{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:50:52Z","timestamp":1772063452832,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,3,3]],"date-time":"2017-03-03T00:00:00Z","timestamp":1488499200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10586-017-0783-x","type":"journal-article","created":{"date-parts":[[2017,3,3]],"date-time":"2017-03-03T04:44:21Z","timestamp":1488516261000},"page":"1223-1236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A privacy preserving authentication scheme for roaming in ubiquitous networks"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9321-6956","authenticated-orcid":false,"given":"Shehzad Ashraf","family":"Chaudhry","sequence":"first","affiliation":[]},{"given":"Aiiad","family":"Albeshri","sequence":"additional","affiliation":[]},{"given":"Naixue","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Changhoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Taeshik","family":"Shon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"issue":"1","key":"783_CR1","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1504\/IJBDI.2016.073904","volume":"3","author":"N Victor","year":"2016","unstructured":"Victor, N., Lopez, D., Abawajy, J.H.: Privacy models for big data: a survey. Int. J. Big Data Intell. 3(1), 61\u201375 (2016)","journal-title":"Int. J. Big Data Intell."},{"issue":"3","key":"783_CR2","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1007\/s10586-015-0456-6","volume":"18","author":"W Xing","year":"2015","unstructured":"Xing, W., Jie, W., Tsoumakos, D., Ghanem, M.: A network approach for managing and processing big cancer data in clouds. Clust. Comput. 18(3), 1285\u20131294 (2015). doi: 10.1007\/s10586-015-0456-6","journal-title":"Clust. Comput."},{"issue":"1","key":"783_CR3","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10586-014-0406-8","volume":"18","author":"T Shah","year":"2015","unstructured":"Shah, T., Rabhi, F., Ray, P.: Investigating an ontology-based approach for big data analysis of inter-dependent medical and oral health conditions. Clust. Comput. 18(1), 351\u2013367 (2015). doi: 10.1007\/s10586-014-0406-8","journal-title":"Clust. Comput."},{"issue":"2","key":"783_CR4","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s10586-015-0428-x","volume":"18","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Liu, Z., Liao, H., Li, C.: Improving the performance of gis polygon overlay computation with mapreduce for spatial big data processing. Clust. Comput. 18(2), 507\u2013516 (2015). doi: 10.1007\/s10586-015-0428-x","journal-title":"Clust. Comput."},{"issue":"8","key":"783_CR5","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1109\/49.634798","volume":"15","author":"S Suzuki","year":"1997","unstructured":"Suzuki, S., Nakada, K.: An authentication technique based on distributed security management for the global mobility network. IEEE J. Sel. Areas Commun. 15(8), 1608\u20131617 (1997)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"783_CR6","first-page":"227","volume":"9","author":"C-K Yeh","year":"2009","unstructured":"Yeh, C.-K., Lee, W.-B.: An overall cost-effective authentication technique for the global mobility network. IJ Netw. Secur. 9(3), 227\u2013232 (2009)","journal-title":"IJ Netw. Secur."},{"issue":"2","key":"783_CR7","doi-asserted-by":"publisher","first-page":"1001","DOI":"10.1007\/s10586-016-0573-x","volume":"19","author":"D Seo","year":"2016","unstructured":"Seo, D., Jeon, Y.-B., Lee, S.-H., Lee, K.-H.: Cloud computing for ubiquitous computing on m2m and iot environment mobile application. Clust. Comput. 19(2), 1001\u20131013 (2016). doi: 10.1007\/s10586-016-0573-x","journal-title":"Clust. Comput."},{"issue":"4","key":"783_CR8","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1007\/s10586-013-0260-0","volume":"16","author":"H Zhu","year":"2013","unstructured":"Zhu, H., Liu, T., Wei, G., Li, H.: Ppas: privacy protection authentication scheme for vanet. Clust. Comput. 16(4), 873\u2013886 (2013). doi: 10.1007\/s10586-013-0260-0","journal-title":"Clust. Comput."},{"issue":"4","key":"783_CR9","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1007\/s10586-013-0259-6","volume":"16","author":"W Zhang","year":"2013","unstructured":"Zhang, W., Zhang, Y., Chen, J., Li, H., Wang, Y.: End-to-end security scheme for machine type communication based on generic authentication architecture. Clust. Comput. 16(4), 861\u2013871 (2013). doi: 10.1007\/s10586-013-0259-6","journal-title":"Clust. Comput."