{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:40:12Z","timestamp":1778258412854,"version":"3.51.4"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T00:00:00Z","timestamp":1706832000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T00:00:00Z","timestamp":1706832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s10723-023-09731-5","type":"journal-article","created":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T11:02:38Z","timestamp":1706871758000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Combined Approach of PUF and Physiological Data for Mutual Authentication and Key Agreement in WMSN"],"prefix":"10.1007","volume":"22","author":[{"given":"Shanvendra","family":"Rai","sequence":"first","affiliation":[]},{"given":"Rituparna","family":"Paul","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-1913","authenticated-orcid":false,"given":"Subhasish","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"Preetisudha","family":"Meher","sequence":"additional","affiliation":[]},{"given":"Gulab","family":"Sah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,2]]},"reference":[{"key":"9731_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0491-8","volume":"40","author":"L Wu","year":"2016","unstructured":"Wu, L., Zhang, Y., Li, L., Shen, J.: Efficient and anonymous authentication scheme for wireless body area networks. J. Med. Syst. 40, 1\u201312 (2016)","journal-title":"J. Med. Syst."},{"issue":"4","key":"9731_CR2","doi-asserted-by":"publisher","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","volume":"11","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 2590\u20132601 (2016)","journal-title":"IEEE Syst. J."},{"issue":"4","key":"9731_CR3","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MWC.2013.6590052","volume":"20","author":"B Liu","year":"2013","unstructured":"Liu, B., Yan, Z., Chen, C.W.: MAC protocol in wireless body area networks for E-health: Challenges and a context-aware design. IEEE Wirel. Commun. 20(4), 64\u201372 (2013)","journal-title":"IEEE Wirel. Commun."},{"key":"9731_CR4","doi-asserted-by":"publisher","first-page":"105101","DOI":"10.1109\/ACCESS.2021.3099299","volume":"9","author":"W Yuanbing","year":"2021","unstructured":"Yuanbing, W., Wanrong, L., Bin, L.: An Improved Authentication Protocol for Smart Healthcare System Using Wireless Medical Sensor Network. IEEE Access 9, 105101\u2013105117 (2021)","journal-title":"IEEE Access"},{"key":"9731_CR5","unstructured":"Ramli, S.N., Ahmad, R., Abdollah, M.F., Dutkiewicz, E.: A biometric-based security for data authentication in wireless body area network (wban). In:\u00a02013 15th international conference on advanced communications technology (ICACT). IEEE, pp. 998\u20131001 (2013, January)"},{"key":"9731_CR6","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.comnet.2018.05.006","volume":"140","author":"AM Koya","year":"2018","unstructured":"Koya, A.M., Deepthi, P.P.: Anonymous hybrid mutual authentication and key agreement scheme for wireless body area network. Comput. Netw. 140, 138\u2013151 (2018)","journal-title":"Comput. Netw."},{"issue":"4","key":"9731_CR7","doi-asserted-by":"publisher","first-page":"415","DOI":"10.5405\/jmbe.1478","volume":"33","author":"CK Yeh","year":"2013","unstructured":"Yeh, C.K., Chen, H.M., Lo, J.W.: An authentication protocol for ubiquitous health monitoring systems. J. Med. Biol. Eng. 33(4), 415\u2013419 (2013)","journal-title":"J. Med. Biol. Eng."},{"issue":"2","key":"9731_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2006.315852","volume":"8","author":"Y Wang","year":"2006","unstructured":"Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2\u201323 (2006)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9731_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0272-9","volume":"39","author":"A Ali","year":"2015","unstructured":"Ali, A., Khan, F.A.: Key agreement schemes in wireless body area networks: Taxonomy and state-of-the-art. J. Med. Syst. 39, 1\u201314 (2015)","journal-title":"J. Med. Syst."},{"key":"9731_CR10","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s00530-015-0476-3","volume":"23","author":"F Wu","year":"2017","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X.: An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Syst. 23, 195\u2013205 (2017)","journal-title":"Multimedia Syst."