{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:39:22Z","timestamp":1743097162274,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811554100"},{"type":"electronic","value":"9789811554117"}],"license":[{"start":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T00:00:00Z","timestamp":1606348800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T00:00:00Z","timestamp":1606348800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-5411-7_4","type":"book-chapter","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T16:04:27Z","timestamp":1606320267000},"page":"47-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture"],"prefix":"10.1007","author":[{"given":"Soumya","family":"Banerjee","sequence":"first","affiliation":[]},{"given":"Vanga","family":"Odelu","sequence":"additional","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Debasis","family":"Giri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,26]]},"reference":[{"key":"4_CR1","unstructured":"SPAN, the Security Protocol ANimator for AVISPA. http:\/\/www.avispa-project.org. Accessed on September 2018"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.tcs.2011.12.004","volume":"422","author":"N Attrapadung","year":"2012","unstructured":"Attrapadung, N., Herranz, J., Laguillaumie, F., Libert, B., De Panafieu, E., R\u00e0fols, C.: Attribute-based encryption schemes with constant-size ciphertexts. Theor. Comput. Sci. 422, 15\u201338 (2012)","journal-title":"Theor. Comput. Sci."},{"issue":"15","key":"4_CR3","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"4_CR4","unstructured":"Bertino, E., Shang, N., Jr., S.S.W.: An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE Trans. Dependable Sec. Comput. 5(2), 65\u201370 (2008)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (S&P\u201907), pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Carlin, A., Hammoudeh, M., Aldabbas, O.: Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges. Int. J. Adv. Comput. Sci. Appl. 6(6) (2015)","DOI":"10.14569\/IJACSA.2015.060601"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Challa, S., Wazid, M., Das, A.K., Kumar, N., Reddy, A.G., Yoon, E.J., Yoo, K.Y.: Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5, 3028\u20133043 (2017)","DOI":"10.1109\/ACCESS.2017.2676119"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: 16th ACM Conference on Computer and Communications Security (CCS\u201909), pp. 121\u2013130. Chicago, Illinois, USA (2009)","DOI":"10.1145\/1653662.1653678"},{"issue":"9","key":"4_CR9","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1002\/sec.1140","volume":"8","author":"S Chatterjee","year":"2015","unstructured":"Chatterjee, S., Das, A.K.: An effective ecc-based user access control scheme with attribute-based encryption for wireless sensor networks. Sec. Commun. Netw. 8(9), 1752\u20131771 (2015)","journal-title":"Sec. Commun. Netw."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques- Advances in Cryptology (Eurocrypt\u201904). LNCS, vol. 3027, pp. 523\u2013540. Springer, Interlaken, Switzerland (2004)","DOI":"10.1007\/978-3-540-24676-3_31"},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Ghafir, I., Prenosil, V., Alhejailan, A., Hammoudeh, M.: Social engineering attack strategies and defence approaches. In: IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud\u201916), pp. 145\u2013149 (2016)","DOI":"10.1109\/FiCloud.2016.28"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and Communications Security (CCS\u201906), pp. 89\u201398. Alexandria, VA, USA (2006)","DOI":"10.1145\/1180405.1180418"},{"issue":"7","key":"4_CR14","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gen. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Future Gen. Comput. Syst."},{"issue":"5","key":"4_CR15","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TIFS.2014.2309858","volume":"9","author":"F Guo","year":"2014","unstructured":"Guo, F., Mu, Y., Susilo, W., Wong, D.S., Varadharajan, V.: CP-ABE with constant-size keys for lightweight devices. IEEE Trans. Inf. Forensics Sec. 9(5), 763\u2013771 (2014)","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Hanumanthappa, P., Singh, S.: Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication. In: International Conference on Innovations in Information Technology (IIT\u201912), pp. 107\u2013112. IEEE (2012)","DOI":"10.1109\/INNOVATIONS.2012.6207712"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Jeong, J., Chung, M.Y., Choo, H.: Integrated otp-based user authentication scheme using smart cards in home networks. In: 41st Annual Hawaii International Conference on System Sciences, pp. 294\u2013294. IEEE (2008)","DOI":"10.1109\/HICSS.2008.208"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Annual International Cryptology Conference, pp. 388\u2013397. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"8","key":"4_CR19","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1109\/TIFS.2013.2271848","volume":"8","author":"J Lai","year":"2013","unstructured":"Lai, J., Deng, R.H., Guan, C., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Sec. 8(8), 1343\u20131354 (2013)","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"issue":"8","key":"4_CR20","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201\u20132210 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.future.2015.01.009","volume":"55","author":"A Lounis","year":"2016","unstructured":"Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y.: Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Future Gen. Comput. Syst. 55, 266\u2013277 (2016)","journal-title":"Future Gen. Comput. Syst."},{"issue":"5","key":"4_CR22","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."},{"key":"4_CR23","unstructured":"von Oheimb, D.: The high-level protocol specification language hlpsl developed in the eu project avispa. In: Proceedings of 3rd APPSEM II (Applied Semantics II) Workshop (APPSEM\u201905), pp. 1\u201317. Frauenchiemsee, Germany (2005)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on Computer and Communications Security (CCS\u201907), pp. 195\u2013203. Alexandria, VA, USA (2007)","DOI":"10.1145\/1315245.1315270"},{"issue":"9","key":"4_CR25","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R Roman","year":"2011","unstructured":"Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. Computer 44(9), 51\u201358 (2011)","journal-title":"Computer"},{"key":"4_CR26","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigano","year":"2006","unstructured":"Vigano, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61\u201386 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"4_CR27","unstructured":"Wazid, M., Das, A.K., Odelu, V., Kumar, N., Susilo, W.: Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans. Dependable Sec. Comput. (2018)"},{"issue":"4","key":"4_CR28","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/TPDS.2010.130","volume":"22","author":"S Yu","year":"2011","unstructured":"Yu, S., Ren, K., Lou, W.: Fdac: toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(4), 673\u2013686 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"4_CR29","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.future.2018.08.038","volume":"91","author":"L Zhou","year":"2019","unstructured":"Zhou, L., Li, X., Yeh, K.H., Su, C., Chiu, W.: Lightweight iot-based authentication scheme in cloud computing circumstance. Future Gen. Comput. Syst. 91, 244\u2013251 (2019)","journal-title":"Future Gen. Comput. Syst."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Fifth International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-5411-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T16:08:13Z","timestamp":1606320493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-5411-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,26]]},"ISBN":["9789811554100","9789811554117"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-5411-7_4","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,11,26]]},"assertion":[{"value":"26 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}