{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:06Z","timestamp":1750220766807,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T00:00:00Z","timestamp":1608249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,18]]},"DOI":"10.1145\/3447654.3447666","type":"proceedings-article","created":{"date-parts":[[2021,5,13]],"date-time":"2021-05-13T21:36:12Z","timestamp":1620941772000},"page":"78-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Detection and Prevention of New Attacks for ID-based Authentication Protocols"],"prefix":"10.1145","author":[{"given":"Jinyong","family":"Chen","sequence":"first","affiliation":[{"name":"School of Computer Science University College Dublin Dublin Ireland, Ireland"}]},{"given":"Reiner","family":"Dojen","sequence":"additional","affiliation":[{"name":"School of Electronic &amp; Computer Engineering University of Limerick Limerick Ireland, Ireland"}]},{"given":"Anca","family":"Jurcut","sequence":"additional","affiliation":[{"name":"School of Computer Science University College Dublin Dublin Ireland, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2021,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2725831"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.18178\/JACN.2018.6.2.258"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.010"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.2297110"},{"volume-title":"T Schneider and M Winandy (2010) Token-based cloud computing. Trust and Trustworthy Computing","author":"Sadeghi R","key":"e_1_3_2_1_5_1","unstructured":"A. R Sadeghi , T Schneider and M Winandy (2010) Token-based cloud computing. Trust and Trustworthy Computing , Springer , 417-429. A.R Sadeghi, T Schneider and M Winandy (2010) Token-based cloud computing. Trust and Trustworthy Computing, Springer, 417-429."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2010.03.008"},{"key":"e_1_3_2_1_8_1","first-page":"71","article-title":"A robust and efficient smart card based dynamic identity authentication protocol","author":"Giri M.","year":"2014","unstructured":"M. Giri and C. S. Vorugunti , 2014 A robust and efficient smart card based dynamic identity authentication protocol , Networks & Soft Computing (ICNSC) , 71 - 75 . M. Giri and C. S. Vorugunti, 2014 A robust and efficient smart card based dynamic identity authentication protocol, Networks & Soft Computing (ICNSC), 71-75.","journal-title":"Networks & Soft Computing (ICNSC)"},{"volume-title":"M. Liyanage and J. Murphy (2019)","author":"Jurcut A.","key":"e_1_3_2_1_9_1","unstructured":"A. Jurcut , J. Chen , A. Kalla , M. Liyanage and J. Murphy (2019) A Novel Authentication Mechanism for Mobile Satellite Communication Systems. Proc. of IEEE Wireless Communications and Networking Conf. (WCNC). A. Jurcut, J. Chen, A. Kalla, M. Liyanage and J. Murphy (2019) A Novel Authentication Mechanism for Mobile Satellite Communication Systems. Proc. of IEEE Wireless Communications and Networking Conf. (WCNC)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2012.06.033"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.007"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.11.002"},{"key":"e_1_3_2_1_13_1","first-page":"13863","article-title":"A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards","volume":"38","author":"Lee C","year":"2011","unstructured":"C. C Lee , T. H Lin and R. X Chang ( 2011 ) A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards . Expert Systems with Applications , 38 , 13863 - 13870 . C.C Lee, T.H Lin and R.X Chang (2011) A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Systems with Applications, 38, 13863-13870.","journal-title":"Expert Systems with Applications"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"volume-title":"IEEE Region 10 Conference on IEEE TENCON'90, 429-431","author":"Hwang T.","key":"e_1_3_2_1_15_1","unstructured":"T. Hwang , Y. Chen and C. S. Laih , 1990 Non-interactive password authentications without password tables. Computer and Communication Systems , IEEE Region 10 Conference on IEEE TENCON'90, 429-431 . T. Hwang, Y. Chen and C. S. Laih, 1990 Non-interactive password authentications without password tables. Computer and Communication Systems, IEEE Region 10 Conference on IEEE TENCON'90, 429-431."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/30.826377"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/30.920451"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/30.920446"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2003.1209534"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1309430"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.03.006"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.01.002"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.09.003"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.11.795-805"},{"key":"e_1_3_2_1_25_1","unstructured":"W.