{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:34:58Z","timestamp":1742913298607,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688509"},{"type":"electronic","value":"9783030688516"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68851-6_23","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T07:04:02Z","timestamp":1612422242000},"page":"312-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A New Certificateless Aggregate Signature Scheme for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Yihong","family":"Wen","sequence":"first","affiliation":[]},{"given":"Yi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shicheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"given":"Min","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"issue":"5","key":"23_CR1","doi-asserted-by":"publisher","first-page":"9064","DOI":"10.1109\/JIOT.2019.2927089","volume":"6","author":"NB Gayathri","year":"2019","unstructured":"Gayathri, N.B., et al.: Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks. IEEE Internet Things J. 6(5), 9064\u20139075 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"23_CR2","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"issue":"10","key":"23_CR3","doi-asserted-by":"publisher","first-page":"3558","DOI":"10.1109\/JSEN.2013.2272099","volume":"13","author":"P Bellavista","year":"2013","unstructured":"Bellavista, P., Cardone, G., Corradi, A., Foschini, L.: Convergence of manet and WSN in IoT urban scenarios. IEEE Sens. J. 13(10), 3558\u20133567 (2013)","journal-title":"IEEE Sens. J."},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-030-24907-6_6","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"A Alazeb","year":"2019","unstructured":"Alazeb, A., Panda, B.: Ensuring data integrity in fog computing based health-care systems. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 63\u201377. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24907-6_6"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K., Shieh, S.: IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA) (2014)","DOI":"10.1109\/SOCA.2014.58"},{"issue":"1","key":"23_CR6","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3390\/s120100055","volume":"12","author":"P Kumar","year":"2012","unstructured":"Kumar, P., Lee, H.J.: Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 12(1), 55\u201391 (2012)","journal-title":"Sensors"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Sghaier, N., et al.: Wireless sensor networks for medical care services. In: Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey, 4\u20138 July 2011 (2011)","DOI":"10.1109\/IWCMC.2011.5982596"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Othman, S.B., Bahattab, A.A., Trad, A., Youssef, H.: Secure data transmission protocol for medical wireless sensor networks. In: IEEE International Conference on Advanced Information Networking & Applications (2014)","DOI":"10.1109\/AINA.2014.80"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-24907-6_1","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"Y Semenko","year":"2019","unstructured":"Semenko, Y., Saucez, D.: Distributed privacy preserving platform for ridesharing services. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 1\u201314. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24907-6_1"},{"issue":"11","key":"23_CR10","doi-asserted-by":"publisher","first-page":"R27","DOI":"10.1088\/0967-3334\/29\/11\/R01","volume":"29","author":"Y Hao","year":"2008","unstructured":"Hao, Y., Foster, R.: Wireless body sensor networks for health-monitoring applications. Physiol. Meas. 29(11), R27\u2013R56 (2008)","journal-title":"Physiol. Meas."},{"issue":"8","key":"23_CR11","first-page":"1697","volume":"34","author":"CR Baker","year":"2007","unstructured":"Baker, C.R., et al.: Wireless sensor networks for home health care. Int. J. Theoret. Phys. 34(8), 1697\u20131710 (2007)","journal-title":"Int. J. Theoret. Phys."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Sedjelmaci, H., Senouci, S.M., Al-Bahri, M.: A lightweight anomaly detection technique for low-resource IoT devices: a game-theoretic methodology. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICC.2016.7510811"},{"key":"23_CR13","first-page":"174","volume":"19","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K.E., Gupta, B.B., Ishibashi, Y.: Security, privacy & efficiency of sustainable cloud computing for big data & IoT. Sustain. Comput.: Inf. Syst. 19, 174\u2013184 (2018)","journal-title":"Sustain. Comput.: Inf. Syst."