{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1361699995482253824.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1002/sec.315"}},{"identifier":{"@type":"URI","@value":"https://api.wiley.com/onlinelibrary/tdm/v1/articles/10.1002%2Fsec.315"}},{"identifier":{"@type":"URI","@value":"https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.315"}}],"dc:title":[{"@value":"Robust smart‐cards‐based user authentication scheme with user anonymity"}],"description":[{"type":"abstract","notation":[{"@value":"<jats:title>Abstract</jats:title><jats:p>In this paper, we mainly investigate anonymous user authentication scheme using smart card. We first demonstrate security weaknesses still exist in two such schemes recently propose by Wang<jats:italic>et al</jats:italic>. and Tsai<jats:italic>et al</jats:italic>., respectively according to Wang<jats:italic>et al</jats:italic>.'s criteria. Thereafter, we propose an enhanced smart‐card‐based authentication scheme with user anonymity for providing all the admired requirements at the same time. Compared with the previous schemes, our scheme is yet efficient both in computation and communication cost. Moreover, we can prove the security of the proposed scheme in the random oracle model. Copyright © 2011 John Wiley & Sons, Ltd.</jats:p>"}]}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1381699995482253825","@type":"Researcher","foaf:name":[{"@value":"Shuhua Wu"}]},{"@id":"https://cir.nii.ac.jp/crid/1381699995482253824","@type":"Researcher","foaf:name":[{"@value":"Yuefei Zhu"}]},{"@id":"https://cir.nii.ac.jp/crid/1381699995482253826","@type":"Researcher","foaf:name":[{"@value":"Qiong Pu"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"19390114"},{"@type":"EISSN","@value":"19390122"}],"prism:publicationName":[{"@value":"Security and Communication Networks"}],"dc:publisher":[{"@value":"Wiley"}],"prism:publicationDate":"2011-04-28","prism:volume":"5","prism:number":"2","prism:startingPage":"236","prism:endingPage":"248"},"reviewed":"false","dc:rights":["http://onlinelibrary.wiley.com/termsAndConditions#vor"],"url":[{"@id":"https://api.wiley.com/onlinelibrary/tdm/v1/articles/10.1002%2Fsec.315"},{"@id":"https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.315"}],"createdAt":"2011-04-28","modifiedAt":"2025-03-05","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1390001204378267392","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1002/sec.315"},{"@type":"CROSSREF","@value":"10.1587/transinf.e96.d.138_references_DOI_Pa2cMqOtlFf5ExtTzc8mtIK9MpO"}]}