{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:46:27Z","timestamp":1762875987616,"version":"3.37.3"},"reference-count":48,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018]]},"abstract":"<jats:p>The rapid development of information and network technologies motivates the emergence of various new computing paradigms, such as distributed computing, cloud computing, and edge computing. This also enables more and more network enterprises to provide multiple different services simultaneously. To ensure these services can only be accessed conveniently by authorized users, many password and smart card based authentication schemes for multiserver architecture have been proposed. Recently, Truong et al. introduced an identity based user authentication scheme on elliptic curve cryptography in multiserver environment and claimed that their scheme is secure against popular attacks. However, in this paper, we point out that their scheme suffers from offline password guessing and impersonation attack and fails to achieve security requirements of this kind of authentication scheme. Moreover, we put forward a new scheme to conquer security pitfalls in the above scheme. Security analysis indicates that the proposed scheme can be free from well-known attacks. Performance discussion demonstrates that our scheme has advantages in terms of both security property and computation efficiency and thus is more desirable for practical applications in multiserver environment.<\/jats:p>","DOI":"10.1155\/2018\/9178941","type":"journal-article","created":{"date-parts":[[2018,5,20]],"date-time":"2018-05-20T19:32:23Z","timestamp":1526844743000},"page":"1-13","source":"Crossref","is-referenced-by-count":29,"title":["Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6985-6147","authenticated-orcid":true,"given":"Yan","family":"Zhao","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou 450002, China"},{"name":"College of Physical and Electronic Information, Luoyang Normal University, Luoyang 471022, China"}]},{"given":"Shiming","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Information Engineering, Harbin Normal University, Harbin 150025, China"}]},{"given":"Liehui","family":"Jiang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematic Engineering and Advanced Computing, Zhengzhou 450002, China"}]}],"member":"311","reference":[{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2573746"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_14"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.01.001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1273-z"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-0772-4"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-0161-2"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355850"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010518"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.11.018"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.04.016"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1610-x"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.001"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1948-z"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-3961-5"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1049\/ip-e.1991.0022"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1309441"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.008"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.07.062"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.011"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2644"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.12.008"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0409-0"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2016.09.026"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9835-1"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/72.963786"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(02)00093-6"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1277870"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e88-a.11.3235"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.007"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.11.002"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.11.011"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1636-z"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2002-x"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2721-7"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.07.004"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1039-6"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2439964"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2301517"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.004"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2764-z"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4390-x"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5989151"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.11.009"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt.2014.0196"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/9178941.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/9178941.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/9178941.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,20]],"date-time":"2018-05-20T19:32:25Z","timestamp":1526844745000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/9178941\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":48,"alternative-id":["9178941","9178941"],"URL":"https:\/\/doi.org\/10.1155\/2018\/9178941","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018]]}}}