/3341325.3342020","10.1145\/3341325"],"URL":"https:\/\/doi.org\/10.1145\/3341325.3342020","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2019-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}