{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:21:04Z","timestamp":1770884464947,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1007\/s10586-025-05537-0","type":"journal-article","created":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T20:03:32Z","timestamp":1759176212000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A secure framework for IoT-based medical sensors data using homomorphic elliptic curve cryptography"],"prefix":"10.1007","volume":"28","author":[{"given":"Salman","family":"Ali","sequence":"first","affiliation":[]},{"given":"Faisal","family":"Anwer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,29]]},"reference":[{"key":"5537_CR1","doi-asserted-by":"publisher","unstructured":"Ranjan, R., Sahana, B.C.: A comprehensive roadmap for transforming healthcare from hospital-centric to patient-centric through healthcare Internet of Things (IoT). Eng. Sci.\u00a030,\u00a0(2024).\u00a0https:\/\/doi.org\/10.30919\/es1175","DOI":"10.30919\/es1175"},{"key":"5537_CR2","doi-asserted-by":"publisher","unstructured":"Yalli, J.S., Hasan, M.H., Badawi, A.: Internet Of Things (IOT): Origin, embedded technologies, smart applications and its growth in the last decade. IEEE Access.\u00a0(2024).\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2024.3418995","DOI":"10.1109\/ACCESS.2024.3418995"},{"key":"5537_CR3","doi-asserted-by":"publisher","unstructured":"Singh, B., Kaunert, C., Vig, K., Gautam, B.K.: Wearable sensors assimilated with internet of things (IoT) for advancing medical imaging and digital healthcare: Real-time scenario. Incl. Access. Digit. Health.\u00a0275\u2013297 (2024).\u00a0https:\/\/doi.org\/10.4018\/979-8-3693-1463-0.ch018","DOI":"10.4018\/979-8-3693-1463-0.ch018"},{"key":"5537_CR4","doi-asserted-by":"publisher","unstructured":"Subhan, F., Mirza, A., Su\u2019ud, M.B. M., Alam, M.M., Nisar, S., Habib, U., Iqbal, M.Z.: AI-enabled wearable medical internet of things in healthcare system: a survey. Appl. Sci. (Switzerland).\u00a013(3) (2023).\u00a0https:\/\/doi.org\/10.3390\/app13031394","DOI":"10.3390\/app13031394"},{"issue":"1","key":"5537_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s43995-022-00008-8","volume":"14","author":"KH Almotairi","year":"2023","unstructured":"Almotairi, K.H.: Application of internet of things in healthcare domain. J. Umm Al-Qura Uni. Eng. Archit. 14(1), 1\u201312 (2023). https:\/\/doi.org\/10.1007\/s43995-022-00008-8","journal-title":"J. Umm Al-Qura Uni. Eng. Archit."},{"key":"5537_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18580-7","author":"G Nissar","year":"2024","unstructured":"Nissar, G., Khan, R.A., Mushtaq, S., Lone, S.A., Moon, A.H.: IoT in healthcare: a review of services, applications, key technologies, security concerns, and emerging trends. Multimedia Tools Appl. (2024). https:\/\/doi.org\/10.1007\/s11042-024-18580-7","journal-title":"Multimedia Tools Appl."},{"issue":"5","key":"5537_CR7","doi-asserted-by":"publisher","first-page":"5401","DOI":"10.1109\/JSEN.2023.3235977","volume":"23","author":"C Nwibor","year":"2023","unstructured":"Nwibor, C., Haxha, S., Ali, M.M., Sakel, M., Haxha, A.R., Saunders, K., Nabakooza, S.: Remote Health Monitoring System for the Estimation of Blood Pressure, Heart Rate, and Blood Oxygen Saturation Level. IEEE Sens. J. 23(5), 5401\u20135411 (2023). https:\/\/doi.org\/10.1109\/JSEN.2023.3235977","journal-title":"IEEE Sens. J."