{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T20:11:23Z","timestamp":1696623083108},"reference-count":0,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,3,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Recently (2011) Chen et al. found that Wang et al.\u2019s scheme (2007) is vulnerable to impersonation attacks and parallel session attacks; and then proposed a security enhancement of Wang et al.\u2019s scheme. Chen et al. claimed to inherit the merits and eradicate the flaws of the original scheme through their improved scheme. Unfortunately, we found that Chen et al.\u2019s scheme inherits some flaws of the original scheme, like the known-key attack, smart card loss attack and its serious consequences. In addition, Chen et al.\u2019s scheme is not easily reparable and is unable to provide forward secrecy. Thus Chen et al.\u2019s scheme still has scope for security enhancement. Finally, we propose an improved scheme with better security strength. Moreover, we analyze the performance of our scheme and prove that ours is suitable for applications with high security requirements.<\/jats:p>","DOI":"10.2478\/s13537-012-0003-y","type":"journal-article","created":{"date-parts":[[2012,3,27]],"date-time":"2012-03-27T03:54:41Z","timestamp":1332820481000},"page":"60-75","source":"Crossref","is-referenced-by-count":22,"title":["Cryptanalysis and security enhancement of Chen et al.\u2019s remote user authentication scheme using smart card"],"prefix":"10.2478","volume":"2","author":[{"given":"Saru","family":"Kumari","sequence":"first","affiliation":[{"name":"Department of Mathematics, Agra College, Agra, 282004, Uttar Pradesh, India"}]},{"given":"Mridul","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Chaudhary Charan Singh University, Meerut, Uttar Pradesh, India"}]},{"given":"Manoj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Mathematics, R. K. College, Shamli (Muzaffarnagar), Uttar Pradesh, India"}]}],"member":"374","published-online":{"date-parts":[[2012,3,28]]},"container-title":["Open Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.2478\/s13537-012-0003-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.2478\/s13537-012-0003-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.2478\/s13537-012-0003-y\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.2478\/s13537-012-0003-y\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T08:29:59Z","timestamp":1651048199000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.2478\/s13537-012-0003-y\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,1]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2012,3,28]]},"published-print":{"date-parts":[[2012,3,1]]}},"alternative-id":["10.2478\/s13537-012-0003-y"],"URL":"https:\/\/doi.org\/10.2478\/s13537-012-0003-y","relation":{},"ISSN":["2299-1093"],"issn-type":[{"value":"2299-1093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3,1]]}}}