{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:51:18Z","timestamp":1762005078622,"version":"3.40.5"},"reference-count":52,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61372172"],"award-info":[{"award-number":["61372172"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1177\/1550147719842152","type":"journal-article","created":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T18:00:32Z","timestamp":1555524032000},"page":"155014771984215","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps"],"prefix":"10.1177","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6985-6147","authenticated-orcid":false,"given":"Yan","family":"Zhao","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"},{"name":"School of Physics and Electronic Information, Luoyang Normal University, Luoyang, China"}]},{"given":"Shiming","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Information Engineering, Harbin Normal University, Harbin, China"}]},{"given":"Liehui","family":"Jiang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]},{"given":"Tieming","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"}]}],"member":"179","published-online":{"date-parts":[[2019,4,17]]},"reference":[{"key":"bibr1-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.09.002"},{"key":"bibr2-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0335-0"},{"issue":"10","key":"bibr3-1550147719842152","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1002\/sec.767","volume":"7","author":"Li X","year":"2014","journal-title":"Secur Commun Netw"},{"key":"bibr4-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1145\/1027794.1027800"},{"key":"bibr5-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/730831"},{"key":"bibr6-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"issue":"6","key":"bibr7-1550147719842152","first-page":"1363","volume":"83","author":"Sandirigama M","year":"2000","journal-title":"IEICE T Commun"},{"key":"bibr8-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(99)80136-9"},{"key":"bibr9-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1109\/30.826377"},{"key":"bibr10-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.007"},{"key":"bibr11-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1636-z"},{"key":"bibr12-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.07.004"},{"key":"bibr13-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt.2014.0196"},{"key":"bibr14-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355850"},{"key":"bibr15-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.04.016"},{"key":"bibr16-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.11.018"},{"key":"bibr17-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"bibr18-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0125"},{"key":"bibr19-1550147719842152","first-page":"519723","volume":"2012","author":"An Y.","year":"2012","journal-title":"Biomed Res Int"},{"key":"bibr20-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/491289"},{"key":"bibr21-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1010"},{"key":"bibr22-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2011.0348"},{"key":"bibr23-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.015"},{"key":"bibr24-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717724308."},{"key":"bibr25-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1109\/81.904880"},{"key":"bibr26-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1018-1"},{"key":"bibr27-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-013-0346-9"},{"key":"bibr28-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2467-5"},{"key":"bibr29-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20542-2"},{"key":"bibr30-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2004.04.011"},{"key":"bibr31-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.05.030"},{"key":"bibr32-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.07.004"},{"key":"bibr33-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.004"},{"key":"bibr34-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2673239"},{"first-page":"388","volume-title":"Advances in cryptology\u2014CRYPTO\u201999: 19th annual international cryptology conference, Santa Barbara, California, USA, August 15-19, 1999 proceedings","author":"Kocher P","key":"bibr35-1550147719842152"},{"key":"bibr36-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"},{"key":"bibr37-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.001"},{"issue":"9","key":"bibr38-1550147719842152","first-page":"4508","volume":"10","author":"Kumari S","year":"2016","journal-title":"KSII T Internet Inf"},{"first-page":"453","volume-title":"Proceedings of the international conference on the theory and applications of cryptographic techniques: advances in cryptology (EUROCRYPT\u201901)","author":"Canetti R","key":"bibr39-1550147719842152"},{"key":"bibr40-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2915"},{"issue":"3","key":"bibr41-1550147719842152","first-page":"1900","volume":"9","author":"Odelu V","year":"2018","journal-title":"IEEE T Smart Grid"},{"key":"bibr42-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0153870"},{"key":"bibr43-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0181744"},{"key":"bibr44-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1177\/155014772174720."},{"key":"bibr45-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2017.7961369"},{"key":"bibr46-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3323"},{"first-page":"831","volume-title":"Proceedings of the IEEE INFOCOM 2018 \u2013 IEEE conference on computer communications workshops (INFOCOM WKSHPS)","author":"Sun J","key":"bibr47-1550147719842152"},{"key":"bibr48-1550147719842152","first-page":"95","volume":"42","author":"Sharma G","year":"2018","journal-title":"J Inform Secur Appl"},{"key":"bibr49-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.12.008"},{"key":"bibr50-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.008"},{"key":"bibr51-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2721-7"},{"key":"bibr52-1550147719842152","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1948-z"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719842152","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147719842152","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147719842152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T21:01:28Z","timestamp":1694811688000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147719842152"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":52,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2019,4,17]]},"published-print":{"date-parts":[[2019,4]]}},"alternative-id":["10.1177\/1550147719842152"],"URL":"https:\/\/doi.org\/10.1177\/1550147719842152","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2019,4]]}}}