{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:49:11Z","timestamp":1761130151400,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031563959"},{"type":"electronic","value":"9783031563966"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56396-6_4","type":"book-chapter","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T10:23:05Z","timestamp":1713349385000},"page":"58-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improvement of\u00a0Cloud-Assisted Identity-Based Anonymous Authentication and\u00a0Key Agreement Protocol for\u00a0Secure WBAN"],"prefix":"10.1007","author":[{"given":"Sidoine","family":"Djimnaibeye","sequence":"first","affiliation":[]},{"given":"Aminata","family":"Ngom","sequence":"additional","affiliation":[]},{"given":"Igor","family":"Tchappi","sequence":"additional","affiliation":[]},{"given":"Borgou Mahamat","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Amro","family":"Najjar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,18]]},"reference":[{"key":"4_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"CRYPTO 1984","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"issue":"3","key":"4_CR2","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.inffus.2011.01.001","volume":"13","author":"H Debiao","year":"2012","unstructured":"Debiao, H., Jianhua, C., Jin, H.: An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 13(3), 223\u2013230 (2012)","journal-title":"Inf. Fusion"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Goutham, R.A., Lee, G.-J., Yoo, K.-Y.: An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards. In: Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC 2015, pp. 169\u2013174. Association for Computing Machinery, New York (2015)","DOI":"10.1145\/2695664.2695666"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, W., Lin, D., Zhang, H., Chen, C., Zhou, X.: A lightweight anonymous mutual authentication with key agreement protocol on ECC. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp. 170\u2013176 (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.234"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.compeleceng.2017.02.011","volume":"61","author":"X Li","year":"2017","unstructured":"Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., Choo, K.-K.R.: An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61, 238\u2013249 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10207-019-00464-9","volume":"19","author":"M Dasgupta","year":"2020","unstructured":"Dasgupta, M., Sowjanya, K., Ray, S.: An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring system. Int. J. Inf. Secur. 19, 129\u2013146 (2020)","journal-title":"Int. J. Inf. Secur."},{"issue":"3","key":"4_CR7","first-page":"1017","volume":"29","author":"A Braeken","year":"2019","unstructured":"Braeken, A., Patonico, S., Steenhaut, K.: Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model. Wireless Netw. 29(3), 1017\u20131029 (2019)","journal-title":"Wireless Netw."},{"issue":"4","key":"4_CR8","doi-asserted-by":"publisher","first-page":"2834","DOI":"10.1109\/TSG.2016.2620939","volume":"9","author":"A Mohammadali","year":"2018","unstructured":"Mohammadali, A., Haghighi, M.S., Tadayon, M.H., Mohammadi-Nodooshan, A.: A novel identity-based key establishment method for advanced metering infrastructure in smart grid. IEEE Trans. Smart Grid 9(4), 2834\u20132842 (2018)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"16","key":"4_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4137","volume":"32","author":"K Mahmood","year":"2019","unstructured":"Mahmood, K., Arshad, J., Chaudhry, S.A., Kumari, S.: An enhanced anonymous identity-based key agreement protocol for smart grid advanced metering infrastructure. Int. J. Commun. Syst. 32(16), e4137 (2019)","journal-title":"Int. J. Commun. Syst."},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"73182","DOI":"10.1109\/ACCESS.2020.2987764","volume":"8","author":"MF Moghadam","year":"2020","unstructured":"Moghadam, M.F., Nikooghadam, M., Jabban, M.A.B.A., Alishahi, M., Mortazavi, L., Mohajerzadeh, A.: An efficient authentication and key agreement scheme based on ECDH for wireless sensor network. IEEE Access 8, 73182\u201373192 (2020)","journal-title":"IEEE Access"},{"issue":"3","key":"4_CR11","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3390\/s21030936","volume":"21","author":"DK Kwon","year":"2021","unstructured":"Kwon, D.K., Yu, S.J., Lee, J.Y., Son, S.H., Park, Y.H.: WSN-SLAP: secure and lightweight mutual authentication protocol for wireless sensor networks. Sensors 21(3), 936 (2021)","journal-title":"Sensors"},{"key":"4_CR12","first-page":"1","volume":"15","author":"M Kumar","year":"2020","unstructured":"Kumar, M., Chand, S.: A lightweight cloud-assisted identity-based anonymous authentication and key agreement protocol for secure wireless body area network. IEEE Syst. J. 15, 1\u20138 (2020)","journal-title":"IEEE Syst. J."},{"key":"4_CR13","unstructured":"Rakeei, M.A., Moazami, F.: Cryptanalysis of an anonymous authentication and key agreement protocol for secure wireless body area network. Cryptology ePrint Archive, Report 2020\/1465 (2020). https:\/\/eprint.iacr.org\/2020\/1465"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TPDS.2013.145","volume":"25","author":"J Liu","year":"2014","unstructured":"Liu, J., Zhang, Z., Chen, X., Kwak, K.S.: Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25(2), 332\u2013342 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"4","key":"4_CR15","doi-asserted-by":"publisher","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","volume":"11","author":"D He","year":"2017","unstructured":"He, D., Zeadally, S., Kumar, N., Lee, J.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 2590\u20132601 (2017)","journal-title":"IEEE Syst. J."},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0331-2","volume":"39","author":"C Wang","year":"2015","unstructured":"Wang, C., Zhang, Y.: New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39, 1\u20138 (2015)","journal-title":"J. Med. Syst."},{"issue":"1","key":"4_CR17","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/JSYST.2019.2896064","volume":"14","author":"X Jia","year":"2020","unstructured":"Jia, X., He, D., Kumar, N., Choo, K.R.: A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Syst. J. 14(1), 560\u2013571 (2020)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.92","volume":"3","author":"M Nikooghadam","year":"2020","unstructured":"Nikooghadam, M., Amintoosi, H.: A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol. Secur. Priv. 3(1), e92 (2020)","journal-title":"Secur. Priv."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Safe, Secure, Ethical, Responsible Technologies and Emerging Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56396-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T10:23:54Z","timestamp":1713349434000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56396-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031563959","9783031563966"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56396-6_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"18 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAFER-TEA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Safe, Secure, Ethical, Responsible Technologies and Emerging Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yaound\u00e9","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cameroon","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"safertea2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/safertea.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"75","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}