},{"key":"9731_CR11","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1007\/s11277-016-3718-6","volume":"94","author":"AK Das","year":"2017","unstructured":"Das, A.K., Sutrala, A.K., Odelu, V., Goswami, A.: A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wireless Pers. Commun. 94, 1899\u20131933 (2017)","journal-title":"Wireless Pers. Commun."},{"key":"9731_CR12","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.future.2016.05.032","volume":"80","author":"R Amin","year":"2018","unstructured":"Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Kumar, N.: A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur. Gener. Comput. Syst. 80, 483\u2013495 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9731_CR13","doi-asserted-by":"publisher","unstructured":"Ali, R., Pal, A. K., Kumari, S., Sangaiah, A. K., Li, X., Wu, F.: An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring. Journal of Ambient Intelligence and Humanized Computing, pp. 1\u201322 (2018). https:\/\/doi.org\/10.1007\/s12652-018-1015-9","DOI":"10.1007\/s12652-018-1015-9"},{"issue":"15","key":"9731_CR14","doi-asserted-by":"publisher","first-page":"7487","DOI":"10.3390\/app12157487","volume":"12","author":"N Alsaeed","year":"2022","unstructured":"Alsaeed, N., Nadeem, F.: Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues. Appl. Sci. 12(15), 7487 (2022)","journal-title":"Appl. Sci."},{"key":"9731_CR15","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovi\u0107","year":"2014","unstructured":"Turkanovi\u0107, M., Brumen, B., H\u00f6lbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 20, 96\u2013112 (2014)","journal-title":"Ad Hoc Netw."},{"key":"9731_CR16","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","volume":"36","author":"MS Farash","year":"2016","unstructured":"Farash, M.S., Turkanovi\u0107, M., Kumari, S., H\u00f6lbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw. 36, 152\u2013176 (2016)","journal-title":"Ad Hoc Netw."},{"key":"9731_CR17","first-page":"607","volume":"68","author":"S Nashwan","year":"2021","unstructured":"Nashwan, S.: An end-to-end authentication scheme for healthcare iot systems using wmsn. Comput Mater Contin 68, 607\u2013642 (2021)","journal-title":"Comput Mater Contin"},{"key":"9731_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-017-0720-9","volume":"41","author":"J Srinivas","year":"2017","unstructured":"Srinivas, J., Mishra, D., Mukhopadhyay, S.: A mutual authentication framework for wireless medical sensor networks. J. Med. Syst. 41, 1\u201319 (2017)","journal-title":"J. Med. Syst."},{"key":"9731_CR19","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","volume":"82","author":"F Wu","year":"2018","unstructured":"Wu, F., Li, X., Sangaiah, A.K., Xu, L., Kumari, S., Wu, L., Shen, J.: A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Futur. Gener. Comput. Syst. 82, 727\u2013737 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9731_CR20","doi-asserted-by":"crossref","unstructured":"Ali, R., Pal, A.K., Kumari, S., Sangaiah, A.K., Li, X., Wu, F.: An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring.\u00a0J. Ambient Intell. Human. Comput. 1\u201322 (2018)","DOI":"10.1007\/s12652-018-1015-9"},{"key":"9731_CR21","doi-asserted-by":"crossref","unstructured":"Shuai, M., Liu, B., Yu, N., Xiong, L.: Lightweight and secure three-factor authentication scheme for remote patient monitoring using on-body wireless networks.\u00a0Secur. Commun. Netw.\u00a02019,\u00a01\u201314\u00a0(2019)","DOI":"10.1155\/2019\/8145087"},{"key":"9731_CR22","doi-asserted-by":"publisher","first-page":"107333","DOI":"10.1016\/j.comnet.2020.107333","volume":"177","author":"M Fotouhi","year":"2020","unstructured":"Fotouhi, M., Bayat, M., Das, A.K., Far, H.A.N., Pournaghi, S.M., Doostari, M.A.: A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput. Netw. 177, 107333 (2020)","journal-title":"Comput. Netw."