{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T10:03:09Z","timestamp":1751709789452},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"S5","license":[{"start":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T00:00:00Z","timestamp":1505174400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10586-017-1136-5","type":"journal-article","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T14:47:34Z","timestamp":1505227654000},"page":"10595-10604","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards mobile cloud authentication and gait based security using time warping technique"],"prefix":"10.1007","volume":"22","author":[{"given":"S. Sengole","family":"Merlin","sequence":"first","affiliation":[]},{"given":"A.","family":"Chandrasekar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,12]]},"reference":[{"issue":"10","key":"1136_CR1","first-page":"27","volume":"6","author":"D Huang","year":"2011","unstructured":"Huang, D.: Mobile cloud computing. IEEE COMSOC Multimed. Commun. Tech. Comm. E-Lett. 6(10), 27\u201331 (2011)","journal-title":"IEEE COMSOC Multimed. Commun. Tech. Comm. E-Lett."},{"key":"1136_CR2","doi-asserted-by":"publisher","unstructured":"A survey of mobile cloud computing: architecture, applications, and approaches, WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. (2011), Wiley (wileyonlinelibrary.com). doi:\n10.1002\/wcm.1203","DOI":"10.1002\/wcm.1203"},{"key":"1136_CR3","unstructured":"Merlin, S. S., Chandrasekar, A.: Risk management in cloud: a systematic approach and analysis. In: Proceedings of the International Journal of Printing, Packaging & Allied Sciences, vol. 6. (2016)"},{"key":"1136_CR4","first-page":"139","volume-title":"User survey on phone security and usage","author":"F Breitinger","year":"2010","unstructured":"Breitinger, F., Nickel, C.: User survey on phone security and usage, pp. 139\u2013144. BIOSIG, Minneapolis (2010)"},{"issue":"2","key":"1136_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1023\/A:1022289231864","volume":"8","author":"J Tang","year":"2003","unstructured":"Tang, J., Terziyan, V., Veijalainen, J.: Distributed PIN verification scheme for improving security of mobile devices. J. Mob. Netw. Appl. 8(2), 159\u2013175 (2003)","journal-title":"J. Mob. Netw. Appl."},{"key":"1136_CR6","unstructured":"NTA Monitor Password Survey, NTA Monitor. \nhttp:\/\/www.silicon.com\/a56760\n\n (2002)"},{"key":"1136_CR7","doi-asserted-by":"crossref","unstructured":"Su, Q., Tian, J., Chen, X., Yang, X.: A fingerprint authentication system based on mobile phone: In: Proceedings of the 5th International Conference on Audio- and Video-Based Person Authentication (2005)","DOI":"10.1007\/11527923_16"},{"key":"1136_CR8","unstructured":"Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 1\u20135 (2010)"},{"issue":"7","key":"1136_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.4304\/jcp.1.7.51-59","volume":"1","author":"D Gafurov","year":"2006","unstructured":"Gafurov, D., Helkala, K., et al.: Biometric gait authentication using accelerometer sensor. J. Comput. 1(7), 51\u201359 (2006)","journal-title":"J. Comput."},{"key":"1136_CR10","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Pan, G., Jia, K., Lu, M., Wang, Y., Wu, Z.: Accelerometer-based gait recognition by sparse representation of signature points with clusters. IEEE Trans. Cybern. (2014), doi:\n10.1109\/TCYB.2014.2361287","DOI":"10.1109\/TCYB.2014.2361287"},{"issue":"2","key":"1136_CR11","doi-asserted-by":"publisher","first-page":"333","DOI":"10.3745\/JIPS.2013.9.2.333","volume":"9","author":"T Hoang","year":"2013","unstructured":"Hoang, T., Nguyen, T.D., et al.: Adaptive cross-device gait recognition using a mobile accelerometer. J. Inf. Process. Syst. 9(2), 333 (2013)","journal-title":"J. Inf. Process. Syst."},{"key":"1136_CR12","doi-asserted-by":"crossref","unstructured":"Boneh, D. Boyen, X.: Efficient selective-ID identity based encryption without random oracles. In: Cachin, E. (eds.)Proceedings of Eurocrypt, pp. 223\u201338. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"1136_CR13","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume":"196","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. Adv. Cryptol. 196, 47\u201353 (1985)","journal-title":"Adv. Cryptol."},{"key":"1136_CR14","first-page":"213","volume":"2139","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity based encryption from the weil pairing. Adv. Cryptol. 2139, 213\u2013229 (2001)","journal-title":"Adv. Cryptol."},{"key":"1136_CR15","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-540-89255-7_28","volume":"5350","author":"D Boneh","year":"2008","unstructured":"Boneh, D.: Generalized identity based and broadcast encryption schemes. Lect. Notes Comput. Sci. 5350, 455\u2013470 (2008)","journal-title":"Lect. Notes Comput. Sci."},{"issue":"9","key":"1136_CR16","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TPDS.2010.14","volume":"21","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Z, C., Zhang, Y.C., Fang, Y.G.: An identity-based security system for user privacy in vehicular Ad Hoc networks. IEEE Transact. Parall. Distrib. Syst. 21(9), 1227\u20131239 (2010)","journal-title":"IEEE Transact. Parall. Distrib. Syst."},{"issue":"7","key":"1136_CR17","doi-asserted-by":"publisher","first-page":"3508","DOI":"10.1109\/TVT.2009.2012389","volume":"58","author":"JY Sun","year":"2009","unstructured":"Sun, J.Y., Z, C., Zhang, Y.C., Fang, Y.G.: Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Transact. Vehic. Technol. 58(7), 3508\u20133517 (2009)","journal-title":"IEEE Transact. Vehic. Technol."},{"key":"1136_CR18","volume-title":"Lecture Notes in Computer Science","author":"V Goyal","year":"2007","unstructured":"Goyal, V.: Certificate revocation using fine grained certificate space partitioning, in Financial Cryptography and Data Security. In: Dietrich, S., Dhamija, R. (eds.) Lecture Notes in Computer Science. Springer, Berlin (2007)"},{"issue":"2","key":"1136_CR19","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li, J., Chen, X., Jia, C., Lou, W.: Identity-based Encryption with Outsourced Revocation in Cloud Computing. IEEE Transact. Comput. 64(2), 425\u2013437 (2015)","journal-title":"IEEE Transact. Comput."},{"key":"1136_CR20","first-page":"3755","volume":"24","author":"SS Merlin","year":"2016","unstructured":"Merlin, S.S., Chandrasekar, A.: A novel framework for user authentication and data security in mobile cloud using gait, in Middle-East. J. Sci. Res. 24, 3755\u20133762 (2016)","journal-title":"J. Sci. Res."},{"key":"1136_CR21","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1007\/s10586-013-0258-7","volume":"16","author":"B Qin","year":"2013","unstructured":"Qin, B., et al.: Simultaneous authentication and secrecy in identity-based data upload to cloud. Clust. Comput. 16, 845\u2013859 (2013)","journal-title":"Clust. Comput."},{"key":"1136_CR22","doi-asserted-by":"crossref","unstructured":"Thang, M.H. et al.: Gait identification using accelerometer on mobile phone Control. In: Proceedings of the International Conference on Automation and Information Sciences (ICCAIS), (2012)","DOI":"10.1109\/ICCAIS.2012.6466615"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1136-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1136-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1136-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T22:33:41Z","timestamp":1574375621000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1136-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,12]]},"references-count":22,"journal-issue":{"issue":"S5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["1136"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1136-5","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,12]]},"assertion":[{"value":"15 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}