{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T10:41:35Z","timestamp":1709548895744},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2013,3,15]],"date-time":"2013-03-15T00:00:00Z","timestamp":1363305600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s00607-013-0308-2","type":"journal-article","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T23:24:51Z","timestamp":1363217091000},"page":"793-816","source":"Crossref","is-referenced-by-count":40,"title":["More efficient key-hash based fingerprint remote authentication scheme using mobile device"],"prefix":"10.1007","volume":"96","author":[{"given":"Muhammad Khurram","family":"Khan","sequence":"first","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Mridul K.","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,15]]},"reference":[{"key":"308_CR1","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport L (1981) Password authentication with insecure communication. Commun ACM 24:770\u2013772","journal-title":"Commun ACM"},{"key":"308_CR2","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/0020-0190(95)00087-S","volume":"55","author":"G Horng","year":"1995","unstructured":"Horng G (1995) Password authentication without using password table. Inf Process Lett 55:247\u2013250","journal-title":"Inf Process Lett"},{"key":"308_CR3","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/S0164-1212(98)00006-5","volume":"42","author":"JK Jan","year":"1998","unstructured":"Jan JK, Chen YY (1998) Paramita wisdom\u2019 password authentication scheme without verification tables. J Syst Softw 42:45\u201357","journal-title":"J Syst Softw"},{"key":"308_CR4","doi-asserted-by":"crossref","unstructured":"Haller NM (1995) The S\/KEY one-time password, system, RFC1760","DOI":"10.17487\/rfc1760"},{"key":"308_CR5","first-page":"12","volume":"30","author":"CJ Mitchell","year":"1996","unstructured":"Mitchell CJ, Chen l (1996) Comments on the S\/KEY user authentication scheme. ACMOSR 30:12\u201316","journal-title":"ACMOSR"},{"key":"308_CR6","first-page":"630","volume":"73\u2013D\u2013I","author":"A Shimizu","year":"1990","unstructured":"Shimizu A (1990) A dynamic password authentication method by one-way function. IEICE Trans Inf Syst 73\u2013D\u2013I:630\u2013636","journal-title":"IEICE Trans Inf Syst"},{"issue":"1","key":"308_CR7","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"MS Hwang","year":"2000","unstructured":"Hwang MS, Li LH (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28\u201330","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"308_CR8","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"HM Sun","year":"2000","unstructured":"Sun HM (2000) An efficient remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(4):958\u2013961","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"308_CR9","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"HY Chein","year":"2002","unstructured":"Chein HY, Jan JK, Tseng YM (2002) An efficient and practical solution to remote authentication: smart card. Comput Secur 21(4):372\u2013375","journal-title":"Comput Secur"},{"issue":"3","key":"308_CR10","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/S0920-5489(03)00094-1","volume":"26","author":"CL Hsu","year":"2004","unstructured":"Hsu CL (2004) Security of Chein et al.\u2019s remote user authentication scheme using smart cards. Comput Stand Interfaces 26(3):167\u2013169","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"308_CR11","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"WC Ku","year":"2004","unstructured":"Ku WC, Chen SM (2004) Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans Consum Electron 50(1):204\u2013207","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"308_CR12","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"IE Liao","year":"2006","unstructured":"Liao IE, Lee CC, Hwang MS (2006) A password authentication scheme over insecure networks. J\u00a0Comput Syst Sci 72(4):727\u2013740","journal-title":"J\u00a0Comput Syst Sci"},{"issue":"5","key":"308_CR13","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1016\/j.jcss.2007.05.001","volume":"74","author":"T Xiang","year":"2008","unstructured":"Xiang T, Wong KW, Liao X (2008) Cryptanalysis of a password authentication scheme over insecure networks. J Comput Syst Sci 74(5):657\u2013661","journal-title":"J Comput Syst Sci"},{"issue":"5","key":"308_CR14","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/j.csi.2006.11.005","volume":"29","author":"XM Wang","year":"2007","unstructured":"Wang XM, Zhang WF, Zhang JS, Khan MK (2007) Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput Stand Interfaces 29(5):507\u2013512","journal-title":"Comput Stand Interfaces"},{"issue":"3","key":"308_CR15","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"MK Khan","year":"2010","unstructured":"Khan MK, Kim SK, Alghathbar K (2010) Cryptanalysis and security enhancement of a \u2018more efficient & secure dynamic ID-based remote user authentication scheme. Comput Commun 34(3):305\u2013309","journal-title":"Comput Commun"},{"issue":"3","key":"308_CR16","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.chaos.2006.05.061","volume":"35","author":"MK Khan","year":"2008","unstructured":"Khan MK, Zhang J, Wang X (2008) Chaotic hash based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals 35(3):519\u2013524","journal-title":"Chaos, Solitons & Fractals"},{"key":"308_CR17","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1002\/dac.1277","volume":"25","author":"CL Chen","year":"2012","unstructured":"Chen CL, Lee CC, Hsu CY (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25:585\u2013597. doi: 10.1002\/dac.1277","journal-title":"Int J Commun Syst"},{"key":"308_CR18","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"JK Lee","year":"2002","unstructured":"Lee JK, Ryu SR, Yoo KY (2002) Fingerprint based remote user authentication scheme using smart cards. Electron Lett 38:554\u2013555","journal-title":"Electron Lett"},{"issue":"1","key":"308_CR19","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"CH