{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T23:40:01Z","timestamp":1750030801436,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811039683"},{"type":"electronic","value":"9789811039690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3969-0_44","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T14:54:59Z","timestamp":1488466499000},"page":"401-409","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An ID-Based Anonymous Authentication Scheme for Distributed Mobile Cloud Computing"],"prefix":"10.1007","author":[{"given":"Tianyi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Fengtong","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"44_CR1","unstructured":"ABI Research Report, Mobile Cloud Applications. http:\/\/www.Abiresearch.com\/"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Le, G., Xu, K., Song, M., Song, J.: A survey on research on mobile cloud computing. In: International Conference on Computer and Information Science, pp. 387\u2013392 (2011)","DOI":"10.1109\/ICIS.2011.67"},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Qiu, X.F., Liu, J.W., Zhao, P.C.: Secure cloud computing architecture on mobile internet. In: International Conference on AIMSEC, pp. 619\u2013622 (2011)","DOI":"10.1109\/AIMSEC.2011.6010435"},{"issue":"1","key":"44_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.future.2012.05.023","volume":"29","author":"N Fernando","year":"2013","unstructured":"Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gen. Comput. Sys. 29(1), 84\u2013106 (2013)","journal-title":"Future Gen. Comput. Sys."},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Song, W.G., Su, X.L.: Review of mobile cloud computing. In: IEEE 3rd ICCSN, pp. 1\u20134 (2011)","DOI":"10.1109\/ICCSN.2011.6014374"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Urien, P., Marie, E., Kiennert, C.: An innovative solution for cloud computing authentication: grids of EAP-TLS smart cards. In: International Conference on Digital Telecommunications, pp. 22\u201327 (2010)","DOI":"10.1109\/ICDT.2010.12"},{"key":"44_CR7","series-title":"Communications in Computer and Information Service","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-23312-8_16","volume-title":"Advanced Communication and Networking","author":"H Ahn","year":"2011","unstructured":"Ahn, H., Chang, H., Jang, C., Choi, E.: User authentication platform using provisioning in cloud computing environment. In: Kim, T., Adeli, H., Robles, R.J., Balitanas, M. (eds.) Advanced Communication and Networking. Communications in Computer and Information Service, vol. 199, pp. 132\u2013138. Springer, Heidelberg (2011)"},{"key":"44_CR8","first-page":"338","volume":"151","author":"H Chang","year":"2011","unstructured":"Chang, H., Choi, E.: User authentication in cloud computing. UCMACCIS 151, 338\u2013342 (2011)","journal-title":"UCMACCIS"},{"issue":"7","key":"44_CR9","doi-asserted-by":"publisher","first-page":"1100","DOI":"10.1109\/LCOMM.2012.052112.120525","volume":"16","author":"JL Tsai","year":"2012","unstructured":"Tsai, J.L., Lo, N.W., Wu, T.C.: Secure delegation-based authentication protocol for wireless roaming service. IEEE Commun. Lett. 16(7), 1100\u20131102 (2012)","journal-title":"IEEE Commun. Lett."},{"issue":"2","key":"44_CR10","first-page":"11","volume":"20","author":"K Hyeonseung","year":"2010","unstructured":"Hyeonseung, K., Chunsik, P.: Cloud computing and personal authentication service. J. Korea Inst. Inf. Secur. Cryptol. 20(2), 11\u201319 (2010)","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."},{"issue":"177","key":"44_CR11","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"44_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). doi: 10.1007\/3-540-39799-X_31"},{"key":"44_CR13","unstructured":"Recommendation for key management\u2014Part1: General. Gaithersburg, MD, USA, August, pp. 800-57. Special Publication (2005)"},{"key":"44_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44647-8_13"},{"key":"44_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-36288-6_2","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"JC Choon","year":"2003","unstructured":"Choon, J.C., Hee Cheon, J.: An identity-based signature from gap Diffie-Hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18\u201330. Springer, Heidelberg (2003). doi: 10.1007\/3-540-36288-6_2"},{"key":"44_CR16","doi-asserted-by":"crossref","unstructured":"Du, H.Z., Wen, Q.Y.: An efficient identity-based short signature Scheme from bilinear pairings. In: Proceedings of International Conference CIS, pp. 725\u2013729 (2007)","DOI":"10.1109\/CIS.2007.168"},{"key":"44_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-540-24685-5_69","volume-title":"Computational Science - ICCS 2004","author":"HW Lim","year":"2004","unstructured":"Lim, H.W., Robshaw, M.J.B.: On ientity-based cryptography and grid computing. In: Bubak, M., Albada, G.D., Sloot, Peter, M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 474\u2013477. