{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T10:40:35Z","timestamp":1769164835647,"version":"3.49.0"},"reference-count":18,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Applied Mathematics"],"published-print":{"date-parts":[[2014]]},"abstract":"<jats:p>Recently, a password authentication and update scheme has been presented by Islam and Biswas to remove the security weaknesses in Lin and Huang\u2019s scheme. Unfortunately, He et al., Wang et al., and Li have found out that Islam and Biswas\u2019 improvement was vulnerable to offline password guessing attack, stolen verifier attack, privilege insider attack, and denial of service attack. In this paper, we further analyze Islam and Biswas\u2019 scheme and demonstrate that their scheme cannot resist password compromise impersonation attack. In order to remedy the weaknesses mentioned above, we propose an improved anonymous remote authentication scheme using smart card without using bilinear paring computation. In addition, the verifier tables are no longer existent, and the privacy of users could be protected better. Furthermore, our proposal not only inherits the advantages in Islam and Biswas\u2019 scheme, but also provides more features, including preserving user anonymity, supporting offline password change, revocation, reregistration with the same identifier, and system update. Finally, we compare our enhancement with related works to illustrate that the improvement is more secure and robust, while maintaining low performance cost.<\/jats:p>","DOI":"10.1155\/2014\/247836","type":"journal-article","created":{"date-parts":[[2014,4,15]],"date-time":"2014-04-15T17:02:30Z","timestamp":1397581350000},"page":"1-11","source":"Crossref","is-referenced-by-count":11,"title":["Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography"],"prefix":"10.1155","volume":"2014","author":[{"given":"Lili","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Computer Science, Dezhou University, Dezhou 253023, China"}]}],"member":"98","reference":[{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"issue":"1","key":"12","first-page":"64","volume":"15","year":"2013","journal-title":"International Journal of Network Security"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)05032-X"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2005.10.001"},{"issue":"4","key":"6","first-page":"823","volume":"85","year":"2002","journal-title":"IEICE Transactions on Communications"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00114-7"},{"issue":"3","key":"20","first-page":"156","volume":"14","year":"2012","journal-title":"International Journal of Network Security"},{"issue":"3","key":"10","first-page":"167","volume":"13","year":"2011","journal-title":"International Journal of Network Security"},{"issue":"3","key":"17","first-page":"180","volume":"14","year":"2012","journal-title":"International Journal of Network Security"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.07.001"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34062-8_24"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0058"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01877-0_7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_20"},{"issue":"4, article 28","key":"3","volume":"14","year":"2011","journal-title":"ACM Transactions on Information and System Security"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18"},{"key":"4","year":"2004"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.2307\/2007884"}],"container-title":["Journal of Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2014\/247836.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2014\/247836.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jam\/2014\/247836.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T13:09:26Z","timestamp":1469711366000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/jam\/2014\/247836\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":18,"alternative-id":["247836","247836"],"URL":"https:\/\/doi.org\/10.1155\/2014\/247836","relation":{},"ISSN":["1110-757X","1687-0042"],"issn-type":[{"value":"1110-757X","type":"print"},{"value":"1687-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}