},{"key":"5537_CR8","unstructured":"Okechukwu, U., Alum, E.U. (n.d.).: Integrating wearable health monitoring devices with IoT for enhanced personal health management: a comprehensive review. https:\/\/rojournals.org\/roj-engineering-and-scientific-research\/"},{"key":"5537_CR9","doi-asserted-by":"publisher","unstructured":"Chennam, K.K., Uma Maheshwari, V., Aluvalu, R.: Maintaining IoT healthcare records using cloud storage. EAI\/Springer Innovations in Communication and Computing, 215\u2013233 (2022).\u00a0https:\/\/doi.org\/10.1007\/978-3-030-82715-1_10","DOI":"10.1007\/978-3-030-82715-1_10"},{"key":"5537_CR10","doi-asserted-by":"publisher","unstructured":"Awotunde, J.B., Jimoh, R.G., Ogundokun, R.O., Misra, S., Abikoye, O.C.: Big data analytics of IoT-based cloud system framework: smart healthcare monitoring systems. Intern. Things 181\u2013208\u00a0(2022).\u00a0https:\/\/doi.org\/10.1007\/978-3-030-80821-1_9","DOI":"10.1007\/978-3-030-80821-1_9"},{"key":"5537_CR11","doi-asserted-by":"publisher","first-page":"155949","DOI":"10.1109\/ACCESS.2021.3129224","volume":"9","author":"R Imam","year":"2021","unstructured":"Imam, R., Areeb, Q.M., Alturki, A., Anwer, F.: Systematic and critical review of RSA based public key cryptographic schemes: past and present status. IEEE Access 9, 155949\u2013155976 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3129224","journal-title":"IEEE Access"},{"issue":"5","key":"5537_CR12","doi-asserted-by":"publisher","first-page":"2645","DOI":"10.1007\/s41870-022-00993-y","volume":"14","author":"R Imam","year":"2022","unstructured":"Imam, R., Anwer, F., Nadeem, M.: An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA). International Journal of Information Technology (Singapore) 14(5), 2645\u20132656 (2022). https:\/\/doi.org\/10.1007\/s41870-022-00993-y","journal-title":"International Journal of Information Technology (Singapore)"},{"key":"5537_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-024-02061-z","author":"MU Bokhari","year":"2024","unstructured":"Bokhari, M.U., Afzal, S., Yadav, G.: ChaosForge: a lightweight stream cipher fusion of chaotic dynamics and NLFSRs for secure IoT communication. International Journal of Information Technology (Singapore) (2024). https:\/\/doi.org\/10.1007\/s41870-024-02061-z","journal-title":"International Journal of Information Technology (Singapore)"},{"key":"5537_CR14","doi-asserted-by":"publisher","unstructured":"Luqman, M., Faridi, A.R.: Authentication of fog-assisted IoT networks using advanced encryption credibility approach with modified Diffie\u2013Hellman encryption. Concurrency and Computation: Practice and Experience, 35(22).\u00a0(2023).\u00a0https:\/\/doi.org\/10.1002\/cpe.7742","DOI":"10.1002\/cpe.7742"},{"key":"5537_CR15","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-981-16-8664-1_17","volume":"370","author":"R Imam","year":"2022","unstructured":"Imam, R., Anwer, F.: An Empirical Study of Secure and Complex Variants of RSA Scheme. Lect. Notes Netw. Sys. 370, 185\u2013196 (2022). https:\/\/doi.org\/10.1007\/978-981-16-8664-1_17","journal-title":"Lect. Notes Netw. Sys."},{"issue":"4","key":"5537_CR16","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1007\/s41870-024-01753-w","volume":"16","author":"S Ali","year":"2024","unstructured":"Ali, S., Anwer, F.: Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes. International Journal of Information Technology (Singapore) 16(4), 2053\u20132067 (2024). https:\/\/doi.org\/10.1007\/s41870-024-01753-w","journal-title":"International Journal of Information Technology (Singapore)"},{"key":"5537_CR17","doi-asserted-by":"publisher","unstructured":"Jeyakumar, V., Rama Abirami, K., Saraswathi, S., Senthil Kumaran, R., Marthi, G.: Secure medical image storage and retrieval for Internet of medical imaging things using blockchain-enabled edge computing. Intelligent Edge Computing for Cyber Physical Applications, 85\u2013110.