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24685-5_69"},{"key":"44_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/11508380_27","volume-title":"Advances in Grid Computing - EGC 2005","author":"HW Lim","year":"2005","unstructured":"Lim, H.W., Robshaw, M.J.B.: A dynamic key infrastructure for grid. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255\u2013264. Springer, Heidelberg (2005). doi: 10.1007\/11508380_27"},{"key":"44_CR19","unstructured":"Mao, W.: An identity-based non-interactive authentication framework for computational grids. Technical report HPL-2004-96, HP Labs, Palo Alto, CA, USA (2004)"},{"key":"44_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-10665-1_14","volume-title":"Cloud Computing","author":"H Li","year":"2009","unstructured":"Li, H., Dai, Y., Tian, L., Yang, H.: Identity-based authentication for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 157\u2013166. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-10665-1_14"},{"issue":"1","key":"44_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3233\/JCS-2004-12102","volume":"12","author":"VS Hughes","year":"2004","unstructured":"Hughes, V.S.: Information hiding, anonymity and privacy a modular approach. J. Comput. Security 12(1), 3\u201336 (2004)","journal-title":"J. Comput. Security"},{"issue":"4","key":"44_CR22","doi-asserted-by":"publisher","first-page":"2004","DOI":"10.1109\/TII.2012.2230639","volume":"9","author":"JL Tsai","year":"2013","unstructured":"Tsai, J.L., Lo, N.W., Wu, T.C.: Novel anonymous authentication scheme using smart cards. IEEE Trans. Ind. Inform. 9(4), 2004\u20132013 (2013)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3","key":"44_CR23","first-page":"805","volume":"9","author":"JL Tsai","year":"2015","unstructured":"Tsai, J.L., Lo, N.W.: A privacy-aware authentication scheme for distributed mobile cloud computing services. Syst. J. 9(3), 805\u2013815 (2015)","journal-title":"Syst. J."},{"issue":"3","key":"44_CR24","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.cose.2005.09.002","volume":"25","author":"ML Das","year":"2006","unstructured":"Das, M.L., Saxena, A., Gulati, V.P., Phafstak, D.B.: A novel remote user authentication scheme using bilinear pairings. Comput. Secur. 25(3), 184\u2013189 (2006)","journal-title":"Comput. Secur."},{"key":"44_CR25","unstructured":"Chou, J.S., Chen, Y., Lin, J.Y.: Improvement of Das et al.\u2019s remote user authentication scheme. Cryptology ePrint Archive (2005)"},{"issue":"1","key":"44_CR26","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.csi.2007.11.016","volume":"31","author":"T Goriparthia","year":"2009","unstructured":"Goriparthia, T., Das, M.L., Saxena, A.: An improved bilinear pairing based remote user authentication scheme. Comput. Std. Interfaces 31(1), 181\u2013185 (2009)","journal-title":"Comput. Std. Interfaces"},{"key":"44_CR27","doi-asserted-by":"crossref","unstructured":"Khan Pathan, A.S., Hong, C.S., Hee, K.: Bilinear-pairing-based remote user authentication schemes using smart cards. In Proceedings of 3rd International Conference Ubiquitous Information Management Communication, pp. 356\u2013361 (2009)","DOI":"10.1145\/1516241.1516303"},{"key":"44_CR28","doi-asserted-by":"crossref","unstructured":"Chen, T.H., Yeh, H.L., Shih, W.K.: An advanced ECC dynamic ID-based remote mutual authentication scheme for cloud computing. In: International Conference on Multimedia Ubiquitous Engineering, pp. 155\u2013159 (2011)","DOI":"10.1109\/MUE.2011.69"},{"key":"44_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-642-33469-6_34","volume-title":"Web Information Systems and Mining","author":"D Wang","year":"2012","unstructured":"Wang, D., Mei, Y., Ma, C., Cui, Z.: Comments on an advanced dynamic ID-based authentication scheme for cloud computing. In: Wang, F.L., Lei, J., Gong, Z., Luo, X. (eds.) WISM 2012. LNCS, vol. 7529, pp. 246\u2013253. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-33469-6_34"},{"issue":"4","key":"44_CR30","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.12785\/amis\/070414","volume":"7","author":"H Sun","year":"2013","unstructured":"Sun, H., Wen, Q., Zhang, H., Jin, Z.: A novel remote user authentication and key agreement scheme for mobile client\u2013server environment. Appl. Math. Inf. Sci. 7(4), 1365\u20131374 (2013)","journal-title":"Appl. Math. Inf. Sci."}],"container-title":["Communications in Computer and Information Science","Geo-Spatial Knowledge and Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3969-0_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T23:21:11Z","timestamp":1750029671000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3969-0_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811039683","9789811039690"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3969-0_44","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"3 March 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GRMSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"grmse2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.grmse2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}