{"id":"https://openalex.org/W3111853884","doi":"https://doi.org/10.1007/978-981-15-8061-1_2","title":"A Geometric-Based User Authentication Scheme for Multi-server Architecture: Cryptanalysis and Enhancement","display_name":"A Geometric-Based User Authentication Scheme for Multi-server Architecture: Cryptanalysis and Enhancement","publication_year":2020,"publication_date":"2020-12-10","ids":{"openalex":"https://openalex.org/W3111853884","doi":"https://doi.org/10.1007/978-981-15-8061-1_2","mag":"3111853884"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-15-8061-1_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-15-8061-1_2","pdf_url":null,"source":{"id":"https://openalex.org/S2764905038","display_name":"Advances in intelligent systems and computing","issn_l":"2194-5357","issn":["2194-5357","2194-5365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Intelligent Systems and Computing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052380142","display_name":"Debasis Giri","orcid":"https://orcid.org/0000-0003-3033-3036"},"institutions":[{"id":"https://openalex.org/I99601430","display_name":"Maulana Abul Kalam Azad University of Technology, West Bengal","ror":"https://ror.org/030tcae29","country_code":"IN","type":"education","lineage":["https://openalex.org/I99601430"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Debasis Giri","raw_affiliation_strings":["Department of Information Technology, Maulana Abul Kalam Azad University of Technology, Haringhata, Nadia, 741249, West Bengal, India","Department of Information Technology, Maulana Abul Kalam Azad University of Technology, Haringhata, West Bengal, India","Department of Information Technology, Maulana Abul Kalam Azad University of Technology, Haringhata, Nadia, India"],"raw_orcid":"https://orcid.org/0000-0003-3033-3036","affiliations":[{"raw_affiliation_string":"Department of Information Technology, Maulana Abul Kalam Azad University of Technology, Haringhata, Nadia, 741249, West Bengal, India","institution_ids":["https://openalex.org/I99601430"]},{"raw_affiliation_string":"Department of Information Technology, Maulana Abul Kalam Azad University of Technology, Haringhata, West Bengal, India","institution_ids":["https://openalex.org/I99601430"]},{"raw_affiliation_string":"Department of Information Technology, Maulana Abul Kalam Azad University of Technology, Haringhata, Nadia, India","institution_ids":["https://openalex.org/I99601430"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010283105","display_name":"Tanmoy Maitra","orcid":"https://orcid.org/0000-0002-5887-649X"},"institutions":[{"id":"https://openalex.org/I67357951","display_name":"KIIT University","ror":"https://ror.org/00k8zt527","country_code":"IN","type":"education","lineage":["https://openalex.org/I67357951"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Tanmoy Maitra","raw_affiliation_strings":["School of Computer Engineering, KIIT, Deemed to be University, Bhubaneswar, 751024, Odisha, India","School of Computer Engineering, KIIT, Deemed to be University, Bhubaneswar, India"],"raw_orcid":"https://orcid.org/0000-0002-5887-649X","affiliations":[{"raw_affiliation_string":"School of Computer Engineering, KIIT, Deemed to be University, Bhubaneswar, 751024, Odisha, India","institution_ids":["https://openalex.org/I67357951"]},{"raw_affiliation_string":"School of Computer Engineering, KIIT, Deemed to be University, Bhubaneswar, India","institution_ids":["https://openalex.org/I67357951"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010283105"],"corresponding_institution_ids":["https://openalex.org/I67357951"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26660849,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7439969778060913},{"id":"https://openalex.org/keywords/timestamp","display_name":"Timestamp","score":0.7390922904014587},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6921992301940918},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5995334386825562},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5484092235565186},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.516516387462616},{"id":"https://openalex.org/keywords/authentication-server","display_name":"Authentication server","score":0.491583913564682},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4218304455280304},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35512620210647583},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3443159759044647},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.31850337982177734},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12117195129394531},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07423141598701477}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7439969778060913},{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.7390922904014587},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6921992301940918},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5995334386825562},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5484092235565186},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.516516387462616},{"id":"https://openalex.org/C2777331311","wikidata":"https://www.wikidata.org/wiki/Q784561","display_name":"Authentication server","level":3,"score":0.491583913564682},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4218304455280304},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35512620210647583},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3443159759044647},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31850337982177734},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12117195129394531},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07423141598701477},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-15-8061-1_2","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-15-8061-1_2","pdf_url":null,"source":{"id":"https://openalex.org/S2764905038","display_name":"Advances in intelligent systems and computing","issn_l":"2194-5357","issn":["2194-5357","2194-5365"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Intelligent Systems and Computing","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2014209446","https://openalex.org/W2021923324","https://openalex.org/W2036892464","https://openalex.org/W2048851503","https://openalex.org/W2048887528","https://openalex.org/W2078030789","https://openalex.org/W2104213134","https://openalex.org/W2113446256","https://openalex.org/W2146573609","https://openalex.org/W2155392226","https://openalex.org/W2540231424","https://openalex.org/W2545529043","https://openalex.org/W2752548599"],"related_works":["https://openalex.org/W3089223619","https://openalex.org/W4288849478","https://openalex.org/W2940752727","https://openalex.org/W1561797008","https://openalex.org/W2012448218","https://openalex.org/W1528138196","https://openalex.org/W2360607528","https://openalex.org/W2366585502","https://openalex.org/W2564811044","https://openalex.org/W4324137616"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