\u00a0(2023).\u00a0https:\/\/doi.org\/10.1016\/B978-0-323-99412-5.00004-6","DOI":"10.1016\/B978-0-323-99412-5.00004-6"},{"issue":"25","key":"5537_CR18","doi-asserted-by":"publisher","first-page":"18571","DOI":"10.1007\/s00521-023-08681-z","volume":"35","author":"FM Talaat","year":"2023","unstructured":"Talaat, F.M., El-Balka, R.M.: Stress monitoring using wearable sensors: IoT techniques in medical field. Neural Comput. Appl.Comput. Appl. 35(25), 18571\u201318584 (2023). https:\/\/doi.org\/10.1007\/s00521-023-08681-z","journal-title":"Neural Comput. Appl.Comput. Appl."},{"key":"5537_CR19","doi-asserted-by":"publisher","unstructured":"Gangwani, P., Perez-Pons, A., Bhardwaj, T., Upadhyay, H., Joshi, S., Lagos, L.: Securing environmental IoT data using masked authentication messaging protocol in a DAG-based blockchain: IOTA tangle. Future Internet, 13(12). (2021).\u00a0https:\/\/doi.org\/10.3390\/fi13120312","DOI":"10.3390\/fi13120312"},{"issue":"24","key":"5537_CR20","doi-asserted-by":"publisher","first-page":"21377","DOI":"10.1109\/JIOT.2023.3287636","volume":"10","author":"J Liu","year":"2023","unstructured":"Liu, J., Fan, Y., Sun, R., Liu, L., Wu, C., Mumtaz, S.: Blockchain-aided privacy-preserving medical data sharing scheme for E-Healthcare system. IEEE Internet Things J. 10(24), 21377\u201321388 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3287636","journal-title":"IEEE Internet Things J."},{"key":"5537_CR21","doi-asserted-by":"publisher","unstructured":"Faragallah, O.S., Sallam, A.I., El-Sayed, H.S.: Utilization of HEVC ChaCha20-based selective encryption for secure telehealth video conferencing. Comput., Mater. Continua.\u00a070(1), 831\u2013845 (2021).\u00a0https:\/\/doi.org\/10.32604\/cmc.2022.019151","DOI":"10.32604\/cmc.2022.019151"},{"key":"5537_CR22","doi-asserted-by":"publisher","unstructured":"Kute, S.S., Tyagi, A.K., Aswathy, S.U.: Security, privacy and trust issues in internet of things and machine learning based e-Healthcare. Intell. Interact. Multimedia Syst. E-Healthcare Appl. 291\u2013317\u00a0(2021).\u00a0https:\/\/doi.org\/10.1007\/978-981-16-6542-4_15","DOI":"10.1007\/978-981-16-6542-4_15"},{"key":"5537_CR23","doi-asserted-by":"publisher","unstructured":"Shreya,\u00a0S., Chatterjee,\u00a0K., Singh,\u00a0A.: A smart secure healthcare monitoring system with Internet of Medical Things. Comput. Electr. Eng., 101, (2022).\u00a0https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107969.","DOI":"10.1016\/j.compeleceng.2022.107969"},{"key":"5537_CR24","doi-asserted-by":"publisher","unstructured":"Anuradha, M., Jayasankar, T., Prakash, N. B., Sikkandar, M.Y., Hemalakshmi, G.R., Bharatiraja, C., Britto, A.S.F.: IoT enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocess. Microsyst.\u00a080,\u00a0(2021).\u00a0https:\/\/doi.org\/10.1016\/j.micpro.2020.103301","DOI":"10.1016\/j.micpro.2020.103301"},{"key":"5537_CR25","doi-asserted-by":"publisher","unstructured":"Chang,\u00a0J., Ren,\u00a0Q., Ji,\u00a0Y., Xu,\u00a0M., Xue,\u00a0R.: Secure medical data management with privacy-preservation and authentication properties in smart healthcare system.