{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:55:51Z","timestamp":1743116151598,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953874"},{"type":"electronic","value":"9783030953881"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95388-1_29","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:20:55Z","timestamp":1645518055000},"page":"439-452","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Authentication and Key Agreement Protocol of Smart Medical Systems Based on Blockchain Technology"],"prefix":"10.1007","author":[{"given":"Xiaohe","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jianbo","family":"Xu","sequence":"additional","affiliation":[]},{"given":"W.","family":"Liang","sequence":"additional","affiliation":[]},{"given":"W.","family":"Jian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1016\/j.procs.2021.01.083","volume":"179","author":"N Surantha","year":"2021","unstructured":"Surantha, N., Atmaja, P., David, W.M.: A review of wearable internet-of-things device for healthcare. Procedia Comput. Sci. 179, 936\u2013943 (2021)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"29_CR2","first-page":"468","volume":"579","author":"LA Wei","year":"2021","unstructured":"Wei, L.A., Zn, B., Sx, A., et al.: Secure fusion approach for the internet of things in smart autonomous multi-robot systems. Inform. Sci. 579(1), 468\u2013482 (2021)","journal-title":"Inform. Sci."},{"issue":"7","key":"29_CR3","doi-asserted-by":"publisher","first-page":"6392","DOI":"10.1109\/JIOT.2020.2974281","volume":"7","author":"W Liang","year":"2020","unstructured":"Liang, W., Huang, W., Long, J., Zhang, K., Li, K., Zhang, D.: Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet Things J. 7(7), 6392\u20136401 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.2974281","journal-title":"IEEE Internet Things J."},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"101883","DOI":"10.1016\/j.sysarc.2020.101883","volume":"113","author":"B Narwal","year":"2020","unstructured":"Narwal, B., Mohapatra, A.K.: A survey on security and authentication in wireless body area networks. J. Syst. Architect. 113, 101883 (2020)","journal-title":"J. Syst. Architect."},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.cose.2019.03.002","volume":"83","author":"V Odelu","year":"2019","unstructured":"Odelu, V., Saha, S., Prasath, R., Sadineni, L., Conti, M., Jo, M.: Efficient privacy preserving device authentication in WBAN for industrial e-health applications. Comput. Secur. 83, 312 (2019)","journal-title":"Comput. Secur."},{"key":"29_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/5860286","volume":"2019","author":"Y Xie","year":"2019","unstructured":"Xie, Y., Zhang, S., Li, X., Li, Y., Chai, Y., Zhang, M.: CasCP: efficient and secure certificateless authentication scheme for wireless body area networks with conditional privacy-preserving. Secur. Commun. Networks 2019, 1\u201313 (2019)","journal-title":"Secur. Commun. Networks"},{"issue":"6","key":"29_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.jpdc.2020.11.003","volume":"149","author":"Z Xu","year":"2021","unstructured":"Xu, Z., Liang, W., Li, K.C., et al.: A blockchain-based Roadside Unit- assisted authentication and key agreement protocol for Internet of Vehicles. J. Parallel Distrib. Comput. 149(6), 29\u201339 (2021)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"7","key":"29_CR8","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.3390\/app8071074","volume":"8","author":"C-M Chen","year":"2018","unstructured":"Chen, C.-M., Xiang, B., Wu, T.-Y., Wang, K.-H.: An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks. Appl. Sci. 8(7), 1074 (2018)","journal-title":"Appl. Sci."},{"key":"29_CR9","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.comnet.2018.11.016","volume":"148","author":"M Kompara","year":"2019","unstructured":"Kompara, M., Hafizul Islam, S.K., H\u00f6lbl, M.: A robust and efficient mutual authentication and key agreement scheme with untraceability for WBAN. Comput. Networks 148, 196\u2013213 (2019)","journal-title":"Comput. Networks"},{"key":"29_CR10","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.comnet.2018.05.006","volume":"140","author":"AM Koya","year":"2018","unstructured":"Koya, A.M., Deepthi, P.P.: Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput. Networks 140, 138\u2013151 (2018)","journal-title":"Comput. Networks"},{"key":"29_CR11","doi-asserted-by":"publisher","unstructured":"Meng, X., Xu, J., Liang, W., Li, K.-C.: An anonymous mutual authentication and key agreement scheme in WBAN. In: 2019 IEEE 5th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Washington, DC, USA, pp. 31\u201336 (2019). https:\/\/doi.org\/10.1109\/BigDataSecurity-HPSCIDS.2019.00017","DOI":"10.1109\/BigDataSecurity-HPSCIDS.2019.00017"},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"101777","DOI":"10.1016\/j.sysarc.2020.101777","volume":"110","author":"G Mwitende","year":"2020","unstructured":"Mwitende, G., Ye, Y., Ali, I., Li, F.: Certificateless authenticated key agreement for blockchain-based WBAN. J. Syst. Archit. 110, 101777 (2020)","journal-title":"J. Syst. Archit."},{"issue":"9","key":"29_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.23919\/JCC.2020.09.004","volume":"17","author":"J Xu","year":"2020","unstructured":"Xu, J., Meng, X., Liang, W., et al.: A secure mutual authentication scheme of blockchain- based in WBAN. China Commun. 17(9), 34\u201349 (2020)","journal-title":"China Commun."},{"issue":"3","key":"29_CR14","doi-asserted-by":"publisher","first-page":"1414","DOI":"10.1109\/TETC.2020.2993032","volume":"9","author":"W Liang","year":"2020","unstructured":"Liang, W., Zhang, D., Lei, X., Tang, M., Zomaya, Y.: Circuit copyright blockchain: block chainbased homomorphic encryption for IP circuit protection. IEEE Trans. Emerg. Topics Comput. 9(3), 1414\u20131420 (2020). https:\/\/doi.org\/10.1109\/TETC.2020.2993032","journal-title":"IEEE Trans. Emerg. Topics Comput."},{"key":"29_CR15","first-page":"1","volume":"99","author":"W Liang","year":"2020","unstructured":"Liang, W., Zhang, D., Lei, X., et al.: Circuit copyright blockchain: blockchain-based homomorphic encryption for IP circuit protection. IEEE Trans. Emerg. Topics Comput. 99, 1\u20131 (2020)","journal-title":"IEEE Trans. Emerg. Topics Comput."},{"key":"29_CR16","first-page":"1","volume":"99","author":"W Liang","year":"2021","unstructured":"Liang, W., Xiao, L., Zhang, K., et al.: Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet Things J. 99, 1\u20131 (2021)","journal-title":"IEEE Internet Things J."},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.jpdc.2020.11.003","volume":"149","author":"X Zisang","year":"2021","unstructured":"Zisang, X., Wei, L., Ching, L.K., Jianbo, X., Hai, J.: A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles. J. Parallel Distrib. Comput. 149, 29\u201339 (2021)","journal-title":"J. Parallel Distrib. Comput."},{"key":"29_CR18","unstructured":"Blanchet, B.: ProVerif Automatic Cryptographic Protocol Verifier User Manual. Departement dInformatique, Ecole Normale Superieure, CNRS, Paris, France (2005)"},{"issue":"1","key":"29_CR19","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.M., et al.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95388-1_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:31:35Z","timestamp":1645518695000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95388-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953874","9783030953881"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95388-1_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"403","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.12","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}