{"id":"https://openalex.org/W2088459533","doi":"https://doi.org/10.4304/jsw.8.12.3206-3213","title":"An Enhanced ECC Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices","display_name":"An Enhanced ECC Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W2088459533","doi":"https://doi.org/10.4304/jsw.8.12.3206-3213","mag":"2088459533"},"language":"en","primary_location":{"id":"doi:10.4304/jsw.8.12.3206-3213","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jsw.8.12.3206-3213","pdf_url":null,"source":{"id":"https://openalex.org/S114141714","display_name":"Journal of Software","issn_l":"1796-217X","issn":["1796-217X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019807595","display_name":"Ming Luo","orcid":"https://orcid.org/0000-0002-2231-3775"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ming Luo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018607875","display_name":"Donghua Huang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Donghua Huang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5057291297","display_name":"Jun Hu","orcid":"https://orcid.org/0000-0003-2714-6264"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jun Hu","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019807595"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.10307262,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"8","issue":"12","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8837635517120361},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.7259140014648438},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5800802707672119},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5172553658485413},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4531146287918091},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44969233870506287},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32598137855529785}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8837635517120361},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.7259140014648438},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5800802707672119},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5172553658485413},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4531146287918091},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44969233870506287},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32598137855529785},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jsw.8.12.3206-3213","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jsw.8.12.3206-3213","pdf_url":null,"source":{"id":"https://openalex.org/S114141714","display_name":"Journal of Software","issn_l":"1796-217X","issn":["1796-217X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Software","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1591524234","https://openalex.org/W1966132871","https://openalex.org/W1982390017","https://openalex.org/W1998971834","https://openalex.org/W2001525822","https://openalex.org/W2002133788","https://openalex.org/W2013534592","https://openalex.org/W2045071278","https://openalex.org/W2047392174","https://openalex.org/W2077485076","https://openalex.org/W2095852231","https://openalex.org/W2140125353","https://openalex.org/W2147072779","https://openalex.org/W2401309594","https://openalex.org/W2950432514","https://openalex.org/W6650884476","https://openalex.org/W6674381683","https://openalex.org/W6681965207"],"related_works":["https://openalex.org/W1975289146","https://openalex.org/W2140125353","https://openalex.org/W2140798747","https://openalex.org/W2105887828","https://openalex.org/W2948169060","https://openalex.org/W2934095385","https://openalex.org/W2242172122","https://openalex.org/W3046827176","https://openalex.org/W2006953289","https://openalex.org/W4315694784"],"abstract_inverted_index":{"Recently,":[0],"Islam":[1,25,109],"and":[2,7,22,26,29,56,73,85,88,94,110,127],"Biswas":[3],"proposed":[4,60],"an":[5,46],"efficient":[6],"secure":[8,64],"ID-based":[9],"remote":[10,49,104],"mutual":[11,50],"authentication":[12,51],"with":[13,52,108],"key":[14,53,66],"agreement":[15,54,67],"scheme.":[16],"We":[17],"have":[18,44],"analyzed":[19],"the":[20,59,70,77,89,103,121],"security":[21],"performance":[23,117],"of":[24,101,120],"Biswas\u2019s":[27,111],"scheme":[28,33,55,61,114,132],"showed":[30],"that":[31,58],"their":[32],"has":[34,115],"some":[35],"pitfalls.":[36],"In":[37],"order":[38],"to":[39],"solve":[40],"these":[41],"problems,":[42],"we":[43],"constructed":[45],"enhanced":[47],"ECC":[48],"proven":[57],"is":[62,133],"a":[63],"authenticated":[65],"protocol":[68],"in":[69,118],"random":[71],"oracle":[72],"can":[74,91],"survive":[75],"against":[76],"known":[78],"session-specific":[79],"temporary":[80],"information":[81],"attack,":[82,87],"channel":[83],"attack":[84],"replay":[86],"user":[90],"freely":[92],"choose":[93],"change":[95],"his":[96],"password":[97],"without":[98],"any":[99],"hassle":[100],"contacting":[102],"server.":[105],"As":[106],"compared":[107],"scheme,":[112],"our":[113,131],"better":[116],"term":[119],"computation":[122],"cost,":[123],"security,":[124],"communication":[125,128,138],"overhead":[126],"round.":[129],"Thus,":[130],"suitable":[134],"for":[135],"resource-constrained":[136],"wireless":[137],"networks.":[139]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
