{"id":"https://openalex.org/W2541957049","doi":"https://doi.org/10.1007/978-3-319-48671-0_28","title":"Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing","display_name":"Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2541957049","doi":"https://doi.org/10.1007/978-3-319-48671-0_28","mag":"2541957049"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-48671-0_28","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-48671-0_28","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108054661","display_name":"Qi Jiang","orcid":"https://orcid.org/0000-0002-0894-4992"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Jiang","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101496852","display_name":"Bingyan Li","orcid":"https://orcid.org/0009-0001-4226-4501"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bingyan Li","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052363813","display_name":"Youliang Tian","orcid":"https://orcid.org/0000-0002-5974-1570"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Youliang Tian","raw_affiliation_strings":["Guizhou Provincial Key Laboratory of Public Big Data, Guiyang, Guizhou, China"],"affiliations":[{"raw_affiliation_string":"Guizhou Provincial Key Laboratory of Public Big Data, Guiyang, Guizhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100638446","display_name":"Yuanyuan Yang","orcid":"https://orcid.org/0000-0001-7296-9222"},"institutions":[{"id":"https://openalex.org/I1302611135","display_name":"Ministry of Public Security of the People's Republic of China","ror":"https://ror.org/00bt9we26","country_code":"CN","type":"government","lineage":["https://openalex.org/I1302611135"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanyuan Yang","raw_affiliation_strings":["The Third Research Institute of Ministry of Public Security, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"The Third Research Institute of Ministry of Public Security, Shanghai, China","institution_ids":["https://openalex.org/I1302611135"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5108054661"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.6276,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.71622949,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"311","last_page":"321"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8360677361488342},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7066057920455933},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.669003963470459},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5942493677139282},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5785639882087708},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.5115869641304016},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.5000553131103516},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.4748016893863678},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44715452194213867},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.40870699286460876},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35427162051200867},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10225716233253479}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8360677361488342},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7066057920455933},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.669003963470459},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5942493677139282},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5785639882087708},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.5115869641304016},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.5000553131103516},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.4748016893863678},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44715452194213867},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.40870699286460876},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35427162051200867},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10225716233253479}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-48671-0_28","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-48671-0_28","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1498573661","https://openalex.org/W1500958697","https://openalex.org/W1810786891","https://openalex.org/W1880212920","https://openalex.org/W1961388012","https://openalex.org/W1967308747","https://openalex.org/W1991717599","https://openalex.org/W2021862793","https://openalex.org/W2049495124","https://openalex.org/W2058107309","https://openalex.org/W2081713029","https://openalex.org/W2099340692","https://openalex.org/W2105114022","https://openalex.org/W2134874018","https://openalex.org/W2147096042","https://openalex.org/W2154909745","https://openalex.org/W2208108072","https://openalex.org/W2281830773","https://openalex.org/W2293425411","https://openalex.org/W2314619911","https://openalex.org/W2402457987","https://openalex.org/W2463724383","https://openalex.org/W2474001793","https://openalex.org/W2516829434","https://openalex.org/W2524195644"],"related_works":["https://openalex.org/W2980931174","https://openalex.org/W2093798919","https://openalex.org/W2363600212","https://openalex.org/W2736044769","https://openalex.org/W3101929529","https://openalex.org/W2182686533","https://openalex.org/W2963069143","https://openalex.org/W2364805998","https://openalex.org/W2089232161","https://openalex.org/W2769921009"],"abstract_inverted_index":null,"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