},{"issue":"1","key":"9731_CR23","doi-asserted-by":"publisher","first-page":"8572410","DOI":"10.1155\/2016\/8572410","volume":"12","author":"Y Choi","year":"2016","unstructured":"Choi, Y., Lee, Y., Won, D.: Security improvement on biometric based authentication scheme for wireless sensor networks using fuzzy extraction. Int. J. Distrib. Sens. Netw. 12(1), 8572410 (2016)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"11","key":"9731_CR24","doi-asserted-by":"publisher","first-page":"2039","DOI":"10.1002\/sec.916","volume":"7","author":"S Kumari","year":"2014","unstructured":"Kumari, S., Khan, M.K.: More secure smart card-based remote user password authentication scheme with user anonymity. Secur. Commun. Netw. 7(11), 2039\u20132053 (2014)","journal-title":"Secur. Commun. Netw."},{"key":"9731_CR25","doi-asserted-by":"crossref","unstructured":"Moosavi, S.R., Nigussie, E., Virtanen, S., Isoaho, J.: Cryptographic key generation using ECG signal. In:\u00a02017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, pp. 1024\u20131031 (2017, January)","DOI":"10.1109\/CCNC.2017.7983280"},{"key":"9731_CR26","doi-asserted-by":"crossref","unstructured":"Simske, S.J.: Dynamic biometrics: The case for a real-time solution to the problem of access control, privacy and security. In: 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS). IEEE, pp. 1\u201310 (2009, September)","DOI":"10.1109\/BIDS.2009.5507535"},{"issue":"4","key":"9731_CR27","doi-asserted-by":"publisher","first-page":"570","DOI":"10.3390\/s16040570","volume":"16","author":"S Peter","year":"2016","unstructured":"Peter, S., Pratap Reddy, B., Momtaz, F., Givargis, T.: Design of secure ECG-based biometric authentication in body area sensor networks. Sensors 16(4), 570 (2016)","journal-title":"Sensors"},{"key":"9731_CR28","doi-asserted-by":"crossref","unstructured":"Aysu, A., Gulcan, E., Moriyama, D., Schaumont, P., Yung, M.: End-to-end design of a PUF-based privacy preserving authentication protocol. In\u00a0Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International Workshop, Saint-Malo, France, September 13\u201316, 2015, Proceedings 17. Springer Berlin Heidelberg, pp. 556\u2013576 (2015)","DOI":"10.1007\/978-3-662-48324-4_28"},{"key":"9731_CR29","doi-asserted-by":"crossref","unstructured":"Van Herrewege, A., Katzenbeisser, S., Maes, R., Peeters, R., Sadeghi, A.R., Verbauwhede, I., Wachsmann, C.: Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs. In:\u00a0Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers 16. Springer Berlin Heidelberg, pp. 374\u2013389 (2012)","DOI":"10.1007\/978-3-642-32946-3_27"},{"key":"9731_CR30","unstructured":"Moriyama, D., Matsuo, S.I., Yung, M.: PUF-based RFID authentication secure and private under memory leakage.\u00a0Cryptology ePrint Archive, (2013)"},{"issue":"11","key":"9731_CR31","doi-asserted-by":"publisher","first-page":"2831","DOI":"10.1109\/TIFS.2018.2832849","volume":"13","author":"P Gope","year":"2018","unstructured":"Gope, P., Lee, J., Quek, T.Q.: Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans. Inf. Forensics Secur. 13(11), 2831\u20132843 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"9731_CR32","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/TDSC.2018.2832201","volume":"16","author":"U Chatterjee","year":"2018","unstructured":"Chatterjee, U., Govindan, V., Sadhukhan, R., Mukhopadhyay, D., Chakraborty, R.S., Mahata, D., Prabhu, M.M.: Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database. IEEE Trans. Dependable Secure Comput. 16(3), 424\u2013437 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"9731_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3005715","volume":"16","author":"U Chatterjee","year":"2017","unstructured":"Chatterjee, U., Chakraborty, R.S., Mukhopadhyay, D.: A PUF-based secure communication protocol for IoT. ACM Trans. Embed. Comput. Syst. (TECS) 16(3), 1\u201325 (2017)","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"issue":"1","key":"9731_CR34","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","volume":"6","author":"P Gope","year":"2018","unstructured":"Gope, P., Sikdar, B.: Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J. 6(1), 580\u2013589 (2018)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"9731_CR35","doi-asserted-by":"publisher","first-page":"3335","DOI":"10.1109\/JIOT.2018.2882610","volume":"6","author":"MN Aman","year":"2018","unstructured":"Aman, M.N., Basheer, M.H., Sikdar, B.: Two-factor authentication for IoT with location information. IEEE Internet Things J. 6(2), 3335\u20133351 (2018)","journal-title":"IEEE Internet Things J."