{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T16:46:53Z","timestamp":1758991613237,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030977733"},{"type":"electronic","value":"9783030977740"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-97774-0_10","type":"book-chapter","created":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T08:06:40Z","timestamp":1647245200000},"page":"112-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Mobile Terminal Identity Authentication Method Based on IBC"],"prefix":"10.1007","author":[{"given":"Xuqiu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Su","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,15]]},"reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"issue":"S2","key":"10_CR3","first-page":"65","volume":"35","author":"A Xu","year":"2018","unstructured":"Xu, A., Liu, G., Xu, Y.: Security protection technology of smart substation based on SM9 identification code. Autom. Expo 35(S2), 65\u201371 (2018)","journal-title":"Autom. Expo"},{"issue":"11","key":"10_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.electacta.2018.08.151","volume":"46","author":"X Ma","year":"2018","unstructured":"Ma, X., Ma, W., Liu, X.: Cross-domain authentication scheme based on blockchain technology. Acta Electron. Sin. 46(11), 9 (2018)","journal-title":"Acta Electron. Sin."},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"33689","DOI":"10.1109\/ACCESS.2020.2973695","volume":"8","author":"J Jin","year":"2020","unstructured":"Jin, J., Kim, K.: 3D CUBE algorithm for the key generation method: applying deep neural network learning-based. IEEE Access 8, 33689\u201333702 (2020)","journal-title":"IEEE Access"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Jhajharia, S., Mishra, S., Bali, S.: Public key cryptography using neural networks and genetic algorithms. In: International Conference on Contemporary Computing. IEEE (2013)","DOI":"10.1109\/IC3.2013.6612177"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Alimohammadi, N., Shokouhi, B.: Secure hardware key based on Physically Unclonable Functions and artificial Neural Network. In: 2016 8th International Symposium on Telecommunications (IST). IEEE (2016)","DOI":"10.1109\/ISTEL.2016.7881924"},{"key":"10_CR8","unstructured":"Wei, H.: Password Authentication Using Hopfield Neural Networks (2012)"},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5121\/acij.2011.2404","volume":"2","author":"ASN Chakravarthy","year":"2011","unstructured":"Chakravarthy, A.S.N., Avadhani, P.S., Krishna Prasad, P.E.S.N., et al.: A novel approach for authenticating textual or graphical passwords using hopfield neural network. Adv. Comput.: Int. J. 2(4), 33\u201342 (2011). https:\/\/doi.org\/10.5121\/acij.2011.2404","journal-title":"Adv. Comput.: Int. J."},{"issue":"1","key":"10_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2299\/jsp.17.1","volume":"17","author":"A Tanaka","year":"2013","unstructured":"Tanaka, A., Kinoshita, K., Kishida, S.: Construction and performance of authentication systems for fingerprint with neural networks. J. Signal Process. 17(1), 1\u20139 (2013)","journal-title":"J. Signal Process."},{"issue":"3","key":"10_CR11","doi-asserted-by":"publisher","first-page":"2050022","DOI":"10.1142\/S0219467820500229","volume":"20","author":"S Debnath","year":"2020","unstructured":"Debnath, S., Roy, P.: User authentication system based on speech and cascade hybrid facial feature. Int. J. Image Graph. 20(3), 2050022 (2020)","journal-title":"Int. J. Image Graph."},{"key":"10_CR12","first-page":"376","volume":"5","author":"A Bouzalmat","year":"2011","unstructured":"Bouzalmat, A., Belghini, N., Zarghili, A., et al.: Face recognition using neural network based fourier gabor filters & random projection. Int. J. Comput. Sci. Secur. (IJCSS) 5, 376\u2013386 (2011)","journal-title":"Int. J. Comput. Sci. Secur. (IJCSS)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Wu, J., Jing, D., et al.:Jamming ACK attack to wireless networks and a mitigation approach. In: Global Telecommunications Conference (2008)","DOI":"10.1109\/GLOCOM.2008.ECP.950"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"772","DOI":"10.1016\/j.future.2017.08.004","volume":"87","author":"M Qiu","year":"2018","unstructured":"Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. Future Gener. Comput. Syst. 87, 772\u2013781 (2018). https:\/\/doi.org\/10.1016\/j.future.2017.08.004","journal-title":"Future Gener. Comput. Syst."},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.inffus.2019.07.012","volume":"55","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Qiu, M., Lu, Z.: Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 55, 59\u201367 (2020)","journal-title":"Inf. Fusion"},{"key":"10_CR16","unstructured":"Lin, S., Xi, S., Lin, et al.: Speaker recognition based on i-vector and deep learning. Comput. Technol. Dev. (2017)"},{"issue":"09","key":"10_CR17","first-page":"291","volume":"37","author":"F Qiu","year":"2020","unstructured":"Qiu, F., Hu, K., et al.: Distributed control identity authentication technology of distribution network based on national secret SM9. Comput. App. Softw. 37(09), 291\u2013295 (2020)","journal-title":"Comput. App. Softw."},{"key":"10_CR18","unstructured":"Zhu, X., Xu, H.: A fingerprinting authentication system design based on PKI (2006)"},{"key":"10_CR19","unstructured":"Ohkubo, C., Muraoka, Y.: Biometric authentication using PKI. DBLP (2003)"},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"10327","DOI":"10.1109\/JIOT.2020.3048038","volume":"8","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet of Things J. 8, 10327\u201310335 (2020)","journal-title":"IEEE Internet of Things J."},{"issue":"5","key":"10_CR21","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1016\/j.jcss.2012.11.002","volume":"79","author":"M Qiu","year":"2013","unstructured":"Qiu, M., Zhang, L., et al.: Security-aware optimization for ubiquitous computing systems with SEAT graph approach. J. Comput. Syst. Sci. 79(5), 518\u2013529 (2013)","journal-title":"J. Comput. Syst. Sci."},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1109\/JBHI.2020.2973467","volume":"24","author":"H Qiu","year":"2020","unstructured":"Qiu, H., Qiu, M., Liu, M., Memmi, G.: Secure health data sharing for medical cyber-physical systems for the healthcare 4.0. IEEE J. Biomed. Health 24, 2499\u20132505 (2020)","journal-title":"IEEE J. Biomed. Health"},{"issue":"3","key":"10_CR23","first-page":"330","volume":"73","author":"G Wu","year":"2013","unstructured":"Wu, G., Zhang, H., Qiu, M., et al.: A decentralized approach for mining event correlations in distributed system monitoring. JPDC 73(3), 330\u2013340 (2013)","journal-title":"JPDC"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Guo, Y., Zhuge, Q., Hu, J., et al.: Optimal data allocation for scratch-pad memory on embedded multi-core systems. In: IEEE ICPP Conference, pp. 464\u2013471 (2011)","DOI":"10.1109\/ICPP.2011.79"}],"container-title":["Lecture Notes in Computer Science","Smart Computing and Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-97774-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T08:08:15Z","timestamp":1647245295000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-97774-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030977733","9783030977740"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-97774-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"15 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.cloud-conf.net\/smartcom\/2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"165","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held online due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}