\u00a0Comput. Networks.\u00a0212, (2022).\u00a0https:\/\/doi.org\/10.1016\/j.comnet.2022.109013.","DOI":"10.1016\/j.comnet.2022.109013"},{"key":"5537_CR26","doi-asserted-by":"publisher","first-page":"15644","DOI":"10.1109\/ACCESS.2022.3149046","volume":"10","author":"Z Zulkifl","year":"2022","unstructured":"Zulkifl, Z., Khan, F., Tahir, S., Afzal, M., Iqbal, W., Rehman, A., Saeed, S., Almuhaideb, A.M.: FBASHI: Fuzzy and blockchain-based adaptive security for healthcare IoTs. IEEE Access 10, 15644\u201315656 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3149046","journal-title":"IEEE Access"},{"key":"5537_CR27","doi-asserted-by":"publisher","unstructured":"Das, S., Namasudra, S.: Lightweight and efficient privacy-preserving mutual authentication scheme to secure Internet of Things-based smart healthcare. Trans. Emerg. Telecommun. Technol.\u00a034(11), (2023).\u00a0https:\/\/doi.org\/10.1002\/ett.4716","DOI":"10.1002\/ett.4716"},{"key":"5537_CR28","doi-asserted-by":"publisher","unstructured":"Jaime,\u00a0F.J., Mu\u00f1oz,\u00a0A., Rodr\u00edguez-G\u00f3mez,\u00a0F., Jerez-Calero,\u00a0A.: Strengthening privacy and data security in biomedical microelectromechanical systems by IoT communication security and protection in smart healthcare.\u00a0Sensors (Basel).\u00a023(21) (2023).\u00a0https:\/\/doi.org\/10.3390\/s23218944.","DOI":"10.3390\/s23218944"},{"key":"5537_CR29","doi-asserted-by":"publisher","first-page":"102977","DOI":"10.1109\/ACCESS.2024.3432662","volume":"12","author":"N Patel","year":"2024","unstructured":"Patel, N., Patel, D., Jadav, N.K., Rathod, T., Tanwar, S., Pau, G., Sharma, G., Alqahtani, F., Tolba, A.: Fuzzy-enhanced secure messaging framework for smart healthcare system. IEEE Access 12, 102977\u2013102993 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3432662","journal-title":"IEEE Access"},{"key":"5537_CR30","doi-asserted-by":"publisher","unstructured":"Wenhua, Z., Hasan, M.K., Jailani, N.B., Islam, S., Safie, N., Albarakati, H.M., Aljohani, A., Khan, M.A.: A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications. Comput. Human Behavior.\u00a0153,\u00a0(2024).\u00a0https:\/\/doi.org\/10.1016\/j.chb.2024.108134","DOI":"10.1016\/j.chb.2024.108134"},{"key":"5537_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3397343","author":"S Reddi","year":"2024","unstructured":"Reddi, S., Rao, P.M., Saraswathi, P., Jangirala, S., Das, A.K., Jamal, S.S., Park, Y.: Privacy-Preserving electronic medical record sharing for IoT-Enabled healthcare system using fully homomorphic encryption, IOTA, and masked authenticated messaging. IEEE Trans. Industr. Inf.Industr. Inf. (2024). https:\/\/doi.org\/10.1109\/TII.2024.3397343","journal-title":"IEEE Trans. Industr. Inf.Industr. Inf."},{"key":"5537_CR32","doi-asserted-by":"publisher","unstructured":"Ostad-Sharif, A., Abbasinezhad-Mood, D., Nikooghadam, M.: An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC. Int. J. Commun. Syst. 32(5).\u00a0(2019).