},{"issue":"3","key":"783_CR10","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1504\/IJBDI.2016.078411","volume":"3","author":"L Lin","year":"2016","unstructured":"Lin, L., Liu, T., Hu, J., Ni, J.: Pqsel: combining privacy with quality of service in cloud service selection. Int. J. Big Data Intell. 3(3), 202\u2013214 (2016)","journal-title":"Int. J. Big Data Intell."},{"key":"783_CR11","doi-asserted-by":"crossref","unstructured":"Murugaiyan, S., Chandramohan, D., Vengattaraman, T., Dhavachelvan, P.: A generic privacy breach preventing methodology for cloud based web service. Stand. Stand., 426 (2015)","DOI":"10.4018\/978-1-4666-8111-8.ch021"},{"issue":"1","key":"783_CR12","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TCE.2004.1277867","volume":"50","author":"J Zhu","year":"2004","unstructured":"Zhu, J., Ma, J.: A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consum. Electron. 50(1), 231\u2013235 (2004)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"5","key":"783_CR13","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C-C Lee","year":"2006","unstructured":"Lee, C.-C., Hwang, M.-S., Liao, I.-E.: Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans. Indus. Electron. 53(5), 1683\u20131687 (2006)","journal-title":"IEEE Trans. Indus. Electron."},{"issue":"10","key":"783_CR14","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/LCOMM.2008.080283","volume":"12","author":"C-C Wu","year":"2008","unstructured":"Wu, C.-C., Lee, W.-B., Tsaur, W.-J.: A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 12(10), 722\u2013723 (2008)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"783_CR15","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.mcm.2011.04.036","volume":"55","author":"H Mun","year":"2012","unstructured":"Mun, H., Han, K., Lee, Y.S., Yeun, C.Y., Choi, H.H.: Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Math. Comput. Model. 55(1), 214\u2013222 (2012)","journal-title":"Math. Comput. Model."},{"issue":"12","key":"783_CR16","doi-asserted-by":"crossref","first-page":"2803","DOI":"10.1016\/j.comcom.2007.12.005","volume":"31","author":"C-T Li","year":"2008","unstructured":"Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31(12), 2803\u20132814 (2008)","journal-title":"Comput. Commun."},{"issue":"1","key":"783_CR17","first-page":"35","volume":"55","author":"C-T Li","year":"2012","unstructured":"Li, C.-T., Lee, C.-C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1), 35\u201344 (2012)","journal-title":"Math. Comput. Model."},{"issue":"10","key":"783_CR18","doi-asserted-by":"crossref","first-page":"1366","DOI":"10.1002\/wcm.933","volume":"11","author":"Y-C Chen","year":"2011","unstructured":"Chen, Y.-C., Chuang, S.-C., Yeh, L.-Y., Huang, J.-L.: A practical authentication protocol with anonymity for wireless access networks. Wirel. Commun. Mob. Comput. 11(10), 1366\u20131375 (2011)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"3","key":"783_CR19","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1002\/dac.1158","volume":"24","author":"C Chen","year":"2011","unstructured":"Chen, C., He, D., Chan, S., Bu, J., Gao, Y., Fan, R.: Lightweight and provably secure user authentication with anonymity for the global mobility network. Int. J. Commun. Syst. 24(3), 347\u2013362 (2011)","journal-title":"Int. J. Commun. Syst."},{"issue":"2","key":"783_CR20","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1007\/s11277-013-1309-3","volume":"74","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Hu, B., Tan, X., Bao, M., Yu, X.: Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wirel. Pers. Commun. 74(2), 601\u2013614 (2014)","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"783_CR21","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s11277-010-0033-5","volume":"61","author":"D He","year":"2011","unstructured":"He, D., Chan, S., Chen, C., Bu, J., Fan, R.: Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 61(2), 465\u2013476 (2011)","journal-title":"Wirel. Pers. Commun."},{"issue":"4","key":"783_CR22","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Li, G., Yang, L.: An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 68(4), 1477\u20131491 (2013)","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"783_CR23","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s11277-013-1243-4","volume":"73","author":"F Wen","year":"2013","unstructured":"Wen, F., Susilo, W., Yang, G.: A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 73(3), 993\u20131004 (2013)","journal-title":"Wirel. Pers. Commun."