{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:04:36Z","timestamp":1765040676468,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T00:00:00Z","timestamp":1474416000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672413, U1405255, U1536202, 61372075, 61472310"],"award-info":[{"award-number":["61672413, U1405255, U1536202, 61372075, 61472310"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High Technology Research and Development Program","award":["2015AA016007"],"award-info":[{"award-number":["2015AA016007"]}]},{"name":"Natural Science Basic Research Plan in Shaanxi Province of China","award":["2016JM6005"],"award-info":[{"award-number":["2016JM6005"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["JB161501"],"award-info":[{"award-number":["JB161501"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"China 111 Project","award":["B16037"],"award-info":[{"award-number":["B16037"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10916-016-0587-1","type":"journal-article","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T08:13:09Z","timestamp":1474445589000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0894-4992","authenticated-orcid":false,"given":"Qi","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Xinxin","family":"Lian","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Youliang","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,21]]},"reference":[{"issue":"1","key":"587_CR1","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","volume":"17","author":"M Li","year":"2010","unstructured":"Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51\u201358, 2010.","journal-title":"IEEE Wirel. Commun."},{"key":"587_CR2","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1155\/2015\/289404","volume":"2015","author":"X Qi","year":"2015","unstructured":"Qi, X., Wang, K., Huang, A., Hu, H., and Han, G., MAC protocol in wireless body area network for mobile health: a survey and an architecture design. Int. J. Distrib. Sens. Netw. 2015:9, 2015. doi: 10.1155\/2015\/289404 . Article ID 289404.","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"1","key":"587_CR3","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Wang, J., et al., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1):171\u2013178, 2015.","journal-title":"J. Internet Technol."},{"issue":"1","key":"587_CR4","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11277-014-1748-5","volume":"78","author":"S Xie","year":"2014","unstructured":"Xie, S., and Wang, Y., Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Pers. Commun. 78(1):231\u2013246, 2014.","journal-title":"Wirel. Pers. Commun."},{"key":"587_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2428620","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., and Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 2015. doi: 10.1109\/JSYST.2015.2428620 .","journal-title":"IEEE Syst. J."},{"key":"587_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0346-y","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Shen, J., Zheng, Y., Wang, J., and Chao, H.-C., Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Netw. Appl. 2015. doi: 10.1007\/s12083-015-0346-y .","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"2","key":"587_CR7","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Shen, J., Wang, J., Han, J., and Lee, S., Mutual verifiable provable data auditing in public cloud storage. J. Int. Technol. 16(2):317\u2013323, 2015.","journal-title":"J. Int. Technol."},{"issue":"1","key":"587_CR8","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98-B","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Sun, X., Liu, Q., et al., Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1):190\u2013200, 2015.","journal-title":"IEICE Trans. Commun."},{"issue":"2","key":"587_CR9","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2015","unstructured":"Xia, Z., Wang, X., Sun, X., and Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2):340\u2013352, 2015.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"587_CR10","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/TDSC.2015.2406704","volume":"13","author":"H Li","year":"2015","unstructured":"Li, H., Yang, Y., Luan, T., Liang, X., Zhou, L., and Shen, X., Enabling fine-grained multi-keyword search supporting classified Sub-dictionaries over encrypted cloud data. IEEE Trans. Dependable Secure Comput. 13(3):312\u2013325, 2015.","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"587_CR11","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"53","author":"D He","year":"2015","unstructured":"He, D., and Zeadally, S., Authentication protocol for an ambient assisted living system. IEEE Commun. Mag. 53(1):71\u201377, 2015.","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"587_CR12","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Li, B., et al., A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929\u2013936, 2014.","journal-title":"J. Internet Technol."},{"issue":"4","key":"587_CR13","doi-asserted-by":"crossref","first-page":"2085","DOI":"10.1007\/s11071-015-2467-5","volume":"83","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., and Alelaiwi, A., Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83(4):2085\u20132101, 2016.","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"587_CR14","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang, D., He, D., Wang, P., et al., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4):428\u2013442, 2015.","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"12","key":"587_CR15","first-page":"1681","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Xu, B., and Huang, X., An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12):1681\u20132691, 2015.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"587_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1610-x","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Khan, M. K., Lu, X., Ma, J., and He, D., A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput. 2016. doi: 10.1007\/s11227-015-1610-x .","journal-title":"J. Supercomput."},{"issue":"10","key":"587_CR17","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1093\/comjnl\/bxt077","volume":"57","author":"D Karao\u011flan","year":"2014","unstructured":"Karao\u011flan, D., and Levi, A., A survey on the development of security mechanisms for body area networks. Comput. J. 57(10):1484\u20131512, 2014.","journal-title":"Comput. J."},{"key":"587_CR18","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.cmpb.2016.07.022","volume":"135","author":"MH Ibrahim","year":"2016","unstructured":"Ibrahim, M. H., Kumari, S., Das, A. K., et al., Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput. Methods Prog. Biomed. 135:37\u201350, 2016.","journal-title":"Comput. Methods Prog. Biomed."},{"key":"587_CR19","unstructured":"IEEE standard for local and metropolitan area networks: Part 15.6: Wireless body area networks. IEEE, 2012."},{"key":"587_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3120","author":"M Toorani","year":"2016","unstructured":"Toorani, M., Security analysis of the IEEE 802.15. 6 standard. Int. J. Commun. Syst. 2016. doi: 10.1002\/dac.3120 .","journal-title":"Int. J. Commun. Syst."