{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:07:01Z","timestamp":1742962021221,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030031916"},{"type":"electronic","value":"9783030031923"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03192-3_8","type":"book-chapter","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T03:06:48Z","timestamp":1540523208000},"page":"83-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Light-Weight Tightening Authentication Scheme for the Objects\u2019 Encounters in the Meetings"],"prefix":"10.1007","author":[{"given":"Kim Khanh","family":"Tran","sequence":"first","affiliation":[]},{"given":"Minh Khue","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Tran Khanh","family":"Dang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.future.2017.06.018","volume":"84","author":"R Ali","year":"2018","unstructured":"Ali, R., Pal, A.K., Kumari, S., Karuppiah, M., Conti, M.: A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. Future Gener. Comput. Syst. 84, 200\u2013215 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.adhoc.2015.05.020","volume":"36","author":"R Amin","year":"2016","unstructured":"Amin, R., Biswas, G.: A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36, 58\u201380 (2016)","journal-title":"Ad Hoc Netw."},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","volume":"78","author":"R Amin","year":"2018","unstructured":"Amin, R., Kumar, N., Biswas, G., Iqbal, R., Chang, V.: A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener. Comput. Syst. 78, 1005\u20131019 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"\u010capkun, S., Hubaux, J.P., Butty\u00e1n, L.: Mobility helps security in ad hoc networks. In: Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 46\u201356. ACM (2003)","DOI":"10.1145\/778415.778422"},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/TMC.2006.12","volume":"5","author":"S Capkun","year":"2006","unstructured":"Capkun, S., Hubaux, J.P., Buttyan, L.: Mobility helps peer-to-peer security. IEEE Trans. Mobile Comput. 5(1), 43\u201351 (2006)","journal-title":"IEEE Trans. Mobile Comput."},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/JSYST.2012.2231792","volume":"8","author":"MC Chuang","year":"2014","unstructured":"Chuang, M.C., Lee, J.F.: TEAM: trust-extended authentication mechanism for vehicular ad hoc networks. IEEE Syst. J. 8(3), 749\u2013758 (2014)","journal-title":"IEEE Syst. J."},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Ciobanu, R.I., Dobre, C.: CRAWDAD dataset upb\/hyccups (v. 2016-10-17), October 2016. https:\/\/doi.org\/10.15783\/C7TG7K. https:\/\/crawdad.org\/upb\/hyccups\/20161017\/2012. Traceset: 2012","DOI":"10.15783\/C7TG7K"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"59","DOI":"10.4018\/irmj.2008010104","volume":"21","author":"TK Dang","year":"2008","unstructured":"Dang, T.K.: Ensuring correctness, completeness, and freshness for outsourced tree-indexed data. Inf. Resour. Manag. J. 21, 59\u201376 (2008)","journal-title":"Inf. Resour. Manag. J."},{"issue":"2","key":"8_CR9","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/TDSC.2011.57","volume":"9","author":"A Das","year":"2012","unstructured":"Das, A., Islam, M.M.: Securedtrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans. Depend. Secur. Comput. 9(2), 261\u2013274 (2012)","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"De Meulenaer, G., Gosset, F., Standaert, F.X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: IEEE International Conference on Wireless and Mobile Computing Networking and Communications, WIMOB 2008, pp. 580\u2013585. IEEE (2008)","DOI":"10.1109\/WiMob.2008.16"},{"issue":"3","key":"8_CR11","first-page":"15","volume":"4","author":"S Ganeriwal","year":"2008","unstructured":"Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. (TOSN) 4(3), 15 (2008)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-67807-8_4","volume-title":"Mobile, Secure, and Programmable Networking","author":"H Khemissa","year":"2017","unstructured":"Khemissa, H., Tandjaoui, D., Bouzefrane, S.: An ultra-lightweight authentication scheme for heterogeneous wireless sensor networks in the context of Internet of Things. In: Bouzefrane, S., Banerjee, S., Sailhan, F., Boumerdassi, S., Renault, E. (eds.) MSPN 2017. LNCS, vol. 10566, pp. 49\u201362. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67807-8_4"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Michalevsky, Y., Nath, S., Liu, J.: MASHaBLE: mobile applications of secret handshakes over bluetooth LE. In: Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, pp. 387\u2013400. ACM (2016)","DOI":"10.1145\/2973750.2973778"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.procs.2016.06.013","volume":"89","author":"AH Moon","year":"2016","unstructured":"Moon, A.H., Iqbal, U., Bhat, G.M.: Implementation of node authentication for wsn using hash chains. Procedia Comput. Sci. 89, 90\u201398 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-540-68914-0_17","volume-title":"Applied Cryptography and Network Security","author":"D Pointcheval","year":"2008","unstructured":"Pointcheval, D., Zimmer, S.: Multi-factor authenticated key exchange. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 277\u2013295. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68914-0_17"},{"issue":"7","key":"8_CR16","doi-asserted-by":"publisher","first-page":"357430","DOI":"10.1155\/2014\/357430","volume":"10","author":"P Porambage","year":"2014","unstructured":"Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M.: PAuthKey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. Int. J. Distrib. Sens. Netw. 10(7), 357430 (2014)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-319-72389-1_40","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"HX Son","year":"2017","unstructured":"Son, H.X., Dang, T.K., Massacci, F.: REW-SMT: a new approach for rewriting XACML request with dynamic big data security policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 501\u2013515. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_40"},{"issue":"2","key":"8_CR18","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","volume":"24","author":"G Theodorakopoulos","year":"2006","unstructured":"Theodorakopoulos, G., Baras, J.S.: On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 318\u2013328 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-319-48057-2_21","volume-title":"Future Data and Security Engineering","author":"QNT Thi","year":"2016","unstructured":"Thi, Q.N.T., Si, T.T., Dang, T.K.: Fine grained attribute based access control model for privacy protection. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds.) FDSE 2016. LNCS, vol. 10018, pp. 305\u2013316. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48057-2_21"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03192-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:06:36Z","timestamp":1709823996000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-03192-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030031916","9783030031923"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03192-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"27 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cse.hcmut.edu.vn\/fdse2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}