{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:20Z","timestamp":1725808400361},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_80","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T11:09:45Z","timestamp":1414753785000},"page":"721-728","source":"Crossref","is-referenced-by-count":0,"title":["Remote Login Password Authentication Scheme Using Tangent Theorem on Circle"],"prefix":"10.1007","author":[{"given":"Shipra","family":"Kumari","sequence":"first","affiliation":[]},{"given":"Hari","family":"Om","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"80_CR1","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with in secure communication. Communications of the ACM\u00a024(11), 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"issue":"4","key":"80_CR2","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/S0140-3664(98)00215-1","volume":"22","author":"K. Tan","year":"1999","unstructured":"Tan, K., Zhu, H.: Remote password authentication scheme based on cross-product. Computer Communications\u00a022(4), 390\u2013393 (1999)","journal-title":"Computer Communications"},{"issue":"6","key":"80_CR3","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TCOM.1981.1095067","volume":"29","author":"R.E. Lemon","year":"1981","unstructured":"Lemon, R.E., Matyas, S.M., Meyer, C.H.: Cryptographic Authentication of Time-Invariant Quantities. IEEE Trans. on Communications\u00a029(6), 773\u2013777 (1981)","journal-title":"IEEE Trans. on Communications"},{"issue":"3","key":"80_CR4","first-page":"165","volume":"138","author":"C.C. Chang","year":"1993","unstructured":"Chang, C.C., Wu, T.C.: Remote password authentication with smart cards. IEE Proceedings-E\u00a0138(3), 165\u2013168 (1993)","journal-title":"IEE Proceedings-E"},{"issue":"5","key":"80_CR5","first-page":"619","volume":"7","author":"W.B. Horng","year":"2010","unstructured":"Horng, W.B., Lee, C.P., Peng, J.: A secure remote authentication scheme preserving user anonymity with non-tamper resistant smart cards. WSEAS Transactions on Information Science and Applications\u00a07(5), 619\u2013628 (2010)","journal-title":"WSEAS Transactions on Information Science and Applications"},{"key":"80_CR6","doi-asserted-by":"crossref","unstructured":"Li, C.T., Lee, C.C., Liu, C.J., Lee, C.W.: Cryptanalysis of Khan et al. dynamic ID based remote user authentication scheme, pp. 1382\u20131387. IEEE (2010)","DOI":"10.1109\/ISDA.2010.5687103"},{"issue":"4","key":"80_CR7","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/TCE.2003.1261225","volume":"49","author":"A.K. Awasthi","year":"2003","unstructured":"Awasthi, A.K., Lal, S.: A remote user authentication scheme using smart cards with forward security. IEEE Transactions on Consumer Electronics\u00a049(4), 1246\u20131248 (2003)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"80_CR8","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J. Xu","year":"2009","unstructured":"Xu, J., Zhu, W.T., Feng, D.G.: An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces\u00a031(4), 723\u2013728 (2009)","journal-title":"Computer Standards and Interfaces"},{"issue":"2","key":"80_CR9","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"M.L. Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P.: A dynamic ID-based remote user authentication scheme. IEEE Transactions on Consumer Electronics\u00a050(2), 629\u2013631 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"4","key":"80_CR10","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"Y. Wang","year":"2009","unstructured":"Wang, Y., Liu, J., Xiao, F., Dan, J.: A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications\u00a032(4), 583\u2013585 (2009)","journal-title":"Computer Communications"},{"issue":"2","key":"80_CR11","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.compeleceng.2011.11.010","volume":"38","author":"F. Wen","year":"2012","unstructured":"Wen, F., Li, X.: An improved dynamic ID-based remote user authentication with key agreement scheme. Computers and Electrical Engineering\u00a038(2), 381\u2013387 (2012)","journal-title":"Computers and Electrical Engineering"},{"key":"80_CR12","doi-asserted-by":"crossref","unstructured":"Qu, J., Zou, L.: An Improved Dynamic ID-Based Remote User Authentication with Key Agreement Scheme. Journal of Electrical and Computer Engineering\u00a02013(2013), Article ID 786587 (2013)","DOI":"10.1155\/2013\/786587"},{"key":"80_CR13","doi-asserted-by":"crossref","unstructured":"Liaw, H.T.: Password authentication using Triangle and Straight lines 30(4), 63\u201371 (1995)","DOI":"10.1016\/0898-1221(95)00147-Q"},{"issue":"2","key":"80_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1080\/0161-119591883872","volume":"19","author":"H.T. Liaw","year":"1995","unstructured":"Liaw, H.T., Lei, C.L.: An efficient password authentication scheme based on a unit circle. Cryptologia\u00a019(2), 198\u2013208 (1995)","journal-title":"Cryptologia"},{"key":"80_CR15","doi-asserted-by":"crossref","unstructured":"Wang, S.J.: Remote table based log-in authentication upon geometric triangle\u00a026(2), 85\u201392 (2004)","DOI":"10.1016\/S0920-5489(03)00064-3"},{"issue":"2","key":"80_CR16","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TCE.2003.1209522","volume":"49","author":"S.J. Wang","year":"2003","unstructured":"Wang, S.J.: Yet Another Log-in Authentication Using N-dimensional Construction Based on Circle Property. IEEE Transactions on Consumer Electronics\u00a049(2), 337\u2013341 (2003)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"80_CR17","doi-asserted-by":"crossref","unstructured":"Wang, S., Bao, F., Wang, J.: Comments on Yet Another Log-in Authentication Using N-dimensional Construction. IEEE Transactions on Consumer Electronics\u00a050(2) (2004)","DOI":"10.1109\/TCE.2004.1309435"},{"key":"80_CR18","unstructured":"Kumar, M., Gupta, M., Kumari, S.: A remote login authentication scheme with smart cards based on unit sphere\u00a01(3), 192\u2013198 (2010)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T23:50:15Z","timestamp":1675813815000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_80","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}