Lin","year":"2004","unstructured":"Lin CH, Lai YY (2004) A flexible biometrics remote user authentication scheme. Comput Stand Interfaces 27(1):19\u201323","journal-title":"Comput Stand Interfaces"},{"key":"308_CR20","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.csi.2006.01.002","volume":"29","author":"MK Khan","year":"2007","unstructured":"Khan MK, Zhang J (2007) Improving the security of \u2018a flexible biometrics remote user authentication scheme\u2019. Comput Stand Interfaces 29:82\u201385","journal-title":"Comput Stand Interfaces"},{"key":"308_CR21","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/s11859-010-0318-2","volume":"15","author":"J Yuan","year":"2010","unstructured":"Yuan J, Jiang C, Jiang Z (2010) A biometric-based user authentication for wireless sensor networks. Wuhan Univ J Nat Sci 15:272\u2013276. doi: 10.1007\/s11859-010-0318-2","journal-title":"Wuhan Univ J Nat Sci"},{"issue":"1","key":"308_CR22","doi-asserted-by":"crossref","first-page":"60","DOI":"10.2478\/s13537-012-0003-y","volume":"2","author":"K Saru","year":"2012","unstructured":"Saru K, Gupta MK, Kumar M (2012) Cryptanalysis and security enhancement of Chen et al.\u2019s remote user authentication scheme using smart card. Cent Eur J Comput Sci 2(1):60\u201375","journal-title":"Cent Eur J Comput Sci"},{"issue":"3","key":"308_CR23","first-page":"73","volume":"2","author":"J Xu","year":"2008","unstructured":"Xu J, Zhu WT, Feng DG (2008) Improvement of a fingerprint-based remote user authentication scheme. Int J Secur Appl 2(3):73\u201380","journal-title":"Int J Secur Appl"},{"issue":"3","key":"308_CR24","first-page":"21","volume":"4","author":"Y An","year":"2012","unstructured":"An Y (2012) Security weaknesses of a biometric-based remote user authentication scheme using smart cards. Int J Biosci Biotechnol 4(3):21\u201328","journal-title":"Int J Biosci Biotechnol"},{"issue":"4","key":"308_CR25","first-page":"1","volume":"5","author":"D Wang","year":"2011","unstructured":"Wang D, Li J (2011) A novel mutual authentication scheme based on fingerprint biometric and nonce using smart cards. Int J Secur Appl 5(4):1\u201312","journal-title":"Int J Secur Appl"},{"key":"308_CR26","doi-asserted-by":"crossref","unstructured":"Truong TT, Tran MT, Duong AD (2012) Robust mobile device integration of a fingerprint biometric remote authentication scheme. In: Proceedings of 26th IEEE International Conference on Advanced Information Networking and Applications, pp 678\u2013685","DOI":"10.1109\/AINA.2012.47"},{"key":"308_CR27","doi-asserted-by":"crossref","unstructured":"Khan MK, Kumari S, Gupta MK (2012) Further cryptanalysis of \u2018a remote authentication scheme using mobile device\u2019. In: Fourth International Conference on Computational Aspects of Social Networks (CASoN), pp 234\u2013237","DOI":"10.1109\/CASoN.2012.6412408"},{"issue":"1","key":"308_CR28","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.csi.2007.11.017","volume":"31","author":"HS Rhee","year":"2009","unstructured":"Rhee HS, Kwon JO, Lee DH (2009) A remote user authentication scheme without using smart cards. Comput Stand Interfaces 31(1):6\u201313","journal-title":"Comput Stand Interfaces"},{"key":"308_CR29","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of Advances in Cryptology, Santa Barbara, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"308_CR30","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"issue":"9","key":"308_CR31","first-page":"967","volume":"49","author":"SM Yen","year":"2002","unstructured":"Yen SM, Joye M (2002) Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans Comput 49(9):967\u2013970","journal-title":"IEEE Trans Comput"},{"key":"308_CR32","doi-asserted-by":"crossref","unstructured":"Kumar M, Gupta MK, Saru K (2011) Cryptanalysis of enhancements of a password authentication scheme over insecure networks. In: Proceedings of 4th International Conference on Contemporary Computing (IC3) (JIIT Noida), vol 168, pp 524\u2013532","DOI":"10.1007\/978-3-642-22606-9_51"},{"key":"308_CR33","unstructured":"Gao ZX, Tu YQ (2008) An Improvement of a dynamic ID-based remote user authentication scheme with smart card. In: Proceedings of the 7th World Congress on Intelligent Control and Automation, pp\u00a04562\u20134567"},{"issue":"6","key":"308_CR34","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1016\/j.comcom.2008.12.023","volume":"32","author":"DZ Sun","year":"2009","unstructured":"Sun DZ, Huai JP, Sun JZ, Li JX (2009) Cryptanalysis of a mutual authentication scheme based on nonce and smart cards. Comput Commun 32(6):1015\u20131017","journal-title":"Comput Commun"},{"issue":"3","key":"308_CR35","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G Lowe","year":"1995","unstructured":"Lowe G (1995) An attack on the Needham\u2013Schroeder public key authentication protocol. Inf Process Lett 56(3):131\u2013136","journal-title":"Inf Process Lett"},{"key":"308_CR36","unstructured":"Lowe G (1996) Some new attacks upon security protocols. In: Proceedings of Computer Security Foundations Workshop VIII, IEEE Computer Society Press, Los Alamitos"},{"issue":"1","key":"308_CR37","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1093\/ietfec\/e90-a.1.299","volume":"90","author":"J Nam","year":"2007","unstructured":"Nam J, Kim S, Park S, Won D (2007) Security analysis of a nonce-based user authentication scheme using smart cards. IEICE Trans Fundam 90(1):299\u2013302","journal-title":"IEICE Trans Fundam"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0308-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-013-0308-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0308-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T19:54:21Z","timestamp":1562788461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-013-0308-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,15]]},"references-count":37,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["308"],"URL":"https:\/\/doi.org\/10.1007\/s00607-013-0308-2","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,15]]}}}