{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:13:06Z","timestamp":1762506786613},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,4,27]],"date-time":"2016-04-27T00:00:00Z","timestamp":1461715200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s00779-016-0926-8","type":"journal-article","created":{"date-parts":[[2016,4,27]],"date-time":"2016-04-27T09:29:05Z","timestamp":1461749345000},"page":"469-479","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":48,"title":["The yoking-proof-based authentication protocol for cloud-assisted wearable devices"],"prefix":"10.1007","volume":"20","author":[{"given":"Wei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yueliang","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Huafeng","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Huansheng","family":"Ning","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,27]]},"reference":[{"issue":"8","key":"926_CR1","doi-asserted-by":"crossref","first-page":"1793","DOI":"10.1007\/s00779-014-0789-9","volume":"18","author":"Y Sun","year":"2014","unstructured":"Sun Y, Bie R, Thomas P, Cheng X (2014) Advances on data, information, and knowledge in the internet of things. Pers Ubiquit Comput 18(8):1793\u20131795","journal-title":"Pers Ubiquit Comput"},{"issue":"6","key":"926_CR2","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/JIOT.2015.2423286","volume":"2","author":"Y Lin","year":"2015","unstructured":"Lin Y, Lin Y, Chih C et al (2015) EasyConnect: a management system for IoT devices and its applications for interactive design and art. IEEE Internet Things J 2(6):551\u2013561","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"926_CR3","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/s00779-014-0829-5","volume":"19","author":"F Gravenhorst","year":"2015","unstructured":"Gravenhorst F, Muaremi A, Bardram J et al (2015) Mobile phones as medical devices in mental disorder treatment: an overview. Pers Ubiquit Comput 19(2):335\u2013353","journal-title":"Pers Ubiquit Comput"},{"issue":"2","key":"926_CR4","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/MCG.2015.44","volume":"35","author":"L Avila","year":"2015","unstructured":"Avila L, Bailey M (2015) The wearable revolution. IEEE Comput Graph Appl 35(2):104\u2013104","journal-title":"IEEE Comput Graph Appl"},{"issue":"2","key":"926_CR5","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/s00779-013-0665-z","volume":"18","author":"J Carretero","year":"2014","unstructured":"Carretero J, Daniel Garc\u00eda J (2014) The internet of things: connecting the world. Pers Ubiquit Comput 18(2):445\u2013447","journal-title":"Pers Ubiquit Comput"},{"issue":"1","key":"926_CR6","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MWC.2015.7054715","volume":"22","author":"M Chen","year":"2015","unstructured":"Chen M, Zhang Y, Li Y, Hassan M, Alamri A (2015) AIWAC: affective interaction through wearable computing and cloud technology. IEEE Wirel Commun 22(1):20\u201327","journal-title":"IEEE Wirel Commun"},{"issue":"7","key":"926_CR7","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1007\/s00779-015-0882-8","volume":"19","author":"R Mehmood","year":"2015","unstructured":"Mehmood R, Shaikh MU, Bie R, Dawood H, Dawood H (2015) IoT-enabled web warehouse architecture: a secure approach. Pers Ubiquit Comput 19(7):1157\u20131167","journal-title":"Pers Ubiquit Comput"},{"issue":"6","key":"926_CR8","doi-asserted-by":"crossref","first-page":"871","DOI":"10.1109\/TBCAS.2013.2245664","volume":"7","author":"M Zhang","year":"2013","unstructured":"Zhang M, Raghunathan A, Jha NK (2013) MedMon: securing medical devices through wireless monitoring and anomaly detection. IEEE Trans Biomed Circuits Syst 7(6):871\u2013881","journal-title":"IEEE Trans Biomed Circuits Syst"},{"issue":"1","key":"926_CR9","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MWC.2015.7054716","volume":"22","author":"D He","year":"2015","unstructured":"He D, Chan S, Guizani M (2015) User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel Commun 22(1):28\u201334","journal-title":"IEEE Wirel Commun"},{"issue":"1","key":"926_CR10","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MPRV.2015.14","volume":"14","author":"R Kirkham","year":"2015","unstructured":"Kirkham R, Greenhalgh C (2015) Social access vs. privacy in wearable computing: a case study of autism. IEEE Pervasive Comput 14(1):26\u201333","journal-title":"IEEE Pervasive Comput"},{"key":"926_CR11","doi-asserted-by":"crossref","unstructured":"Khan R, Hasan R, Xu J (2015) SEPIA: secure-PIN-authentication-as-a-service for ATM using mobile and wearable devices. In: The 3rd IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud), pp 41\u201350","DOI":"10.1109\/MobileCloud.2015.16"},{"key":"926_CR12","doi-asserted-by":"crossref","unstructured":"Kim SD, Lee SM, Lee SE (2015) Secure communication system for wearable devices wireless intra body communication. In: The 2015 IEEE international conference on consumer electronics (ICCE), pp 381\u2013382","DOI":"10.1109\/ICCE.2015.7066454"},{"issue":"1","key":"926_CR13","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MWC.2015.7054717","volume":"22","author":"FP