},{"issue":"4","key":"783_CR24","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1007\/s12083-013-0218-2","volume":"8","author":"S Shin","year":"2015","unstructured":"Shin, S., Yeh, H., Kim, K.: An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks. Peer-to-Peer Netw. Appl. 8(4), 674\u2013683 (2015). doi: 10.1007\/s12083-013-0218-2","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"4","key":"783_CR25","doi-asserted-by":"publisher","first-page":"e3019","DOI":"10.1002\/dac.3019","volume":"30","author":"MS Farash","year":"2017","unstructured":"Farash, M.S., Chaudhry, S.A., Heydari, M., Sadough, S., Mohammad, S., Kumari, S., Khan, M.K.: A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 30(4), e3019 (2017). doi: 10.1002\/dac.3019","journal-title":"Int. J. Commun. Syst."},{"key":"783_CR26","doi-asserted-by":"publisher","unstructured":"Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.: On the power of power analysis in the real world: a complete break of the keeloq code hopping scheme. In: Wagner D. (ed.) Advances in Cryptology, CRYPTO 2008. Lecture Notes in Computer Science, vol. 5157, pp. 203\u2013220. Springer, Berlin (2008). doi: 10.1007\/978-3-540-85174-5_12","DOI":"10.1007\/978-3-540-85174-5_12"},{"issue":"2","key":"783_CR27","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983). doi: 10.1109\/TIT.1983.1056650","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"783_CR28","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1002\/dac.2853","volume":"29","author":"S Kumari","year":"2016","unstructured":"Kumari, S., Khan, M.K., Li, X., Wu, F.: Design of a user anonymous password authentication scheme without smart card. Int. J. Commun. Syst. 29(3), 441\u2013458 (2016). doi: 10.1002\/dac.2853","journal-title":"Int. J. Commun. Syst."},{"key":"783_CR29","doi-asserted-by":"crossref","unstructured":"Kumari, S., Li, X., Wu, F., Das, A.K., Odelu, V., Khan, M.K.: A user anonymous mutual authentication protocol. KSII Trans. Internet Inf. Syst. 10(9) (2016)","DOI":"10.3837\/tiis.2016.09.026"},{"key":"783_CR30","doi-asserted-by":"publisher","unstructured":"He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. (2016). doi: 10.1109\/JSYST.2016.2544805","DOI":"10.1109\/JSYST.2016.2544805"},{"issue":"5","key":"783_CR31","doi-asserted-by":"publisher","first-page":"052108","DOI":"10.1007\/s11432-015-5469-5","volume":"59","author":"D He","year":"2016","unstructured":"He, D., Kumar, N., Shen, H., Lee, J.-H.: One-to-many authentication for access control in mobile pay-tv systems. Sci. China Inf. Sci. 59(5), 052108 (2016). doi: 10.1007\/s11432-015-5469-5","journal-title":"Sci. China Inf. Sci."},{"key":"783_CR32","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2016.04.016","volume":"63","author":"S Kumari","year":"2016","unstructured":"Kumari, S., Li, X., Wu, F., Das, A.K., Arshad, H., Khan, M.K.: A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener. Comput. Syst. 63, 56\u201375 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"783_CR33","doi-asserted-by":"publisher","unstructured":"Chaudhry, S.A., Farash, M.S., Naqvi, H., Islam, S.H., Shon, T.: A robust and efficient privacy aware handover authentication scheme for wireless networks. Wirel. Pers. Commun., 1\u201325 (2015). doi: 10.1007\/s11277-015-3139-y","DOI":"10.1007\/s11277-015-3139-y"},{"key":"783_CR34","doi-asserted-by":"publisher","unstructured":"Kumari, S., Chaudhry, S.A., Wu, F., Li, X., Farash, M.S., Khan, M.K.: An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl., 1\u201315 (2015). doi: 10.1007\/s12083-015-0409-0","DOI":"10.1007\/s12083-015-0409-0"},{"issue":"2","key":"783_CR35","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","volume":"16","author":"H Kilinc","year":"2014","unstructured":"Kilinc, H., Yanik, T.: A survey of sip authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 16(2), 1005\u20131023 (2014). doi: 10.1109\/SURV.2013.091513.00050","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-0783-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0783-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-0783-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T04:08:03Z","timestamp":1568866083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-0783-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,3]]},"references-count":35,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["783"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-0783-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,3]]}}}