{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T20:59:45Z","timestamp":1724705985985},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2013,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Decentralization in every walk of life has resulted in the development of Global Grid networking. Data sharing and access depends on their availability, capability, cost and user requirements. One of the needs for a secure Grid Environment is a strong authentication for users. Since Authentication is the entry point into every network, a novel smart card based authentication scheme has been proposed. The proposed authentication scheme utilizes the biometric data embedded in a smart card along with the ID and password of the user. The Time efficient performance of the proposed scheme in comparison with the existing Secure Socket Layer based authentication scheme is discussed. The attacks which the proposed scheme is able to withstand are also discussed.<\/jats:p>","DOI":"10.1186\/2192-1962-3-16","type":"journal-article","created":{"date-parts":[[2013,9,22]],"date-time":"2013-09-22T07:10:13Z","timestamp":1379833813000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Smart card based time efficient authentication scheme for global grid computing"],"prefix":"10.1186","volume":"3","author":[{"given":"Jaspher Willsie Kathrine","family":"Gnanaraj","sequence":"first","affiliation":[]},{"given":"Kirubakaran","family":"Ezra","sequence":"additional","affiliation":[]},{"given":"Elijah Blessing","family":"Rajsingh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,22]]},"reference":[{"issue":"6","key":"41_CR1","first-page":"1","volume":"1","author":"I Foster","year":"2002","unstructured":"Foster I: A three point checklist. GridToday 2002, 1(6):1\u20134. July publication","journal-title":"GridToday"},{"issue":"3","key":"41_CR2","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I Foster","year":"2001","unstructured":"Foster I, Kesselman C, Tuecke S: The anatomy of the grid: enabling scalable virtual organizations. Int J High Perform Comput Appl 2001, 15(3):200\u2013222. 10.1177\/109434200101500302","journal-title":"Int J High Perform Comput Appl"},{"key":"41_CR3","first-page":"89","volume-title":"A scalable security architecture for grid","author":"Q Zhou","year":"2005","unstructured":"Zhou Q, Yang G, Shen J, Rong C Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies. A scalable security architecture for grid 2005, 89\u201393."},{"key":"41_CR4","first-page":"535","volume-title":"Grid computing security mechanisms: state-of-the-art","author":"Bendahmane","year":"2009","unstructured":"Bendahmane , Essaaidi M, El Moussaoui A, Younes A International Conference on Multimedia Computing and systems ICMS \u201909. Grid computing security mechanisms: state-of-the-art 2009, 535\u2013540."},{"key":"41_CR5","volume-title":"Globus toolkit version 4 grid security infrastructure: a standards perspective","author":"W Von","year":"2005","unstructured":"Von W: Globus toolkit version 4 grid security infrastructure: a standards perspective. 2005. Available at: , Accessed: January 2011 http:\/\/www.globus.org\/toolkit\/docs\/4.0\/security\/GT4-GSI-Overview.pdf"},{"key":"41_CR6","first-page":"1","volume":"613","author":"J Almond","year":"1999","unstructured":"Almond J, Snelling D: UNICORE: uniform access to supercomputing as an element of electronic commerce. Future Generat Comput Syst 1999, 613: 1\u201310.","journal-title":"Future Generat Comput Syst"},{"issue":"1","key":"41_CR7","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/242857.242867","volume":"40","author":"S Andrew","year":"1997","unstructured":"Andrew S, Grimshaw W, Wulf A: The legion vision of a worldwide virtual computer. Commun ACM 1997, 40(1):39\u201345. 10.1145\/242857.242867","journal-title":"Commun ACM"},{"key":"41_CR8","first-page":"19","volume-title":"The gridbus toolkit for service oriented grid and utility computing: an overview and status report","author":"R Buyya","year":"2004","unstructured":"Buyya R, Venugopal S Proceedings of the first IEEE International Workshop on Grid Economics and Business Models. The gridbus toolkit for service oriented grid and utility computing: an overview and status report 2004, 19\u201366. ISBN 0\u20137803\u20138525-X ISBN 0-7803-8525-X"},{"issue":"5","key":"41_CR9","first-page":"13","volume":"30","author":"G Jaspher Willsie Kathrine","year":"2011","unstructured":"Jaspher Willsie Kathrine G, Kirubakaran E: Four-factor based privacy preserving biometric authentication and authorization scheme for enhancing grid security. Int J Comput Appl 2011, 30(5):13\u201320.","journal-title":"Int J Comput Appl"},{"issue":"11","key":"41_CR10","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport L: Password authentication with insecure communication. Comm ACM 1981, 24(11):770\u2013772. 10.1145\/358790.358797","journal-title":"Comm ACM"},{"key":"41_CR11","first-page":"429","volume":"1","author":"T Hwang","year":"1990","unstructured":"Hwang T, Chen Y, Laih CS: Non-interactive password authentication without password tables. IEEE Conference on Computer and Communication Systems 1990, 1: 429\u2013431.","journal-title":"IEEE Conference on Computer and Communication Systems"},{"issue":"12","key":"41_CR12","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"JK Lee","year":"2002","unstructured":"Lee JK, Ryu SR, Yoo KY: Fingerprint-based remote user authentication scheme using smart cards. Electron Lett 2002, 38(12):554\u2013555. 10.1049\/el:20020380","journal-title":"Electron Lett"},{"issue":"4","key":"41_CR13","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1031154.1031165","volume":"38","author":"CC Chang","year":"2004","unstructured":"Chang CC, Lin IC: Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Operating System Rev 2004, 38(4):91\u201396. 