{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:00:19Z","timestamp":1725868819610},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491059"},{"type":"electronic","value":"9783319491066"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49106-6_87","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T10:33:13Z","timestamp":1477045993000},"page":"849-855","source":"Crossref","is-referenced-by-count":0,"title":["A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption"],"prefix":"10.1007","author":[{"given":"Fushan","family":"Wei","sequence":"first","affiliation":[]},{"given":"Ruijie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"87_CR1","doi-asserted-by":"crossref","unstructured":"Das, M. L.: Two-Factor User Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, vol. 8, no. 3, 2009, pp. 1086-1090.","DOI":"10.1109\/TWC.2008.080128"},{"key":"87_CR2","doi-asserted-by":"crossref","unstructured":"Khan, M. K., Alghathbar, K.: Cryptanalysis And Security Improvements of \u2018Two-Factor User Authentication in Wireless Sensor Networks\u2019. Sensors, 10(3), 2010, pp. 2450-2459.","DOI":"10.3390\/s100302450"},{"key":"87_CR3","unstructured":"He, D., Gao, Y., Chan, S., Chen, C., & Bu, J.: An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks. Ad Hoc & Sensor Wireless Networks, 10(4), 2010, pp. 361-371."},{"key":"87_CR4","unstructured":"Vaidya, B., Makrakis, D., Mouftah, H.: (2012). Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks. Security and Communication Networks, 9(2), 2016, pp. 171-183."},{"key":"87_CR5","doi-asserted-by":"crossref","unstructured":"Sun, D. Z., Li, J. X., Feng, Z. Y., Cao, Z. F., & Xu, G. Q: On the Security And Improvement of a Two-Factor User Authentication Scheme in Wireless Sensor Networks. Personal and Ubiquitous Computing, 17(5), 2013, pp. 895-905.","DOI":"10.1007\/s00779-012-0540-3"},{"key":"87_CR6","doi-asserted-by":"crossref","unstructured":"He, D., Kumar, N., Khan, M. K., & Lee, J. H.: Anonymous Two-Factor Authentication for Consumer Roaming Service in Global Mobility Networks. IEEE Transactions on Consumer Electronics, 59(4), 2013, pp. 811-817.","DOI":"10.1109\/TCE.2013.6689693"},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Yuan, J. J.: An Enhanced Two-Factor User Authentication in Wireless Sensor Networks. Telecommunication Systems, 55(1), 2014, pp. 105-113.","DOI":"10.1007\/s11235-013-9755-5"},{"key":"87_CR8","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y.: An Efficient Two-Factor User Authentication Scheme with Unlinkability for Wireless Sensor Networks. Peer-to-Peer Networking and Applications, 8(6), 2014, pp. 1070-1081.","DOI":"10.1007\/s12083-014-0285-z"},{"key":"87_CR9","doi-asserted-by":"crossref","unstructured":"Wei, F., Ma, J., Jiang, Q., Shen, J., & Ma, C.: Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. Information Technology And Control, 45(1), 2016, pp. 62-70.","DOI":"10.5755\/j01.itc.45.1.11949"},{"key":"87_CR10","doi-asserted-by":"crossref","unstructured":"Wang, D., & Wang, P.: On the Anonymity of Two-Factor Authentication Schemes for Wireless Sensor Networks: Attacks, Principle and Solutions. Computer Networks, 73, 2014, pp. 41-57.","DOI":"10.1016\/j.comnet.2014.07.010"},{"key":"87_CR11","doi-asserted-by":"crossref","unstructured":"Wang, D., & Wang, P.: Understanding Security Failures of Two-Factor Authentication Schemes for Real-Time Applications in Hierarchical Wireless Sensor Networks. Ad Hoc Networks, 20, 2014, pp. 1-15.","DOI":"10.1016\/j.adhoc.2014.03.003"},{"key":"87_CR12","doi-asserted-by":"crossref","unstructured":"Hoang V T, Krovetz T, Rogaway P: Robust Authenticated-Encryption AEZ and the Problem That it Solves. Advances in Cryptology-EUROCRYPT 2015. Springer Berlin Heidelberg, 2015, pp. 15-44.","DOI":"10.1007\/978-3-662-46800-5_2"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49106-6_87","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T22:07:37Z","timestamp":1568498857000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49106-6_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491059","9783319491066"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49106-6_87","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}