},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"issue":"1","key":"23_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2017.1600363CM","volume":"55","author":"J Zhou","year":"2017","unstructured":"Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26\u201333 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"11","key":"23_CR16","first-page":"20","volume":"90","author":"JS Kumar","year":"2014","unstructured":"Kumar, J.S., Patel, D.R.: A survey on internet of things: security and privacy issues. Int. J. Comput. Appl. 90(11), 20\u201326 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","volume":"5","author":"S Challa","year":"2017","unstructured":"Challa, S., et al.: Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5, 3028\u20133043 (2017)","journal-title":"IEEE Access"},{"issue":"9","key":"23_CR18","doi-asserted-by":"publisher","first-page":"5099","DOI":"10.1109\/TII.2019.2894108","volume":"15","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Deng, R.H., Zheng, D., Li, J., Wu, P., Cao, J.: Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Trans. Ind. Inform. 15(9), 5099\u20135108 (2019)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"23_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N.: A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126, 45\u201358 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Yang, Y., He, D., Wang, H., Zhou, L.: An efficient blockchain-based batch verification scheme for vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. (2019)","DOI":"10.1002\/ett.3857"},{"issue":"1","key":"23_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39\u201368 (2007)","journal-title":"J. Comput. Secur."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Zhu, H., Ho, P.H., Shen, X.: ECPP: efficient conditional privacy preservation protocol for secure vehicular communications. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1229\u20131237. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.179"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, C., Lin, X., Lu, R., Ho, P.H., RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks. In: 2008 IEEE International Conference on Communications, pp. 1451\u20131457. IEEE (2008)","DOI":"10.1109\/ICC.2008.281"},{"issue":"6","key":"23_CR24","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1007\/s11276-013-0543-7","volume":"19","author":"C-C Lee","year":"2013","unstructured":"Lee, C.-C., Lai, Y.-M.: Toward a secure batch verification with group testing for VANET. Wirel. Netw. 19(6), 1441\u20131449 (2013). https:\/\/doi.org\/10.1007\/s11276-013-0543-7","journal-title":"Wirel. Netw."},{"issue":"4","key":"23_CR25","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TVT.2012.2186992","volume":"61","author":"K-A Shim","year":"2012","unstructured":"Shim, K.-A.: CPAS: an efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Trans. Veh. Technol. 61(4), 1874\u20131883 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"5","key":"23_CR26","doi-asserted-by":"publisher","first-page":"2559","DOI":"10.1016\/j.eswa.2013.10.003","volume":"41","author":"JK Liu","year":"2014","unstructured":"Liu, J.K., Yuen, T.H., Au, M.H., Susilo, W.: Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5), 2559\u20132564 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"12","key":"23_CR27","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Baowen, X., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681\u20132691 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"99","key":"23_CR28","first-page":"1","volume":"PP","author":"J Liu","year":"2018","unstructured":"Liu, J., Cao, H., Li, Q., Cai, F., Du, X., Guizani, M.: A large-scale concurrent data anonymous batch verification scheme for mobile healthcare crowd sensing. IEEE Internet Things J. PP(99), 1 (2018)","journal-title":"IEEE Internet Things J."},{"key":"23_CR29","first-page":"2018","volume":"1\u201313","author":"W Libing","year":"2018","unstructured":"Libing, W., Zhiyan, X., He, D., Wang, X.: New certificateless aggregate signature scheme for healthcare multimedia social network on cloud environment. Secur. Commun. Netw. 1\u201313, 2018 (2018)","journal-title":"Secur. Commun. Netw."},{"key":"23_CR30","doi-asserted-by":"publisher","first-page":"15170","DOI":"10.1109\/ACCESS.2019.2894895","volume":"7","author":"Y Xie","year":"2019","unstructured":"Xie, Y., Li, X., Zhang, S., Li, Y.: ICLAS: an improved certificateless aggregate signature scheme for healthcare wireless sensor networks. IEEE Access 7, 15170\u201315182 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"23_CR31","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000). https:\/\/doi.org\/10.1007\/s001450010003","journal-title":"J. Cryptol."}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68851-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T07:27:10Z","timestamp":1612423630000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68851-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688509","9783030688516"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68851-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}