10.1145\/1031154.1031165","journal-title":"ACM SIGOPS Operating System Rev"},{"issue":"1","key":"41_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"CH Lin","year":"2004","unstructured":"Lin CH, Lai YY: A flexible biometrics remote user authentication scheme. Comput Stand Interfac 2004, 27(1):19\u201323. 10.1016\/j.csi.2004.03.003","journal-title":"Comput Stand Interfac"},{"issue":"6","key":"41_CR15","first-page":"948","volume":"92","author":"U Uludag","year":"2004","unstructured":"Uludag U, Pankanti S, Prabhakar S, Jain AK: Biometric cryptosystems: issues and challenges. Proc IEEE Special Issue on Multimedia Security for Digital Rights Management 2004, 92(6):948\u2013960.","journal-title":"Proc IEEE Special Issue on Multimedia Security for Digital Rights Management"},{"key":"41_CR16","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume":"3027","author":"Y Dodis","year":"2004","unstructured":"Dodis Y, Ostrovsky R, Reyzin L, Smith A: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Advances in cryptology-eurocrypt 2004. Lect Notes Comput Sci 2004, 3027: 523\u2013540. 10.1007\/978-3-540-24676-3_31","journal-title":"Lect Notes Comput Sci"},{"key":"41_CR17","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/319709.319714","volume-title":"Proceedings of the 6th ACM Conference on Computer and Communications Security","author":"A Juels","year":"1999","unstructured":"Juels A, Wattenberg M: A fuzzy commitment scheme. Proceedings of the 6th ACM Conference on Computer and Communications Security 1999, 28\u201336."},{"issue":"3","key":"41_CR18","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1109\/TIFS.2007.902022","volume":"2","author":"Y Sutcu","year":"2007","unstructured":"Sutcu Y, Li Q, Memon N: Protecting biometric templates with sketch: theory and practice. IEEE Transactions on Information Forensics and Security 2007, 2(3):503\u2013512.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"41_CR19","first-page":"2519","volume":"E85-B","author":"CM Chen","year":"2002","unstructured":"Chen CM, Ku WC: Stolen-verifier attack on two new strong-password authentication protocol. IEICE Transactions on Communications 2002, E85-B(11):2519\u20132521.","journal-title":"IEICE Transactions on Communications"},{"issue":"4","key":"41_CR20","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1109\/TIFS.2009.2031942","volume":"4","author":"C-I Fan","year":"2009","unstructured":"Fan C-I, Lin Y-H: Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Transactions on Information Forensic and Security 2009, 4(4):933\u2013945.","journal-title":"IEEE Transactions on Information Forensic and Security"},{"key":"41_CR21","volume-title":"Four-factor authentication","author":"DD Trammell","year":"2008","unstructured":"Trammell DD: Four-factor authentication. 2008. Available at: , Accessed: January 2011 http:\/\/blog.dustintrammell.com\/2008\/11\/21\/four-factor-authentication\/#more-160"},{"key":"41_CR22","unstructured":"Foster I, et al.: The open grid services architecture, version 1.5. Available at: , 2006, Accessed: January 2011 http:\/\/www.ogf.org\/documents\/GFD.80.pdf"},{"key":"41_CR23","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.future.2004.10.006","volume":"21","author":"R Alfieria","year":"2005","unstructured":"Alfieria R, et al.: From gridmap-file to VOMS: managing authorization in a grid environment. Futur Gener Comput Syst 2005, 21: 549\u2013558. 10.1016\/j.future.2004.10.006","journal-title":"Futur Gener Comput Syst"},{"key":"41_CR24","volume-title":"Comparison of ciphers","author":"N Coffey","year":"2012","unstructured":"Coffey N: Comparison of ciphers. 2012. Available at: , Accessed: January 2012 http:\/\/www.javamex.com\/tutorials\/cryptography\/ciphers.shtml"},{"issue":"6","key":"41_CR25","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MC.2002.1009167","volume":"35","author":"I Foster","year":"2002","unstructured":"Foster I, Kesselman C, Nick JM, Tuecke S: Grid services for distributed system integration. Journal Computer 2002, 35(6):37\u201346. 10.1109\/MC.2002.1009167","journal-title":"Journal Computer"},{"key":"41_CR26","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4132","volume-title":"Addition of camellia cipher suites to transport layer security","author":"S Moriai","year":"2005","unstructured":"Moriai S, Kato A, Kanda M: Addition of camellia cipher suites to transport layer security. 2005. Available at: , Accessed: January 2012 http:\/\/tools.ietf.org\/pdf\/rfc4132.pdf"},{"issue":"1","key":"41_CR27","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/130704.130709","volume":"26","author":"L Gong","year":"1991","unstructured":"Gong L: Security risk of depending on synchronized clocks. ACM Operating System Review 1991, 26(1):49\u201353.","journal-title":"ACM Operating System Review"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/2192-1962-3-16.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T01:54:54Z","timestamp":1630547694000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/2192-1962-3-16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,22]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["41"],"URL":"https:\/\/doi.org\/10.1186\/2192-1962-3-16","relation":{},"ISSN":["2192-1962"],"issn-type":[{"value":"2192-1962","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,22]]},"assertion":[{"value":"25 April 2012","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2013","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2013","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"16"}}