\u00a0https:\/\/doi.org\/10.1002\/dac.3913","DOI":"10.1002\/dac.3913"},{"issue":"11","key":"5537_CR33","doi-asserted-by":"publisher","first-page":"16009","DOI":"10.1007\/s11042-022-14007-3","volume":"82","author":"Y Chen","year":"2023","unstructured":"Chen, Y., Chen, J.: A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography. Multimedia Tools and Applications 82(11), 16009\u201316032 (2023). https:\/\/doi.org\/10.1007\/s11042-022-14007-3","journal-title":"Multimedia Tools and Applications"},{"key":"5537_CR34","doi-asserted-by":"publisher","unstructured":"Lwamo, N. M. R., Zhu, L., Xu, C., Sharif, K., Liu, X., Zhang, C.: SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments. Inf. Sci. 477, 369\u2013385 (2019). https:\/\/doi.org\/10.1016\/j.ins.2018.10.037","DOI":"10.1016\/j.ins.2018.10.037"},{"key":"5537_CR35","doi-asserted-by":"publisher","unstructured":"Suresh Kumar, V., Amin, R., Obaidat, M.S., Karthikeyan, I.: An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map. J. Inf. Secur. Appl.\u00a053,\u00a0(2020).\u00a0https:\/\/doi.org\/10.1016\/j.jisa.2020.102539","DOI":"10.1016\/j.jisa.2020.102539"},{"key":"5537_CR36","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.ins.2019.07.029","volume":"527","author":"FM Salem","year":"2020","unstructured":"Salem, F.M., Amin, R.: A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Inf. Sci. 527, 382\u2013393 (2020). https:\/\/doi.org\/10.1016\/j.ins.2019.07.029","journal-title":"Inf. Sci."},{"key":"5537_CR37","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.future.2017.08.029","volume":"84","author":"X Li","year":"2018","unstructured":"Li, X., Wu, F., Khan, M.K., Xu, L., Shen, J., Jo, M.: A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Futur. Gener. Comput. Syst.. Gener. Comput. Syst. 84, 149\u2013159 (2018). https:\/\/doi.org\/10.1016\/j.future.2017.08.029","journal-title":"Futur. Gener. Comput. Syst.. Gener. Comput. Syst."},{"key":"5537_CR38","doi-asserted-by":"publisher","unstructured":"Ehuil, B.B., Chen, C., Wang, S., Guo, H., Liu, J.: A secure mutual authentication protocol based on visual cryptography technique for IoT-Cloud. Chinese J. Electronics. 33(1), 43\u201357.\u00a0(2024).\u00a0https:\/\/doi.org\/10.23919\/cje.2022.00.339","DOI":"10.23919\/cje.2022.00.339"},{"issue":"3","key":"5537_CR39","doi-asserted-by":"publisher","first-page":"3867","DOI":"10.1007\/s11042-021-11687-1","volume":"81","author":"Z Bashir","year":"2022","unstructured":"Bashir, Z., Malik, M.G.A., Hussain, M., Iqbal, N.: Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol. Multimedia Tools and Applications 81(3), 3867\u20133897 (2022). https:\/\/doi.org\/10.1007\/s11042-021-11687-1","journal-title":"Multimedia Tools and Applications"},{"issue":"20","key":"5537_CR40","doi-asserted-by":"publisher","first-page":"20214","DOI":"10.1109\/JIOT.2022.3171791","volume":"9","author":"S Yu","year":"2022","unstructured":"Yu, S., Park, Y.: A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions. IEEE Internet Things J. 9(20), 20214\u201320228 (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3171791","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5537_CR41","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1007\/s00500-021-05936-6","volume":"27","author":"D Bao","year":"2023","unstructured":"Bao, D., You, L.: Two-factor identity authentication scheme based on blockchain and fuzzy extractor. Soft. Comput.Comput. 27(2), 1091\u20131103 (2023). https:\/\/doi.org\/10.1007\/s00500-021-05936-6","journal-title":"Soft. Comput.Comput."},{"issue":"16","key":"5537_CR42","first-page":"4293","volume":"97","author":"Z Vahdati","year":"2019","unstructured":"Vahdati, Z., Yasin, S.M.D., Ghasempour, A., Salehi, M.: Comparison of ECC and RSA algorithms in IoT devices. J. Theor. Appl. Inf. Technol.Theor. Appl. Inf. Technol. 97(16), 4293\u20134308 (2019)","journal-title":"J. Theor. Appl. Inf. Technol.Theor. Appl. Inf. Technol."