{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:06:39Z","timestamp":1774541199829,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,4,18]],"date-time":"2016-04-18T00:00:00Z","timestamp":1460937600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10916-016-0491-8","type":"journal-article","created":{"date-parts":[[2016,4,18]],"date-time":"2016-04-18T09:46:01Z","timestamp":1460972761000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks"],"prefix":"10.1007","volume":"40","author":[{"given":"Libing","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yubo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,18]]},"reference":[{"issue":"3","key":"491_CR1","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","volume":"16","author":"S Movassaghi","year":"2014","unstructured":"Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., and Jamalipour, A., Wireless body area networks: A survey. IEEE Commun. Surv. Tutorials 16(3):1658\u20131686, 2014.","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"12","key":"491_CR2","doi-asserted-by":"crossref","first-page":"2764","DOI":"10.1377\/hlthaff.2012.0535","volume":"31","author":"Z Feng","year":"2012","unstructured":"Feng, Z., Liu, C., Guan, X., and Mor, V., China\u2019s rapidly aging population creates policy challenges in shaping a viable long-term care system. Health Aff. 31(12):2764\u20132773, 2012.","journal-title":"Health Aff."},{"issue":"3.4","key":"491_CR3","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1147\/sj.353.0609","volume":"35","author":"TG Zimmerman","year":"1996","unstructured":"Zimmerman, T. G., Personal area networks: near-field intrabody communication. IBM Syst. J. 35(3.4):609\u2013617, 1996.","journal-title":"IBM Syst. J."},{"key":"491_CR4","unstructured":"IEEE standard for local and metropolitan area networks: Part 15.6:Wireless body area networks. IEEE, 2012."},{"issue":"11","key":"491_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0331-2","volume":"39","author":"C Wang","year":"2015","unstructured":"Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39(11):1\u20138, 2015.","journal-title":"J. Med. Syst."},{"issue":"1","key":"491_CR6","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","volume":"58","author":"X Li","year":"2013","unstructured":"Li, X., Ma, J., Wang, W., Xiong, Y., and Zhang, J., A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(1):85\u201395, 2013.","journal-title":"Math. Comput. Model."},{"issue":"5","key":"491_CR7","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X., Niu, J., Khan, M. K., and Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365\u20131371, 2013.","journal-title":"J. Netw. Comput. Appl."},{"key":"491_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1214","author":"X Li","year":"2014","unstructured":"Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., and Khan, M. K., A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Netw. 2014. doi: 10.1002\/sec.1214 .","journal-title":"Secur. Commun. Netw."},{"issue":"10","key":"491_CR9","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1002\/sec.767","volume":"7","author":"X Li","year":"2014","unstructured":"Li, X., Niu, J., Wang, Z., and Chen, C., Applying biometrics to design three\u2010factor remote user authentication scheme with key agreement. Secur. Commun. Netw. 7(10):1488\u20131497, 2014.","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"491_CR10","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120\u2013126, 1978.","journal-title":"Commun. ACM"},{"key":"491_CR11","first-page":"10","volume":"84","author":"T ElGamal","year":"1984","unstructured":"ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms. Crypto 84:10\u201318, 1984.","journal-title":"Crypto"},{"key":"491_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5469-5","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Shen, H., and Lee, J., One-to-many authentication for access control in mobile pay-TV systems. Sci. China Inf. Sci. 2015. doi: 10.1007\/s11432-015-5469-5 .","journal-title":"Sci. China Inf. Sci."},{"key":"491_CR13","doi-asserted-by":"crossref","unstructured":"Jia, Z., Zhang, Y., Shao, H., Lin, Y., and Wang, J., A remote user authentication scheme using bilinear pairings and ECC. In: Sixth International Conference on Intelligent Systems Design and Applications, pp. 1091\u20131094, 2006.","DOI":"10.1109\/ISDA.2006.253764"},{"key":"491_CR14","doi-asserted-by":"crossref","unstructured":"Jiang, C., Li, B., & Xu, H., An efficient scheme for user authentication in wireless sensor networks. In: 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 438\u2013442, 2007.","DOI":"10.1109\/AINAW.2007.80"},{"key":"491_CR15","doi-asserted-by":"crossref","unstructured":"Liao, Y. P., and Wang, S. S., A secure and efficient scheme of remote user authentication based on bilinear pairings. In: TENCON 2007\u20132007 I.E. Region 10 Conference (pp. 1\u20134). IEEE, 2007.","DOI":"10.1109\/TENCON.2007.4429004"},{"key":"491_CR16","doi-asserted-by":"crossref","unstructured":"Abi-char, P. E., Mhamed, A., and El-Hassan, B., A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications. In Next Generation Mobile Applications, Services and Technologies, 2007. NGMAST\u201907. The 2007 International Conference on (pp. 235\u2013240). IEEE, 2007.","DOI":"10.1109\/NGMAST.2007.4343427"},{"key":"491_CR17","doi-asserted-by":"crossref","unstructured":"Chen, Z. G., and Song, X. X., A distributed electronic authentication scheme based on elliptic curve. In: 2007 International Conference on Machine Learning and Cybernetics, pp. 2179\u20132182, 2007.","DOI":"10.1109\/ICMLC.2007.4370506"},{"key":"491_CR18","doi-asserted-by":"crossref","unstructured":"Miller, V. S., Use of elliptic curves in cryptography. In: Proceedings of CRYPTO\u201985. pp. 417\u2013426, 1985.","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"177","key":"491_CR19","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48(177):203\u2013209, 1987.","journal-title":"Math. Comput."