{"id":"https://openalex.org/W1965053188","doi":"https://doi.org/10.1109/icics.2013.6782789","title":"A random increasing sequence hash chain and smart card-based remote user authentication scheme","display_name":"A random increasing sequence hash chain and smart card-based remote user authentication scheme","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W1965053188","doi":"https://doi.org/10.1109/icics.2013.6782789","mag":"1965053188"},"language":"en","primary_location":{"id":"doi:10.1109/icics.2013.6782789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icics.2013.6782789","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 9th International Conference on Information, Communications &amp; Signal Processing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005864781","display_name":"Jianwei Fan","orcid":"https://orcid.org/0000-0002-9793-1092"},"institutions":[{"id":"https://openalex.org/I131948415","display_name":"National Taichung University of Science and Technology","ror":"https://ror.org/05bgcav40","country_code":"TW","type":"education","lineage":["https://openalex.org/I131948415"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Jian-Wei Fan","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan","(Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan","institution_ids":["https://openalex.org/I131948415"]},{"raw_affiliation_string":"(Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan)","institution_ids":["https://openalex.org/I131948415"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103531822","display_name":"Chao-Wen Chan","orcid":null},"institutions":[{"id":"https://openalex.org/I131948415","display_name":"National Taichung University of Science and Technology","ror":"https://ror.org/05bgcav40","country_code":"TW","type":"education","lineage":["https://openalex.org/I131948415"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chao-Wen Chan","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan","(Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan","institution_ids":["https://openalex.org/I131948415"]},{"raw_affiliation_string":"(Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan)","institution_ids":["https://openalex.org/I131948415"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024134485","display_name":"Ya-Fen Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I131948415","display_name":"National Taichung University of Science and Technology","ror":"https://ror.org/05bgcav40","country_code":"TW","type":"education","lineage":["https://openalex.org/I131948415"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ya-Fen Chang","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan","(Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan)"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan","institution_ids":["https://openalex.org/I131948415"]},{"raw_affiliation_string":"(Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan)","institution_ids":["https://openalex.org/I131948415"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005864781"],"corresponding_institution_ids":["https://openalex.org/I131948415"],"apc_list":null,"apc_paid":null,"fwci":1.6179,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.87361425,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7803717851638794},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.7734988927841187},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.7580585479736328},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5417192578315735},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5337907075881958},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.5185259580612183},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4853462278842926},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.4837074875831604},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4744183421134949},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46816086769104004},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.44343307614326477},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4339456260204315},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4101022779941559},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35066717863082886},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.142794668674469}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7803717851638794},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.7734988927841187},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.7580585479736328},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5417192578315735},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5337907075881958},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.5185259580612183},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4853462278842926},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.4837074875831604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4744183421134949},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46816086769104004},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.44343307614326477},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4339456260204315},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4101022779941559},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35066717863082886},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.142794668674469},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icics.2013.6782789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icics.2013.6782789","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 9th International Conference on Information, Communications &amp; Signal Processing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2016120028","https://openalex.org/W2020220086","https://openalex.org/W2022284361","https://openalex.org/W2038911521","https://openalex.org/W2067438990","https://openalex.org/W2093243364","https://openalex.org/W2113446256"],"related_works":["https://openalex.org/W4200497776","https://openalex.org/W2342330140","https://openalex.org/W1974544592","https://openalex.org/W2113619720","https://openalex.org/W2982222368","https://openalex.org/W2110701844","https://openalex.org/W122749164","https://openalex.org/W3151879525","https://openalex.org/W2748978416","https://openalex.org/W96948003"],"abstract_inverted_index":{"In":[0,45],"2012,":[1],"Hsieh":[2],"and":[3,40,57,77,91],"Leu":[4],"proposed":[5,84],"a":[6,22,59],"remote":[7,60],"user":[8,55,61,68],"authentication":[9,62],"scheme.":[10,19,35,63],"They":[11],"use":[12],"cryptographic":[13],"hash":[14,27,75,81],"functions":[15,76],"to":[16,24],"design":[17],"their":[18,34,51],"By":[20],"designing":[21],"method":[23],"analyse":[25],"one-way":[26],"functions,":[28],"we":[29,47],"propose":[30,58],"two":[31],"attacks":[32],"on":[33,71],"One":[36],"is":[37,42],"masquerade":[38,89],"attack":[39,90],"another":[41],"guessing":[43,93],"attack.":[44,94],"addition,":[46],"point":[48],"out":[49],"that":[50],"scheme":[52,65,85],"provides":[53],"no":[54],"anonymity":[56],"Our":[64],"can":[66,86],"provide":[67],"anonymity.":[69],"Based":[70],"the":[72],"one-wayness":[73],"of":[74],"random":[78],"increasing":[79],"sequence-based":[80],"chain,":[82],"our":[83],"resist":[87],"outsider":[88],"insider":[92]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