},{"key":"5537_CR43","doi-asserted-by":"publisher","unstructured":"Mullai, A., Mani, K.: Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified Swarm Optimization and Particle Swarm Optimization for mobile devices. Intern. J. Inform. Technol. (Singapore), 13(2), 551\u2013564.\u00a0(2021).\u00a0https:\/\/doi.org\/10.1007\/s41870-019-00413-8","DOI":"10.1007\/s41870-019-00413-8"},{"key":"5537_CR44","doi-asserted-by":"publisher","unstructured":"Patil, K.M., Kuntawar, S.: IOT based wireless networking infrastructure for greenhouse management through web application using ESP8266. Intern. J. Innov. in Eng. Sci. 7(2), 01. (2022).\u00a0https:\/\/doi.org\/10.46335\/ijies.2022.7.2.1","DOI":"10.46335\/ijies.2022.7.2.1"},{"key":"5537_CR45","doi-asserted-by":"publisher","unstructured":"Okemiri, H.A., Chukwu, S.C., Uche-Nwachi, E., Oketa, K.C., Eze, S.C., Aniji, V.I., Idris, A.Y.: Development of a smart home control system. Interna. J. Comput. Sci. Eng.\u00a09(8), 7\u201320.\u00a0(2021).\u00a0https:\/\/doi.org\/10.26438\/ijcse\/v9i8.720","DOI":"10.26438\/ijcse\/v9i8.720"},{"key":"5537_CR46","unstructured":"da, P., Mazzoni, G.: Alessandro Marzani Supervisore Ing Laura Tonni, I. A general framework for IoT-ready geotechnical objects. (2021).\u00a0http:\/\/amsdottorato.unibo.it\/9811\/"},{"key":"5537_CR47","unstructured":"J, K., N, M., M, S., T, S., & T, K.: Power Transformer Monitoring and Controlling using IoT. International Research Journal of Education and Technology 04(06), 87\u201395 (2022)"},{"key":"5537_CR48","doi-asserted-by":"publisher","unstructured":"Elhajj, M., Mulder, P.: A comparative analysis of the computation cost and energy consumption of relevant curves of ECC presented in literature. Interna. J. Electrical Comput. Eng. Res. 3(1), 1\u20136.\u00a0(2023).\u00a0https:\/\/doi.org\/10.53375\/ijecer.2023.318","DOI":"10.53375\/ijecer.2023.318"},{"key":"5537_CR49","doi-asserted-by":"publisher","unstructured":"Barman, S., Chattopadhyay, S., Samanta, D.: A lightweight authentication protocol for a blockchain-based Off-Chain medical data access in multi-server environment. SN Comput. Sci. 5(3). (2024).\u00a0https:\/\/doi.org\/10.1007\/s42979-024-026604","DOI":"10.1007\/s42979-024-026604"},{"key":"5537_CR50","doi-asserted-by":"publisher","unstructured":"Wu, W., Wang, W., Wang, B., Song, R.: Throughput of distributed queueing-based LoRa for long-distance communication. Eurasip J. Adv. Signal Process. 2021(1).\u00a0(2021).\u00a0https:\/\/doi.org\/10.1186\/s13634-021-00739-1.","DOI":"10.1186\/s13634-021-00739-1"},{"key":"5537_CR51","doi-asserted-by":"publisher","unstructured":"Tahir, Muhammad, et al.: CryptoGA: a cryptosystem based on genetic algorithm for cloud data security. Cluster Comput.\u00a024.2 (2021).\u00a0https:\/\/doi.org\/10.1007\/s10586-020-03157-4","DOI":"10.1007\/s10586-020-03157-4"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05537-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05537-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05537-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:05:07Z","timestamp":1764237907000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05537-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":51,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["5537"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05537-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,29]]},"assertion":[{"value":"15 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"893"}}