{"id":"https://openalex.org/W2462170768","doi":"https://doi.org/10.3390/computers5030015","title":"Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors","display_name":"Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors","publication_year":2016,"publication_date":"2016-07-11","ids":{"openalex":"https://openalex.org/W2462170768","doi":"https://doi.org/10.3390/computers5030015","mag":"2462170768"},"language":"en","primary_location":{"id":"doi:10.3390/computers5030015","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers5030015","pdf_url":"https://www.mdpi.com/2073-431X/5/3/15/pdf?version=1468232308","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2073-431X/5/3/15/pdf?version=1468232308","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056221045","display_name":"Ali A. Yassin","orcid":"https://orcid.org/0000-0001-8744-8008"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I126633494","display_name":"University of Basrah","ror":"https://ror.org/00840ea57","country_code":"IQ","type":"education","lineage":["https://openalex.org/I126633494"]}],"countries":["CN","IQ"],"is_corresponding":false,"raw_author_name":"Ali Yassin","raw_affiliation_strings":["Computer Science Deptment, Education College for Pure Sciences, Basrah University, Basrah 61004, Iraq","School of Remote Sensing and Information Engineering, Wuhan University, Wuchang District, Wuhan 430079, China"],"affiliations":[{"raw_affiliation_string":"Computer Science Deptment, Education College for Pure Sciences, Basrah University, Basrah 61004, Iraq","institution_ids":["https://openalex.org/I126633494"]},{"raw_affiliation_string":"School of Remote Sensing and Information Engineering, Wuhan University, Wuchang District, Wuhan 430079, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011274467","display_name":"Jian Yao","orcid":"https://orcid.org/0000-0002-9134-5084"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Yao","raw_affiliation_strings":["School of Remote Sensing and Information Engineering, Wuhan University, Wuchang District, Wuhan 430079, China"],"affiliations":[{"raw_affiliation_string":"School of Remote Sensing and Information Engineering, Wuhan University, Wuchang District, Wuhan 430079, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032130733","display_name":"Shiyao Han","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiyao Han","raw_affiliation_strings":["School of Remote Sensing and Information Engineering, Wuhan University, Wuchang District, Wuhan 430079, China"],"affiliations":[{"raw_affiliation_string":"School of Remote Sensing and Information Engineering, Wuhan University, Wuchang District, Wuhan 430079, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011274467"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":0.6635,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.78366167,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"5","issue":"3","first_page":"15","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7568466663360596},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.753574013710022},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6851342916488647},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.6349673867225647},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5821247696876526},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.5776764154434204},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5418968200683594},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.5257794857025146},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.5075039267539978},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4975748360157013},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.49299952387809753},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.4685797393321991},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.453095018863678},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.4492826759815216},{"id":"https://openalex.org/keywords/multi-factor-authentication","display_name":"Multi-factor authentication","score":0.4213588237762451},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4050060510635376},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18908053636550903},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10489761829376221},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09102103114128113}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7568466663360596},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.753574013710022},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6851342916488647},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.6349673867225647},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5821247696876526},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.5776764154434204},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5418968200683594},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.5257794857025146},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.5075039267539978},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4975748360157013},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.49299952387809753},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.4685797393321991},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.453095018863678},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.4492826759815216},{"id":"https://openalex.org/C194699767","wikidata":"https://www.wikidata.org/wiki/Q7878662","display_name":"Multi-factor