{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:51:57Z","timestamp":1726037517906},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_9","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"91-103","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Anonymous Authentication Scheme for Machine-to-machine Communication Based on Elliptic Curve"],"prefix":"10.1007","author":[{"given":"Yao","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Chujun","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"1","key":"9_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/JAS.2017.7510349","volume":"4","author":"L Yang","year":"2017","unstructured":"Yang, L., Yu, P., Bailing, W., Sirui, Y., Zihe, L.: Review on cyber-physical systems. IEEE\/CAA J. Automatica Sinica 4(1), 27\u201340 (2017)","journal-title":"IEEE\/CAA J. Automatica Sinica"},{"key":"9_CR2","unstructured":"Lee, E.A. Cyber physical systems: Design challenges. In: Proceedings of 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), May 6, 2008, Orlando, FL, USA, pp. 363\u2013369 (2008)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: Proceedings of IEEE 28th International Conference on Distributed Computing Systems, pp. 495\u2013500, June 2008","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"issue":"2","key":"9_CR4","first-page":"480","volume":"6","author":"M Chen","year":"2012","unstructured":"Chen, M., Wan, J., Li, F.: Machine-to-machine communications: architectures, standards, and applications. KSII Trans. Internet Inf. Syst. 6(2), 480\u2013497 (2012)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"9_CR5","unstructured":"Qi, Q.: Strategic thinking of the internet of Things and M2M Services, ZTE Commun. (01) (2010)"},{"issue":"22","key":"9_CR6","doi-asserted-by":"publisher","first-page":"23891","DOI":"10.1007\/s11042-016-4138-z","volume":"76","author":"L Xu","year":"2017","unstructured":"Xu, L., Gulliver, T.A.: Performance analysis for M2M video transmission cooperative networks using transmit antenna selection. Multimedia Tools Appl. 76(22), 23891\u201323902 (2017)","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"9_CR7","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/s12083-012-0154-6","volume":"7","author":"C Ma","year":"2014","unstructured":"Ma, C., He, J., Chen, H.H., Tang, Z.: Uncoordinated coexisting IEEE 802.15.4 networks for machine to machine communications. Peer-To-Peer Netw. Appl. 7(3), 274\u2013284 (2014)","journal-title":"Peer-To-Peer Netw. Appl."},{"key":"9_CR8","unstructured":"Ren, W., Yu, L., Ma, L., Ren, Y.: How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising"},{"key":"9_CR9","unstructured":"Lai, C., Lu, R., Zheng, D., Li, H., (Sherman) Shen, X.: GLARM: group-based lightweight authentication scheme for resource-constrained machine to machine communications"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.comnet.2017.10.006","volume":"129","author":"Y Qiu","year":"2017","unstructured":"Qiu, Y., Ma, M., Chen, S.: An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems. Comput. Netw. 129, 306\u2013318 (2017)","journal-title":"Comput. Netw."},{"issue":"10","key":"9_CR11","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1002\/sec.1407","volume":"9","author":"S Chen","year":"2016","unstructured":"Chen, S., Ma, M.: An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems. Secur. Commun. Netw. 9(10), 1146\u20131157 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.procs.2016.06.006","volume":"89","author":"AK Ranjan","year":"2016","unstructured":"Ranjan, A.K., Hussain, M.: Terminal authentication in M2M communications in the context of internet of things. Procedia Comput. Sci. 89, 34\u201342 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.csi.2015.09.001","volume":"44","author":"H Chen","year":"2016","unstructured":"Chen, H., You, I., Weng, C., Cheng, C., Huang, Y.: A security gateway application for end-to-end M2M communications. Comput. Stand. Interfaces 44, 85\u201393 (2016)","journal-title":"Comput. Stand. Interfaces"},{"issue":"10","key":"9_CR14","doi-asserted-by":"crossref","first-page":"1528","DOI":"10.1002\/sec.695","volume":"7","author":"J-M Kim","year":"2014","unstructured":"Kim, J.-M., Jeong, H.-Y., Hong, B.-H.: A study of privacy problem solving using device and user authentication for M2M environments. Secur. Commun. Netw. 7(10), 1528\u20131535 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication, Technical report 39, Digital System Research Center (1989)","DOI":"10.1145\/74850.74852"},{"issue":"1","key":"9_CR16","first-page":"095","volume":"55","author":"R Cheng","year":"2018","unstructured":"Cheng, R., Xu, R., Tang, X., Sheng, V.S., Cai, C.: An abnormal network flow feature sequence prediction approach for DDoS attacks detection in big data environment. CMC: Comput. Mater. Continua 55(1), 095\u2013119 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"1","key":"9_CR17","first-page":"61","volume":"56","author":"W Xiaonian","year":"2018","unstructured":"Xiaonian, W., Chuyun, Z., Runlian, Z., Yujue, W., Jinhua, C.: A distributed intrusion detection model via nondestructive partitioning and balanced allocation for big data. CMC: Comput. Mater. Continua 56(1), 61\u201372 (2018)","journal-title":"CMC: Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T10:26:07Z","timestamp":1695032767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}