{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:53:56Z","timestamp":1743094436698,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031357336"},{"type":"electronic","value":"9783031357343"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35734-3_20","type":"book-chapter","created":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T08:01:20Z","timestamp":1687075280000},"page":"200-209","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Strong Identity Authentication Scheme for Electric Power Internet of Things Based on SM9 Algorithm"],"prefix":"10.1007","author":[{"given":"Ji","family":"Deng","sequence":"first","affiliation":[]},{"given":"Lili","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Yongjin","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Qiutong","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,19]]},"reference":[{"issue":"9","key":"20_CR1","first-page":"86","volume":"19","author":"F Zhang","year":"2019","unstructured":"Zhang, F., Wang, Q., Song, L.: Research on unified identity authentication system based on biometrics. Netinfo Secur. 19(9), 86\u201390 (2019)","journal-title":"Netinfo Secur."},{"issue":"8","key":"20_CR2","first-page":"9","volume":"20","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Liu, J.: Multi-factor authentication protocol based on hardware finger print and biometrics. Netinfo Secur. 20(8), 9\u201315 (2020)","journal-title":"Netinfo Secur."},{"key":"20_CR3","unstructured":"Digi CertInc. Patent Application, Dynamic certificate generation on a certificate authority cloud, Published on line (USPTO20190356651). Medical Patent Business Week (2019)"},{"issue":"10","key":"20_CR4","first-page":"116","volume":"22","author":"R Yin","year":"2020","unstructured":"Yin, R., Gao, Y., Li, K.: Application of identity authentication technology in mobile applications in power industry. China New Commun. 22(10), 116 (2020)","journal-title":"China New Commun."},{"issue":"2","key":"20_CR5","first-page":"1","volume":"38","author":"D Huang","year":"2022","unstructured":"Huang, D., Zhang, Z., Liu, J.: Improvement and analysis of kerberos identity authentication protocol based on SM algorithms. J. Jinling Inst. Technol. 38(2), 1\u20138 (2022)","journal-title":"J. Jinling Inst. Technol."},{"issue":"275","key":"20_CR6","first-page":"1","volume":"47","author":"H Liao","year":"2020","unstructured":"Liao, H., Yu, G., Ban, G.: Research on identity authentication technology in power internet of things based on SM9 algorithm. Shang Dong Electr. Power 47(275), 1\u20134 (2020)","journal-title":"Shang Dong Electr. Power"},{"issue":"1","key":"20_CR7","first-page":"1","volume":"4","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Sun, G., Li, Y.: Research on mobile internet authentication scheme based on SM9 algorithm. NeTinfo Secur. 4(1), 1\u20138 (2021)","journal-title":"NeTinfo Secur."},{"issue":"53","key":"20_CR8","first-page":"2241","volume":"9","author":"M-D Wang","year":"2020","unstructured":"Wang, M.-D., He, W.-G., Li, J., Mei, R.: Optimal design of R-ate pair in SM9 algorithm. Commun. Technol. 9(53), 2241\u20132244 (2020)","journal-title":"Commun. Technol."},{"issue":"35","key":"20_CR9","first-page":"22","volume":"9","author":"Y-X Dong","year":"2022","unstructured":"Dong, Y.-X., Quan, J.-B., Wang, M.-R., Luo, M., Yang, Y.: Research on the application of SM9 algorithm in the security field of Internet of things. China Acad. J. Electron. Publishing House 9(35), 22\u201327 (2022)","journal-title":"China Acad. J. Electron. Publishing House"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"1900","DOI":"10.1360\/SSI-2021-0049","volume":"51","author":"J Lai","year":"2021","unstructured":"Lai, J., Huang, X., He, D.: Security analysis of SM9 digital signature and key encapsulation. Sci. Sin. Inform. 51, 1900\u20131913 (2021). (in Chinese)","journal-title":"Sci. Sin. Inform."},{"issue":"48","key":"20_CR11","first-page":"159","volume":"7","author":"C Zhang","year":"2022","unstructured":"Zhang, C., Peng, C.: Searchable encryption scheme based on china state cryptography standard SM9. Comput. Eng. 7(48), 159\u2013166 (2022)","journal-title":"Comput. Eng."},{"issue":"6","key":"20_CR12","first-page":"9","volume":"8","author":"F Tang","year":"2022","unstructured":"Tang, F., Gan, N.: Anti malicious KGC certificate less signature scheme based on block-chain and domestic cryptographic SM9. Chin. J. Netw. Inform. Secur. 8(6), 9\u201318 (2022)","journal-title":"Chin. J. Netw. Inform. Secur."},{"issue":"12","key":"20_CR13","first-page":"280","volume":"37","author":"T An","year":"2020","unstructured":"An, T., Ma, W., Liu, X.: Aggregate signature scheme based on SM9 cryptographic algorithm in VANET. Comput. Appl. Softw. 37(12), 280\u2013284 (2020)","journal-title":"Comput. Appl. Softw."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Complex, Intelligent and Software Intensive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35734-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T08:03:47Z","timestamp":1687075427000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35734-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031357336","9783031357343"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35734-3_20","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on Complex, Intelligent, and Software Intensive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto Metropolitan University, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"coisis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/cisis\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}