},{"issue":"5","key":"587_CR21","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1109\/JCN.2015.000083","volume":"17","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Moh, S., et al., Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17(5):453\u2013462, 2015.","journal-title":"J. Commun. Netw."},{"issue":"2","key":"587_CR22","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/TPDS.2013.145","volume":"25","author":"J Liu","year":"2014","unstructured":"Liu, J., Zhang, Z., Chen, X., and Kwak, K., Certificateless remote anonymous authentication schemes for wireless body sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(2):332\u2013342, 2014.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"587_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0013-5","volume":"38","author":"Z Zhao","year":"2014","unstructured":"Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1\u20137, 2014.","journal-title":"J. Med. Syst."},{"issue":"12","key":"587_CR24","doi-asserted-by":"crossref","first-page":"2327","DOI":"10.1109\/TIFS.2014.2363553","volume":"9","author":"H Xiong","year":"2014","unstructured":"Xiong, H., Cost-effective scalable and anonymous certificateless remote authentication protocol. Inf. Forensics Secur. IEEE Trans. 9(12):2327\u20132339, 2014.","journal-title":"Inf. Forensics Secur. IEEE Trans."},{"issue":"7","key":"587_CR25","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.1109\/TIFS.2015.2414399","volume":"10","author":"H Xiong","year":"2015","unstructured":"Xiong, H., and Qin, Z., Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans. Inf. Forensics Secur. 10(7):1442\u20131455, 2015.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"587_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2544805","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., and Lee, J.-H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 2016. doi: 10.1109\/JSYST.2016.2544805 .","journal-title":"IEEE Syst. J."},{"key":"587_CR27","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/s10916-015-0331-2","volume":"39","author":"C Wang","year":"2015","unstructured":"Wang, C., and Zhang, Y., New authentication scheme for wireless body area networks using the bilinear pairing. J. Med. Syst. 39:136, 2015.","journal-title":"J. Med. Syst."},{"key":"587_CR28","volume-title":"Guide to elliptic curve cryptography, lecture notes in computer science","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A., and Vanstone, S., Guide to elliptic curve cryptography, lecture notes in computer science. Springer, Berlin, 2004."},{"key":"587_CR29","doi-asserted-by":"crossref","unstructured":"Boneh D., Franklin M., Identity-based encryption from the weil pairing, Proc. 21st Annu. Int. Cryptol. Conf. (CRYPTO), pp. 213\u2013229, 2001.","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"4","key":"587_CR30","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.inffus.2012.12.002","volume":"14","author":"D Wang","year":"2013","unstructured":"Wang, D., and Ma, C., Cryptanalysis of a remote user authentication scheme for mobile client\u2013server environment based on ECC. Inf. Fusion 14(4):498\u2013503, 2013.","journal-title":"Inf. Fusion"},{"issue":"1","key":"587_CR31","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s11277-014-2002-x","volume":"80","author":"X Li","year":"2015","unstructured":"Li, X., Niu, J., Kumari, S., Liao, J., and Liang, W., An enhancement of a smart card authentication scheme for multi-server architecture. Wirel. Pers. Commun. 80(1):175\u2013192, 2015.","journal-title":"Wirel. Pers. Commun."},{"issue":"10","key":"587_CR32","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1002\/sec.767","volume":"7","author":"X Li","year":"2014","unstructured":"Li, X., Niu, J., Wang, Z., and Chen, C., Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur. Commun. Netw. 7(10):1488\u20131497, 2014.","journal-title":"Secur. Commun. Netw."},{"key":"587_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2596286","author":"D He","year":"2016","unstructured":"He, D., Kumar, N., Wang, H., Wang, L., Choo Raymond, K.-K., and Vinel, A., A provably-secure cross-domain hand shake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans. Dependable Secure Comput. 2016. doi: 10.1109\/TDSC.2016.2596286 .","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"587_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2574719","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Ma, J., and Wei, F., On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J. 2016. doi: 10.1109\/JSYST.2016.2574719 .","journal-title":"IEEE Syst. J."},{"issue":"5","key":"587_CR35","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X., Niu, J., Khan, M. K., and Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365\u20131371, 2013.","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"587_CR36","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Li, G., et al., An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel. Pers. Commun. 68(4):1477\u20131491, 2013.","journal-title":"Wirel. Pers. Commun."},{"key":"587_CR37","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1937","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Kumar, N., Ma, J., Shen, J., He, D., and Naveen, C., An privacy aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int. J. Netw. Manag. 2016. doi: 10.1002\/nem.1937 .","journal-title":"Int. J. Netw. Manag."},{"key":"587_CR38","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.ins.2015.03.070","volume":"321","author":"D Wang","year":"2015","unstructured":"Wang, D., Wang, N., Wang, P., and Qing, S., Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321:162\u2013178, 2015.","journal-title":"Inf. Sci."},{"issue":"8","key":"587_CR39","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/TPDS.2013.124","volume":"25","author":"H Li","year":"2014","unstructured":"Li, H., Lin, X., Yang, H., Liang, X., Lu, R., and Shen, X., EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 25(8):2053\u20132064, 2014.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"587_CR40","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.1007\/s11277-013-1594-x","volume":"77","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Li, G., and Yang, L., An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wirel. Pers. Commun. 77(2):1489\u20131506, 2014.","journal-title":"Wirel. Pers. Commun."},{"issue":"6","key":"587_CR41","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang, Q., Ma, J., Lu, X., and Tian, Y., An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8(6):1070\u20131081, 2015.","journal-title":"Peer-to-Peer Netw. Appl."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0587-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0587-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0587-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T13:48:14Z","timestamp":1718804894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0587-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,21]]},"references-count":41,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["587"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0587-1","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2016,9,21]]},"article-number":"231"}}