Diez","year":"2015","unstructured":"Diez FP, Touceda DS, Camara JMS, Zeadally S (2015) Toward self-authenticable wearable devices. IEEE Wirel Commun 22(1):36\u201343","journal-title":"IEEE Wirel Commun"},{"issue":"7","key":"926_CR14","doi-asserted-by":"crossref","first-page":"1332","DOI":"10.1109\/JSTSP.2015.2427113","volume":"9","author":"J Zhou","year":"2015","unstructured":"Zhou J, Cao Z, Dong X, Lin X (2015) PPDM: privacy-preserving protocol for dynamic medical text mining and image feature extraction from secure data aggregation in cloud-assisted e-healthcare systems. IEEE J Sel Top Signal Process 9(7):1332\u20131344","journal-title":"IEEE J Sel Top Signal Process"},{"key":"926_CR15","doi-asserted-by":"crossref","unstructured":"Liu H, Yu R, Wan Y (2015) YPAP: the yoking-proofs based authentication protocol for wearable devices in wireless communications. In: UIC-ATC-ScalCom-CBDCom-IoP, pp 1639\u20131643","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.298"},{"issue":"3","key":"926_CR16","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/LES.2013.2276434","volume":"5","author":"C Li","year":"2013","unstructured":"Li C, Raghunathan A, Jha NK (2013) Improving the trustworthiness of medical device software with formal verification methods. IEEE Embed Syst Lett 5(3):50\u201353","journal-title":"IEEE Embed Syst Lett"},{"issue":"2","key":"926_CR17","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/MWC.2015.7096296","volume":"22","author":"J Zhou","year":"2015","unstructured":"Zhou J, Cao Z, Dong X, Lin X (2015) Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions, and future directions. IEEE Wirel Commun 22(2):136\u2013144","journal-title":"IEEE Wirel Commun"},{"issue":"3","key":"926_CR18","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1109\/TPDS.2014.2311791","volume":"26","author":"H Ning","year":"2014","unstructured":"Ning H, Liu H, Yang LT (2014) Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans Parallel Distrib Syst 26(3):657\u2013667","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"926_CR19","doi-asserted-by":"crossref","unstructured":"Juels A (2004) \u201cYoking-proofs\u201d for RFID tags. In: The second IEEE annual conference on pervasive computing and communications workshops, pp 138\u2013143","DOI":"10.1109\/PERCOMW.2004.1276920"},{"key":"926_CR20","doi-asserted-by":"crossref","unstructured":"Cho JS, Yeo SS, Hwang S, Rhee SY, Kim SK (2008) Enhanced yoking proof protocols for RFID tags and tag groups. In: The 22nd international conference on advanced information networking and applications workshops (AINAW \u201908), pp 1591\u20131596","DOI":"10.1109\/WAINA.2008.204"},{"key":"926_CR21","doi-asserted-by":"crossref","unstructured":"Chien HY, Liu SB (2009) Tree-based RFID yoking proof. In: Proceedings of the international conference on networks security, wireless communications and trusted computing (NSWCTC 2009), pp 550\u2013553","DOI":"10.1109\/NSWCTC.2009.316"},{"issue":"7","key":"926_CR22","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1109\/TPDS.2012.218","volume":"24","author":"H Liu","year":"2013","unstructured":"Liu H, Ning H, Zhang Y, He D, Xiong Q, Yang LT (2013) Grouping-proofs based authentication protocol for distributed RFID systems. IEEE Trans Parallel Distrib Syst 24(7):1321\u20131330","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"926_CR23","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSC.2011.24","volume":"5","author":"C Wang","year":"2012","unstructured":"Wang C, Wang Q, Ren K, Cao N, Lou W (2012) Toward secure and dependable storage services in cloud computing. IEEE Trans Serv Comput 5(2):220\u2013232","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"926_CR24","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/TPDS.2014.2308218","volume":"26","author":"H Liu","year":"2015","unstructured":"Liu H, Ning H, Xiong Q, Yang LT (2015) Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans Parallel Distrib Syst 26(1):241\u2013251","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"926_CR25","doi-asserted-by":"crossref","unstructured":"Suh GE, Devadas S (2007) Physical unclonable functions for device authentication and secret key generation. In: The 44th design automation conference (DAC 2007), pp 9\u201314","DOI":"10.1145\/1278480.1278484"},{"key":"926_CR26","doi-asserted-by":"crossref","unstructured":"Rubin AD, Honeyman P (1994) Nonmonotonic cryptographic protocols. In: Computer security foundations workshop VII, pp 100\u2013116","DOI":"10.1109\/CSFW.1994.315943"},{"key":"926_CR27","unstructured":"http:\/\/www.heliontech.com\/core.htm . Accessed Jan 2016"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-016-0926-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-016-0926-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-016-0926-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T06:29:08Z","timestamp":1559111348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-016-0926-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,27]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["926"],"URL":"https:\/\/doi.org\/10.1007\/s00779-016-0926-8","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,27]]}}}