},{"key":"9731_CR36","doi-asserted-by":"publisher","first-page":"85627","DOI":"10.1109\/ACCESS.2019.2926578","volume":"7","author":"S Banerjee","year":"2019","unstructured":"Banerjee, S., Odelu, V., Das, A.K., Chattopadhyay, S., Rodrigues, J.J., Park, Y.: Physically secure lightweight anonymous user authentication protocol for internet of things using physically unclonable functions. IEEE Access 7, 85627\u201385644 (2019)","journal-title":"IEEE Access"},{"issue":"2","key":"9731_CR37","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/JIOT.2020.3010893","volume":"8","author":"MN Aman","year":"2020","unstructured":"Aman, M.N., Javaid, U., Sikdar, B.: A privacy-preserving and scalable authentication protocol for the internet of vehicles. IEEE Internet Things J. 8(2), 1123\u20131139 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"9731_CR38","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TITS.2016.2579162","volume":"18","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 18(3), 516\u2013526 (2016)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"8","key":"9731_CR39","doi-asserted-by":"publisher","first-page":"3753","DOI":"10.1007\/s11276-022-03070-1","volume":"28","author":"X Shao","year":"2022","unstructured":"Shao, X., Guo, Y., Guo, Y.: A PUF-based anonymous authentication protocol for wireless medical sensor networks. Wireless Netw. 28(8), 3753\u20133770 (2022)","journal-title":"Wireless Netw."},{"key":"9731_CR40","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2018.09.017","volume":"91","author":"M Wazid","year":"2019","unstructured":"Wazid, M., Das, A.K., Kumar, N., Vasilakos, A.V.: Design of secure key management and user authentication scheme for fog computing services. Futur. Gener. Comput. Syst. 91, 475\u2013492 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"9731_CR41","doi-asserted-by":"publisher","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia, X., He, D., Kumar, N., Choo, K.K.R.: Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Netw. 25, 4737\u20134750 (2019)","journal-title":"Wireless Netw."},{"key":"9731_CR42","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1007\/s10922-019-09496-x","volume":"27","author":"S Naoui","year":"2019","unstructured":"Naoui, S., Elhdhili, M.E., Saidane, L.A.: Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J. Netw. Syst. Manage. 27, 1020\u20131042 (2019)","journal-title":"J. Netw. Syst. Manage."},{"issue":"4","key":"9731_CR43","doi-asserted-by":"publisher","first-page":"5521","DOI":"10.1109\/JSYST.2022.3173538","volume":"16","author":"C Li","year":"2022","unstructured":"Li, C., Dong, M., Li, J., Xu, G., Chen, X.B., Liu, W., Ota, K.: Efficient medical big data management with keyword-searchable encryption in healthchain. IEEE Syst. J. 16(4), 5521\u20135532 (2022)","journal-title":"IEEE Syst. J."},{"key":"9731_CR44","doi-asserted-by":"publisher","first-page":"109469","DOI":"10.1016\/j.comnet.2022.109469","volume":"220","author":"FG Darbandeh","year":"2023","unstructured":"Darbandeh, F.G., Safkhani, M.: SAPWSN: A secure authentication protocol for wireless sensor networks. Comput. Netw. 220, 109469 (2023)","journal-title":"Comput. Netw."},{"key":"9731_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2017.12.004","volume":"71","author":"SY Chiou","year":"2018","unstructured":"Chiou, S.Y., Chang, S.Y.: An enhanced authentication scheme in mobile RFID system. Ad Hoc Netw. 71, 1\u201313 (2018)","journal-title":"Ad Hoc Netw."},{"key":"9731_CR46","doi-asserted-by":"publisher","first-page":"104722","DOI":"10.1016\/j.micpro.2022.104722","volume":"96","author":"B Khalid","year":"2023","unstructured":"Khalid, B., Qureshi, K.N., Ghafoor, K.Z., Jeon, G.: An improved biometric based user authentication and key agreement scheme for intelligent sensor based wireless communication. Microprocess. Microsyst. 96, 104722 (2023)","journal-title":"Microprocess. Microsyst."