authentication","level":4,"score":0.4213588237762451},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4050060510635376},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18908053636550903},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10489761829376221},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09102103114128113}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/computers5030015","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers5030015","pdf_url":"https://www.mdpi.com/2073-431X/5/3/15/pdf?version=1468232308","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:fb7da1a2db644d609216c96ce42fdedb","is_oa":true,"landing_page_url":"https://doaj.org/article/fb7da1a2db644d609216c96ce42fdedb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computers, Vol 5, Iss 3, p 15 (2016)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/computers5030015","is_oa":true,"landing_page_url":"https://doi.org/10.3390/computers5030015","pdf_url":"https://www.mdpi.com/2073-431X/5/3/15/pdf?version=1468232308","source":{"id":"https://openalex.org/S4210228075","display_name":"Computers","issn_l":"2073-431X","issn":["2073-431X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2462170768.pdf","grobid_xml":"https://content.openalex.org/works/W2462170768.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W73325731","https://openalex.org/W1497574042","https://openalex.org/W1502388574","https://openalex.org/W1539291145","https://openalex.org/W1574539364","https://openalex.org/W1864383460","https://openalex.org/W1965929698","https://openalex.org/W1967308747","https://openalex.org/W1968514873","https://openalex.org/W1987091409","https://openalex.org/W2022945883","https://openalex.org/W2023133250","https://openalex.org/W2024665446","https://openalex.org/W2030248862","https://openalex.org/W2036892464","https://openalex.org/W2041097682","https://openalex.org/W2041098119","https://openalex.org/W2047862607","https://openalex.org/W2051201663","https://openalex.org/W2054857924","https://openalex.org/W2060379433","https://openalex.org/W2068931775","https://openalex.org/W2070453133","https://openalex.org/W2076392080","https://openalex.org/W2078586025","https://openalex.org/W2079262069","https://openalex.org/W2092258731","https://openalex.org/W2093798919","https://openalex.org/W2106182412","https://openalex.org/W2113446256","https://openalex.org/W2120645859","https://openalex.org/W2133059825","https://openalex.org/W2141974684","https://openalex.org/W2143912845","https://openalex.org/W2144016831","https://openalex.org/W2144342348","https://openalex.org/W2147883419","https://openalex.org/W2153572804","https://openalex.org/W2294912729","https://openalex.org/W2402457987","https://openalex.org/W2904123153","https://openalex.org/W3029502360","https://openalex.org/W3106397135","https://openalex.org/W4298373432","https://openalex.org/W6670215367","https://openalex.org/W6713260194"],"related_works":["https://openalex.org/W2050433615","https://openalex.org/W128488073","https://openalex.org/W2348068295","https://openalex.org/W879126295","https://openalex.org/W2726319079","https://openalex.org/W2380322830","https://openalex.org/W2058049747","https://openalex.org/W2365657917","https://openalex.org/W2373082103","https://openalex.org/W2359670314"],"abstract_inverted_index":{"In":[0,27],"2009,":[1],"Xu":[2],"et":[3],"al.":[4],"presented":[5],"a":[6,56],"safe,":[7],"dynamic,":[8],"id-based":[9],"on":[10],"remote":[11,59],"user":[12,89],"authentication":[13,60],"method":[14],"that":[15],"has":[16],"several":[17],"advantages":[18],"such":[19,85],"as":[20,86],"freely":[21,91],"chosen":[22,92],"passwords":[23],"and":[24,35,44,74,105,126,145,161],"mutual":[25,87],"authentication.":[26],"this":[28],"paper,":[29],"we":[30,54],"review":[31],"the":[32,117,150],"Xu\u2013Zhu\u2013Feng":[33],"scheme":[34,61,122],"indicate":[36],"many":[37,82],"shortcomings":[38],"in":[39,116,159],"their":[40],"scheme.":[41],"Impersonation":[42],"attacks":[43,46,73,130],"insider":[45,136],"could":[47],"be":[48],"effective.":[49],"To":[50],"overcome":[51],"these":[52],"drawbacks,":[53],"propose":[55],"secure":[57,94],"biometric-based":[58],"using":[62,102],"biometric":[63],"characteristics":[64],"of":[65,139],"hand-geometry,":[66],"which":[67],"is":[68,123,156],"aimed":[69],"at":[70],"withstanding":[71],"well-known":[72],"achieving":[75],"good":[76],"performance.":[77],"Furthermore,":[78],"our":[79,121,154],"work":[80,155],"contains":[81],"crucial":[83],"merits":[84],"authentication,":[88],"anonymity,":[90],"passwords,":[93],"password":[95,132],"changes,":[96],"session":[97],"key":[98],"agreements,":[99],"revocation":[100],"by":[101],"personal":[103],"biometrics,":[104],"does":[106],"not":[107],"need":[108],"extra":[109],"device":[110],"or":[111],"software":[112],"for":[113],"hand":[114],"geometry":[115],"login":[118],"phase.":[119],"Additionally,":[120],"highly":[124],"efficient":[125],"withstands":[127],"existing":[128],"known":[129],"like":[131],"guessing,":[133],"server":[134],"impersonation,":[135],"attacks,":[137,142,144],"denial":[138],"service":[140],"(DOS)":[141],"replay":[143],"parallel-session":[146],"attacks.":[147],"Compared":[148],"with":[149],"other":[151],"related":[152],"schemes,":[153],"powerful":[157],"both":[158],"communications":[160],"computation":[162],"costs.":[163]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
