{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:04:43Z","timestamp":1771700683026,"version":"3.50.1"},"reference-count":16,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2006,7,1]],"date-time":"2006-07-01T00:00:00Z","timestamp":1151712000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,8,22]],"date-time":"2013-08-22T00:00:00Z","timestamp":1377129600000},"content-version":"vor","delay-in-days":2609,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mathematical and Computer Modelling"],"published-print":{"date-parts":[[2006,7]]},"DOI":"10.1016\/j.mcm.2006.01.015","type":"journal-article","created":{"date-parts":[[2006,2,25]],"date-time":"2006-02-25T07:16:16Z","timestamp":1140851776000},"page":"223-228","source":"Crossref","is-referenced-by-count":27,"title":["An efficient and complete remote user authentication scheme using smart cards"],"prefix":"10.1016","volume":"44","author":[{"given":"Horng-Twu","family":"Liaw","sequence":"first","affiliation":[]},{"given":"Jiann-Fu","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Wei-Chen","family":"Wu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.mcm.2006.01.015_b1","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1109\/30.920451","article-title":"Cryptanalysis of a remote user authentication scheme using smart cards","volume":"46","author":"Chan","year":"2000","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"1","key":"10.1016\/j.mcm.2006.01.015_b2","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1049\/el:20010022","article-title":"Remarks on Wang\u2013Chang\u2019s password authentication scheme","volume":"37","author":"Chan","year":"2001","journal-title":"IEEE Electronics Letter"},{"issue":"4","key":"10.1016\/j.mcm.2006.01.015_b3","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","article-title":"An efficient and practical solution to remote authentication: smart card","volume":"21","author":"Chien","year":"2002","journal-title":"Computers and Security"},{"issue":"6","key":"10.1016\/j.mcm.2006.01.015_b4","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"10.1016\/j.mcm.2006.01.015_b5","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"ElGamal","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/j.mcm.2006.01.015_b6","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S0895-7177(02)00106-1","article-title":"A simple remote user authentication scheme","volume":"36","author":"Hwang","year":"2002","journal-title":"Mathematical and Computer Modelling"},{"issue":"1","key":"10.1016\/j.mcm.2006.01.015_b7","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","article-title":"A new remote user authentication scheme using smart cards","volume":"46","author":"Hwang","year":"2000","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"5","key":"10.1016\/j.mcm.2006.01.015_b8","doi-asserted-by":"crossref","first-page":"2165","DOI":"10.1093\/ietcom\/e88-b.5.2165","article-title":"Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards","volume":"E88-B","author":"Ku","year":"2005","journal-title":"IEICE Transactions on Communications"},{"issue":"5","key":"10.1016\/j.mcm.2006.01.015_b9","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1049\/el:20047658","article-title":"Further cryptanalysis of a fingerprint-based remote user authentication scheme using smart cards","volume":"41","author":"Ku","year":"2005","journal-title":"IEE Electronics Letters"},{"issue":"1","key":"10.1016\/j.mcm.2006.01.015_b10","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/1044552.1044561","article-title":"Weaknesses of Yoon-Ryu-Yoo\u2019s hash-based password authentication scheme","volume":"39","author":"Ku","year":"2005","journal-title":"ACM Operating Systems Review"},{"key":"10.1016\/j.mcm.2006.01.015_b11","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","article-title":"Password authentication with insecure communication","volume":"24","author":"Lamport","year":"1981","journal-title":"Communications of the ACM"},{"issue":"6","key":"10.1016\/j.mcm.2006.01.015_b12","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/TCOM.1981.1095067","article-title":"Cryptographic authentication of time-invariant quantities","volume":"29","author":"Lennon","year":"1981","journal-title":"IEEE Transactions On Communications"},{"issue":"4","key":"10.1016\/j.mcm.2006.01.015_b13","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1109\/30.920446","article-title":"An efficient remote user authentication scheme using smart cards","volume":"46","author":"Sun","year":"2000","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"10.1016\/j.mcm.2006.01.015_b14","unstructured":"H.M. Sun, Cryptanalysis of password authentication schemes with smart cards, in: Information Security Conference 2001, May 2001, pp. 221\u2013223"},{"issue":"3","key":"10.1016\/j.mcm.2006.01.015_b15","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/0167-4048(96)00005-3","article-title":"Smart card based secure password authentication scheme","volume":"15","author":"Wang","year":"1996","journal-title":"Computers and Security"},{"issue":"8","key":"10.1016\/j.mcm.2006.01.015_b16","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/S0167-4048(99)80136-9","article-title":"Password authentication schemes with smart cards","volume":"18","author":"Yang","year":"1999","journal-title":"Computers and Security"}],"container-title":["Mathematical and Computer Modelling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0895717706000185?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0895717706000185?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T02:26:36Z","timestamp":1547778396000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0895717706000185"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7]]},"references-count":16,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2006,7]]}},"alternative-id":["S0895717706000185"],"URL":"https:\/\/doi.org\/10.1016\/j.mcm.2006.01.015","relation":{},"ISSN":["0895-7177"],"issn-type":[{"value":"0895-7177","type":"print"}],"subject":[],"published":{"date-parts":[[2006,7]]}}}