-B. Lee and C.-C. Chang \"User identification and key distribution maintaining anonymity for distributed computer networks \" Comput Syst Sci Eng vol. 15 pp. 211-214 2000.  W.-B. Lee and C.-C. Chang \"User identification and key distribution maintaining anonymity for distributed computer networks \" Comput Syst Sci Eng vol. 15 pp. 211-214 2000."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.963786"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1277870"},{"key":"e_1_3_2_1_28_1","first-page":"417","volume-title":"2004 International Conference on Cyberworlds","author":"Chang C.C.","unstructured":"C.C. Chang and J.S. Lee , 2004 An efficient and secure multi-server password authentication scheme using smart cards . 2004 International Conference on Cyberworlds , pp. 417 - 422 . C.C. Chang and J.S. Lee, 2004 An efficient and secure multi-server password authentication scheme using smart cards. 2004 International Conference on Cyberworlds, pp. 417-422."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2004.03.004"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890952"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.39"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0554-4"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9862-y"},{"issue":"2","key":"e_1_3_2_1_35_1","first-page":"16","article-title":"Security protocol design: A case study using key distribution protocols","volume":"2","author":"Jurcut A.","year":"2009","unstructured":"A. Jurcut , T. Coffey , R. Dojen , and R. Gyorodi ( 2009 ) Security protocol design: A case study using key distribution protocols . Journal of Computer Science and Control Systems , vol. 2 ( 2 ), pp. 16 - 21 . A. Jurcut, T. Coffey, R. Dojen, and R. Gyorodi (2009) Security protocol design: A case study using key distribution protocols. Journal of Computer Science and Control Systems, vol. 2 (2), pp. 16-21.","journal-title":"Journal of Computer Science and Control Systems"},{"key":"e_1_3_2_1_36_1","first-page":"42","article-title":"Analysis of a key-establishment security protocol","author":"Jurcut A.","year":"2008","unstructured":"A. Jurcut , T. Coffey , R. Dojen , and R. Gyorodi ( 2008 ) Analysis of a key-establishment security protocol . Journal of Computer Science and Control Systems , pp. 42 - 47 . A. Jurcut, T. Coffey, R. Dojen, and R. Gyorodi (2008) Analysis of a key-establishment security protocol. Journal of Computer Science and Control Systems, pp. 42-47.","journal-title":"Journal of Computer Science and Control Systems"},{"issue":"1","key":"e_1_3_2_1_37_1","first-page":"57","article-title":"Insider threats in cybersecurity: The enemy within the gates","volume":"6","author":"Mazzarolo G.","year":"2019","unstructured":"G. Mazzarolo , A. Jurcut ( 2019 ) Insider threats in cybersecurity: The enemy within the gates . European Cybersecurity Journal , vol. 6 ( 1 ), pp. 57 \u2013 63 . G. Mazzarolo, A. Jurcut (2019) Insider threats in cybersecurity: The enemy within the gates. European Cybersecurity Journal, vol. 6(1), pp. 57\u201363.","journal-title":"European Cybersecurity Journal"},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. of IEEE Wireless Communications and Networking Conf. (WCNC).","author":"Jurcut A.","year":"2018","unstructured":"A. Jurcut , M. Liyanage , J. Chen , C. Gyorodi , and J. He ( 2018 ) On the security verification of a short message service protocol . Proc. of IEEE Wireless Communications and Networking Conf. (WCNC). A. Jurcut, M. Liyanage, J. Chen, C. Gyorodi, and J. He (2018) On the security verification of a short message service protocol. Proc. of IEEE Wireless Communications and Networking Conf. (WCNC)."}],"event":{"name":"ICNCC 2020: 2020 The 9th International Conference on Networks, Communication and Computing","acronym":"ICNCC 2020","location":"Tokyo Japan"},"container-title":["2020 The 9th International Conference on Networks, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447654.3447666","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447654.3447666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:09Z","timestamp":1750200069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447654.3447666"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,18]]},"references-count":38,"alternative-id":["10.1145\/3447654.3447666","10.1145\/3447654"],"URL":"https:\/\/doi.org\/10.1145\/3447654.3447666","relation":{},"subject":[],"published":{"date-parts":[[2020,12,18]]},"assertion":[{"value":"2021-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}