{"id":"https://openalex.org/W3005999617","doi":"https://doi.org/10.1109/icce-tw46550.2019.8991710","title":"Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing","display_name":"Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W3005999617","doi":"https://doi.org/10.1109/icce-tw46550.2019.8991710","mag":"3005999617"},"language":"en","primary_location":{"id":"doi:10.1109/icce-tw46550.2019.8991710","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce-tw46550.2019.8991710","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077673436","display_name":"Tsu\u2010Yang Wu","orcid":"https://orcid.org/0000-0001-8970-2452"},"institutions":[{"id":"https://openalex.org/I83791580","display_name":"Fujian University of Technology","ror":"https://ror.org/03c8fdb16","country_code":"CN","type":"education","lineage":["https://openalex.org/I83791580"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tsu-Yang WU","raw_affiliation_strings":["National Demonstration Center for Experimental Electronic Information and Electrical Technology, Education (Fujian University of Technology),Fuzhou,Fujian,China","National Demonstration Center for Experimental Electronic Information and Electrical Technology, Education (Fujian University of Technology), Fuzhou, Fujian, China"],"affiliations":[{"raw_affiliation_string":"National Demonstration Center for Experimental Electronic Information and Electrical Technology, Education (Fujian University of Technology),Fuzhou,Fujian,China","institution_ids":["https://openalex.org/I83791580"]},{"raw_affiliation_string":"National Demonstration Center for Experimental Electronic Information and Electrical Technology, Education (Fujian University of Technology), Fuzhou, Fujian, China","institution_ids":["https://openalex.org/I83791580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040392634","display_name":"Zhiyuan Lee","orcid":"https://orcid.org/0000-0001-8743-5290"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyuan Lee","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology,Qingdao,Shandong,China","College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology,Qingdao,Shandong,China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044454827","display_name":"Yanyu Huang","orcid":"https://orcid.org/0000-0001-5541-6554"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanyu Huang","raw_affiliation_strings":["Harbin Institute of Technology (Shenzhen),Shenzhen,Guangdong,China","Harbin Institute of Technology (Shenzhen), Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology (Shenzhen),Shenzhen,Guangdong,China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]},{"raw_affiliation_string":"Harbin Institute of Technology (Shenzhen), Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068618830","display_name":"Chien\u2010Ming Chen","orcid":"https://orcid.org/0000-0002-6502-472X"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I158809036","display_name":"Shenzhen Institute of Information Technology","ror":"https://ror.org/03wrf9427","country_code":"CN","type":"education","lineage":["https://openalex.org/I158809036"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chien-Ming Chen","raw_affiliation_strings":["Harbin Institute of Technology (Shenzhen),Shenzhen,Guangdong,China","Harbin Institute of Technology (Shenzhen), Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology (Shenzhen),Shenzhen,Guangdong,China","institution_ids":["https://openalex.org/I158809036","https://openalex.org/I204983213"]},{"raw_affiliation_string":"Harbin Institute of Technology (Shenzhen), Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032910989","display_name":"Yeh-Cheng Chen","orcid":"https://orcid.org/0000-0001-7793-1098"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yeh-Cheng Chen","raw_affiliation_strings":["University of California,Department of Computer Science,Davis,CA,USA","Department of Computer Science, University of California, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California,Department of Computer Science,Davis,CA,USA","institution_ids":["https://openalex.org/I84218800"]},{"raw_affiliation_string":"Department of Computer Science, University of California, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5077673436"],"corresponding_institution_ids":["https://openalex.org/I83791580"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.30006073,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7751837968826294},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.7232088446617126},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6559369564056396},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6360875368118286},{"id":"https://openalex.org/keywords/forward-secrecy","display_name":"Forward secrecy","score":0.5549693703651428},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5423020720481873},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5308274626731873},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4993135929107666},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.4481354355812073},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.4324902892112732},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.4175609350204468},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.416156530380249},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3869614005088806},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2560500502586365},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.21644890308380127},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1293065845966339},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1003217101097107}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7751837968826294},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.7232088446617126},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6559369564056396},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6360875368118286},{"id":"https://openalex.org/C205009425","wikidata":"https://www.wikidata.org/wiki/Q935662","display_name":"Forward secrecy","level":4,"score":0.5549693703651428},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5423020720481873},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5308274626731873},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4993135929107666},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.4481354355812073},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.4324902892112732},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.4175609350204468},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.416156530380249},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3869614005088806},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2560500502586365},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.21644890308380127},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1293065845966339},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1003217101097107},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce-tw46550.2019.8991710","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icce-tw46550.2019.8991710","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1500958697","https://openalex.org/W1965929698","https://openalex.org/W2034222716","https://openalex.org/W2562086057","https://openalex.org/W2604267404","https://openalex.org/W2895229947","https://openalex.org/W2896228763","https://openalex.org/W2911056119","https://openalex.org/W2997288268","https://openalex.org/W2997550412","https://openalex.org/W2997718516","https://openalex.org/W6651974771","https://openalex.org/W6736157417","https://openalex.org/W6772406880","https://openalex.org/W6772587212"],"related_works":["https://openalex.org/W2362963703","https://openalex.org/W2388247877","https://openalex.org/W2379241680","https://openalex.org/W2133761101","https://openalex.org/W2354152081","https://openalex.org/W2127299350","https://openalex.org/W2170402725","https://openalex.org/W3045615609","https://openalex.org/W2895146002","https://openalex.org/W2053249018"],"abstract_inverted_index":{"Recently,":[0],"Wu":[1],"et":[2],"al.":[3],"proposed":[4],"an":[5],"authentication":[6],"protocol":[7,31],"for":[8],"distributed":[9],"cloud":[10],"computing":[11],"environment.":[12],"In":[13],"their":[14,30],"protocol,":[15],"they":[16],"claimed":[17],"that":[18],"it":[19],"is":[20],"secure":[21],"against":[22],"several":[23],"well-known":[24],"attacks.":[25],"However,":[26],"we":[27],"point":[28],"out":[29],"did":[32],"not":[33],"provide":[34],"perfect":[35],"forward":[36],"secrecy":[37],"under":[38],"some":[39],"assumptions":[40],"in":[41],"this":[42],"paper.":[43]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