},{"issue":"15","key":"9731_CR47","doi-asserted-by":"publisher","first-page":"4143","DOI":"10.3390\/s20154143","volume":"20","author":"S Yu","year":"2020","unstructured":"Yu, S., Park, Y.: SLUA-WSN: Secure and lightweight three-factor-based user authentication protocol for wireless sensor networks. Sensors 20(15), 4143 (2020)","journal-title":"Sensors"},{"key":"9731_CR48","doi-asserted-by":"crossref","unstructured":"B\u00f6hm, C., Hofer, M., B\u00f6hm, C., Hofer, M.: Two Stage PUF.\u00a0Physical Unclonable Functions in Theory and Practice, 221\u2013226 (2013)","DOI":"10.1007\/978-1-4614-5040-5_12"},{"key":"9731_CR49","doi-asserted-by":"crossref","unstructured":"Tuyls, P., Batina, L.: RFID-tags for anti-counterfeiting. In:\u00a0Topics in Cryptology\u2013CT-RSA 2006: The Cryptographers\u2019 Track at the RSA Conference 2006, San Jose, CA, USA, February 13\u201317, 2005. Proceedings. Springer Berlin Heidelberg, pp. 115\u2013131 (2006)","DOI":"10.1007\/11605805_8"},{"key":"9731_CR50","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2\u20136, 2004. Proceedings 23. Springer Berlin Heidelberg, pp. 523\u2013540 (2004)","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"9731_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2008\/529879","volume":"2008","author":"FM Bui","year":"2007","unstructured":"Bui, F.M., Hatzinakos, D.: Biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling. EURASIP J. Adv. Signal Process. 2008, 1\u201316 (2007)","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"9731_CR52","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1109\/ACCESS.2015.2445336","volume":"3","author":"G Zheng","year":"2015","unstructured":"Zheng, G., Fang, G., Shankaran, R., Orgun, M.A.: Encryption for implantable medical devices using modified one-time pads. IEEE Access 3, 825\u2013836 (2015)","journal-title":"IEEE Access"},{"key":"9731_CR53","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., ...,Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In:\u00a0Computer Aided Verification: 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005. Proceedings 17. Springer Berlin Heidelberg, pp. 281-285 (2005)","DOI":"10.1007\/11513988_27"},{"key":"9731_CR54","unstructured":"AVISPA, S:. the Security Protocol ANimator for AVISPA. (2019)"},{"key":"9731_CR55","first-page":"1","volume":"2021","author":"TY Wu","year":"2021","unstructured":"Wu, T.Y., Wang, T., Lee, Y.Q., Zheng, W., Kumari, S., Kumar, S.: Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur. Commun. Netw. 2021, 1\u201316 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"9731_CR56","doi-asserted-by":"publisher","first-page":"47282","DOI":"10.1109\/ACCESS.2020.2978891","volume":"8","author":"G Xu","year":"2020","unstructured":"Xu, G., Wang, F., Zhang, M., Peng, J.: Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks. IEEE Access 8, 47282\u201347294 (2020)","journal-title":"IEEE Access"},{"key":"9731_CR57","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1016\/j.compeleceng.2017.08.003","volume":"69","author":"S Challa","year":"2018","unstructured":"Challa, S., Das, A.K., Odelu, V., Kumar, N., Kumari, S., Khan, M.K., Vasilakos, A.V.: An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 69, 534\u2013554 (2018)","journal-title":"Comput. Electr. Eng."}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-023-09731-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10723-023-09731-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-023-09731-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T10:13:49Z","timestamp":1710929629000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10723-023-09731-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,2]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["9731"],"URL":"https:\/\/doi.org\/10.1007\/s10723-023-09731-5","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"value":"1570-7873","type":"print"},{"value":"1572-9184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,2]]},"assertion":[{"value":"25 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This article does not contain any studies with human participants.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"23"}}