{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:38Z","timestamp":1738777238792,"version":"3.37.0"},"reference-count":11,"publisher":"Academy Publisher","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.01.198-203","type":"journal-article","created":{"date-parts":[[2014,1,4]],"date-time":"2014-01-04T01:10:09Z","timestamp":1388797809000},"source":"Crossref","is-referenced-by-count":11,"title":["Security Analysis and Improvement of User Authentication Framework for Cloud Computing"],"prefix":"10.4304","volume":"9","author":[{"given":"Nan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Rui","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,1,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/30.826377"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00415-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2004.1277863"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/el:19890801"},{"issue":"5","key":"ref6","first-page":"1682","article-title":"Cryptanalysis of a variant of Peyravian\u2013Zunic's password authentication scheme. IEICE Transactions on Communication","volume":"86-B","author":"Ku","year":"2003","unstructured":"[8] W. C. Ku, C. M. Chen, H. L. Lee. Cryptanalysis of a variant of Peyravian\u2013Zunic's password authentication scheme. IEICE Transactions on Communication, 2003, E86-B(5) pp. 1682\u20131684.","journal-title":"E","ISSN":"https:\/\/id.crossref.org\/issn\/1046-8021","issn-type":"print"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.12.022"},{"issue":"3","key":"ref8","first-page":"236","article-title":"Cheng-Chi Lee. A robust remote user authentication scheme using smart card.","volume":"40","year":"2011","unstructured":"[10] Chun-Ta Li, Cheng-Chi Lee. A robust remote user authentication scheme using smart card. Information Technology and Control, 2011, 40(3) pp. 236-240.","journal-title":"Information Technology and Control"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.11.019"},{"key":"ref10","first-page":"110","volume-title":"Pardeep Kumar et al A strong user authentication framework for cloud computing","year":"2011","unstructured":"[12] Amlan Jyoti Choudhury, Pardeep Kumar, et al. A strong user authentication framework for cloud computing. [C]\/\/ 2011 IEEE Asia-Pacific Services Computing Conference. Jeju Island, 2011 pp. 110-115."},{"volume-title":"Szu yu Lin Enhancing the security of out-of-band one-time password two factor authentication in cloud computing","year":"2010","key":"ref11","unstructured":"[13] Szu yu Lin. Enhancing the security of out-of-band one-time password two factor authentication in cloud computing. Taiwan: National Taiwan University of Science and Technology, 2010"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:04:37Z","timestamp":1738775077000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":11,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2014,1,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.01.198-203","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,1,1]]}}}