{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:56Z","timestamp":1740099176541,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":11,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811330940"},{"type":"electronic","value":"9789811330957"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-13-3095-7_15","type":"book-chapter","created":{"date-parts":[[2018,11,3]],"date-time":"2018-11-03T17:23:28Z","timestamp":1541265808000},"page":"190-198","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure and Achievable Heterogeneous Access Control Scheme for Wireless Body Area Networks"],"prefix":"10.1007","author":[{"given":"Zhaoqi","family":"Li","sequence":"first","affiliation":[]},{"given":"Yuyang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,4]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/JBHI.2013.2268897","volume":"18","author":"D He","year":"2014","unstructured":"He, D., Chan, S., Tang, S.: A novel and lightweight system to secure wireless medical sensor networks. IEEE J. Biomed. Health Inform. 18(1), 316\u2013326 (2014)","journal-title":"IEEE J. Biomed. Health Inform."},{"issue":"2","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0013-5","volume":"38","author":"Z Zhao","year":"2014","unstructured":"Zhao, Z.: An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), 1\u20137 (2014)","journal-title":"J. Med. Syst."},{"issue":"13","key":"15_CR3","doi-asserted-by":"publisher","first-page":"5389","DOI":"10.1109\/JSEN.2016.2554625","volume":"16","author":"F Li","year":"2016","unstructured":"Li, F., Hong, J.: Efficient certificateless access control for wireless body area networks. IEEE Sens. J. 16(13), 5389\u20135396 (2016)","journal-title":"IEEE Sens. J."},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology \u2013 CRYPTO 1997","author":"Y Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) $$\\ll $$ cost(signature) + cost(encryption). In: Kaliski, B.S. (ed.) Advances in Cryptology \u2013 CRYPTO 1997. LNCS, vol. 1294, pp. 165\u2013179. Springer, Heidelberg (1997). \nhttps:\/\/doi.org\/10.1007\/BFb0052234"},{"issue":"3","key":"15_CR5","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/s11432-010-0061-5","volume":"53","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Li, H.: Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Sci. China Inf. Sci. 53(3), 557\u2013566 (2010)","journal-title":"Sci. China Inf. Sci."},{"key":"15_CR6","first-page":"1","volume":"15","author":"MES Saeed","year":"2017","unstructured":"Saeed, M.E.S., Liu, Q., Tian, G.: HOOSC: heterogeneous online\/offline signcryption for the Internet of Things. Wirel. Netw. 15, 1\u201320 (2017)","journal-title":"Wirel. Netw."},{"key":"15_CR7","first-page":"1","volume":"99","author":"PY Ting","year":"2017","unstructured":"Ting, P.Y., Tsai, J.L., Wu, T.: Signcryption method suitable for low-power IoT device in a wireless sensor networks. IEEE Syst. J. 99, 1\u201310 (2017)","journal-title":"IEEE Syst. J."},{"key":"15_CR8","first-page":"1","volume":"99","author":"F Li","year":"2016","unstructured":"Li, F., Han, Y., Jin, C.: Cost-effective and anonymous access control for wireless body area netwoks. IEEE Syst. J. 99, 1\u201312 (2016)","journal-title":"IEEE Syst. J."},{"issue":"3","key":"15_CR9","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1016\/j.ins.2009.10.011","volume":"180","author":"Z Liu","year":"2010","unstructured":"Liu, Z., Hu, Y., Zhang, X.: Certificateless signcryption scheme in the standard model. Inf. Sci. 180(3), 452\u2013464 (2010)","journal-title":"Inf. Sci."},{"key":"15_CR10","unstructured":"Cagalaban, G., Kim, S.: Towards a secure patient information access control in ubiquitous healthcare system using identity-based signcryption. In: Proceedings of 13th International Conference on Advanced Communication Technology, pp. 863\u2013867 (2011)"},{"issue":"1","key":"15_CR11","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.adhoc.2012.04.015","volume":"11","author":"Kyung-Ah Shim","year":"2013","unstructured":"Shim, K.A., Lee, Y.R., Park, C.M.: EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw. 11(1), 182\u2013189 (2013)","journal-title":"Ad Hoc Networks"}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-3095-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,11,3]],"date-time":"2018-11-03T17:33:29Z","timestamp":1541266409000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-3095-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811330940","9789811330957"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-3095-7_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chendu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.scse.uestc.edu.cn\/fcs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}