},{"issue":"3","key":"491_CR20","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"JH Yang","year":"2009","unstructured":"Yang, J. H., and Chang, C. C., An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3):138\u2013143, 2009.","journal-title":"Comput. Secur."},{"issue":"7","key":"491_CR21","doi-asserted-by":"crossref","first-page":"3508","DOI":"10.1109\/TVT.2009.2012389","volume":"58","author":"X Cao","year":"2009","unstructured":"Cao, X., Zeng, X., Kou, W., and Hu, L., Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7):3508\u20133517, 2009.","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"491_CR22","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/TDSC.2013.2297110","volume":"11","author":"X Huang","year":"2014","unstructured":"Huang, X., Xiang, Y., Bertino, E., Zhou, J., and Xu, L., Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11(6):568\u2013581, 2014.","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"8","key":"491_CR23","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang, X., Xiang, Y., Chonka, A., Zhou, J., and Deng, R., A generic framework for three-factor authentication: Preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8):1390\u20131397, 2011.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"11","key":"491_CR24","doi-asserted-by":"crossref","first-page":"1892","DOI":"10.1016\/j.jss.2011.06.061","volume":"84","author":"SH Islam","year":"2011","unstructured":"Islam, S. H., and Biswas, G. P., A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892\u20131898, 2011.","journal-title":"J. Syst. Softw."},{"key":"491_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2544805","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., and Lee, J., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 2016. doi: 10.1109\/JSYST.2016.2544805 .","journal-title":"IEEE Syst. J."},{"key":"491_CR26","first-page":"47","volume":"84","author":"A Shamir","year":"1984","unstructured":"Shamir, A., Identity-based cryptosystems and signature schemes. Crypto 84:47\u201353, 1984.","journal-title":"Crypto"},{"issue":"2","key":"491_CR27","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/TPDS.2013.145","volume":"25","author":"J Liu","year":"2014","unstructured":"Liu, J., Zhang, Z., Chen, X., and Kwak, K. S., Certificateless remote anonymous authentication schemes for wireless body area networks. IEEE Trans. Parallel Distrib. Syst. 25(2):332\u2013342, 2014.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"491_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0013-5","volume":"38","author":"Z Zhao","year":"2014","unstructured":"Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1\u20137, 2014.","journal-title":"J. Med. Syst."},{"issue":"12","key":"491_CR29","first-page":"1681","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Xu, B., and Huang, X., An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12):1681\u20132691, 2015.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"491_CR30","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/JSYST.2014.2322973","volume":"9","author":"JL Tsai","year":"2015","unstructured":"Tsai, J. L., and Lo, N. W., A privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 9(3):805\u2013815, 2015.","journal-title":"IEEE Syst. J."},{"issue":"1","key":"491_CR31","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/CJECE.2014.2344447","volume":"38","author":"S Shunmuganathan","year":"2015","unstructured":"Shunmuganathan, S., Saravanan, R. D., and Palanichamy, Y., Secure and efficient smart-card-based remote user authentication scheme for multiserver environment. Can. J. Electr. Comput. Eng. 38(1):20\u201330, 2015.","journal-title":"Can. J. Electr. Comput. Eng."},{"issue":"1","key":"491_CR32","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s11277-014-2002-x","volume":"80","author":"X Li","year":"2015","unstructured":"Li, X., Niu, J., Kumari, S., Liao, J., and Liang, W., An enhancement of a smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 80(1):175\u2013192, 2015.","journal-title":"Wirel. Pers. Commun."},{"key":"491_CR33","doi-asserted-by":"crossref","unstructured":"Shi, L., Yuan, J., Yu, S., and Li, M., ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (pp. 155\u2013166). ACM, 2013.","DOI":"10.1145\/2462096.2462123"},{"key":"491_CR34","doi-asserted-by":"crossref","unstructured":"Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. In: Advances in cryptology\u2014EUROCRYPT 2000 (pp. 139\u2013155). Berlin: Springer, 2000.","DOI":"10.1007\/3-540-45539-6_11"},{"key":"491_CR35","doi-asserted-by":"crossref","unstructured":"Choon, J. C., and Cheon, J. H., An identity-based signature from gap Diffie-Hellman groups. In: Public key cryptography\u2014PKC 2003 (pp. 18\u201330). Berlin: Springer, 2003.","DOI":"10.1007\/3-540-36288-6_2"},{"issue":"3","key":"491_CR36","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., and Stern, J., Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3):361\u2013396, 2000.","journal-title":"J. Cryptol."},{"key":"491_CR37","doi-asserted-by":"crossref","unstructured":"Xiong, X., Wong, D. S., & Deng, X., TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Wireless Communications and Networking Conference (WCNC), 2010 I.E. (pp. 1\u20136). IEEE, 2010.","DOI":"10.1109\/WCNC.2010.5506580"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0491-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0491-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0491-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T20:36:51Z","timestamp":1718483811000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0491-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,18]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["491"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0491-8","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,18]]},"article-number":"134"}}