{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T17:29:09Z","timestamp":1767979749782,"version":"3.49.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T00:00:00Z","timestamp":1592179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61662046"],"award-info":[{"award-number":["61662046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s10916-020-01598-3","type":"journal-article","created":{"date-parts":[[2020,6,15]],"date-time":"2020-06-15T22:02:25Z","timestamp":1592258545000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An Efficient Cross-Domain Data Transmission Scheme for Wireless Body Area Networks"],"prefix":"10.1007","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2231-3775","authenticated-orcid":false,"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xingtong","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yi","family":"Luo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"issue":"3","key":"1598_CR1","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","volume":"16","author":"S Movassaghi","year":"2014","unstructured":"Movassaghi, S., Abolhasan, M., Lipman, J., David, S., and Jamalipour, A., Wireless body area networks: a survey. IEEE Communications Surveys & Tutorials. 16(3):1658-1686, 2014.","journal-title":"IEEE Communications Surveys & Tutorials."},{"issue":"2","key":"1598_CR2","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.eij.2016.11.001","volume":"18","author":"A Samaher","year":"2017","unstructured":"Samaher, A., Ibrahim, A., Mohammad, S., Shahaboddin, S., Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informatics Journal. 18(2):113-122, 2017.","journal-title":"Egyptian Informatics Journal."},{"key":"1598_CR3","doi-asserted-by":"crossref","unstructured":"Janani, V. S., Manikandan, M. S. K., Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks. Eurasip Journal on Wireless Communications and Networking. 1-27, 2018.","DOI":"10.1186\/s13638-017-1001-5"},{"key":"1598_CR4","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.future.2019.01.026","volume":"96","author":"W Jiang","year":"2019","unstructured":"Jiang, W., Li H., Xu, G. et al., PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI. Future Generation Computer Systems. 96:185-195, 2019.","journal-title":"Future Generation Computer Systems."},{"key":"1598_CR5","first-page":"1","volume":"89","author":"H Joel","year":"2020","unstructured":"Joel, H., Samuel, L., Martin, F., Shahid, R., PKI4IoT: Towards public key infrastructure for the Internet of Things. Computers & Security. 89:1-11, 2020.","journal-title":"Computers & Security."},{"key":"1598_CR6","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.ins.2019.01.004","volume":"481","author":"H Li","year":"2019","unstructured":"Li, H., Huang, Q., Shen, J. et al., Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Information Sciences. 481:330-343, 2019.","journal-title":"Information Sciences."},{"key":"1598_CR7","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.tcs.2020.02.031","volume":"815","author":"Y Sun","year":"2020","unstructured":"Sun, Y., Mu, Y., Susilo, W. et al., Revocable identity-based encryption with server-aided ciphertext evolution. Theoretical Computer Science. 815:11-24, 2020.","journal-title":"Theoretical Computer Science."},{"key":"1598_CR8","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.ins.2019.12.076","volume":"516","author":"Y Yao","year":"2020","unstructured":"Yao, Y., Li, Z., Guo, H., A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes. Information Sciences. 516:505-514, 2020.","journal-title":"Information Sciences."},{"issue":"9","key":"1598_CR9","doi-asserted-by":"publisher","first-page":"5099","DOI":"10.1109\/TII.2019.2894108","volume":"15","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Deng, R., Zheng, D. et al., Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT. IEEE Transactions on Industrial Informatics. 15(9):5099-5108, 2019.","journal-title":"IEEE Transactions on Industrial Informatics."},{"key":"1598_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-020-1527-7","volume":"92","author":"Z Xu","year":"2020","unstructured":"Xu, Z., He, D., Vijayakumar, P. et al., Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems. Journal of Medical Systems. 92:1-8, 2020. https:\/\/doi.org\/10.1007\/s10916-020-1527-7.","journal-title":"Journal of Medical Systems."},{"issue":"4","key":"1598_CR11","doi-asserted-by":"publisher","first-page":"3184","DOI":"10.1109\/JIOT.2020.2966242","volume":"7","author":"S Mandal","year":"2020","unstructured":"Mandal, S., Bera, B., Sutrala, A. K. et al., Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. IEEE Internet of Things Journal. 7(4):3184-3197, 2020.","journal-title":"IEEE Internet of Things Journal."},{"issue":"2","key":"1598_CR12","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TPDS.2013.145","volume":"25","author":"J Liu","year":"2014","unstructured":"Liu, J., Zhang, Z., Chen, X. et al., Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Transactions on Parallel and Distributed Systems. 25(2):332-342, 2014.","journal-title":"IEEE Transactions on Parallel and Distributed Systems."},{"issue":"4","key":"1598_CR13","doi-asserted-by":"publisher","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","volume":"11","author":"D He","year":"2017","unstructured":"He, D., Zeadally, S., Kumar, N. et al., Anonymous authentication for wireless body area networks with provable security. IEEE Systems Journal. 11(4):2590-2601,2017.","journal-title":"IEEE Systems Journal."},{"key":"1598_CR14","doi-asserted-by":"crossref","unstructured":"Wei, F., Vijayakumar, P., Shen,J. et al. A provably secure password-based anonymous authentication scheme for wireless body area networks. Computers & Electrical Engineering. 65:322\u2013331, 2018.","DOI":"10.1016\/j.compeleceng.2017.04.017"},{"key":"1598_CR15","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/978-3-319-27161-3_47","volume":"9532","author":"C Wang","year":"2015","unstructured":"Wang, C., Jing Liu, J., Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks. International Conference on Algorithms and Architectures for Parallel Processing. 9532:521-530, 2015.","journal-title":"International Conference on Algorithms and Architectures for Parallel Processing."},{"issue":"1","key":"1598_CR16","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1504\/IJSNET.2018.088384","volume":"26","author":"Y Lu","year":"2018","unstructured":"Lu, Y., Wang, X., Hu, C. et al. A traceable threshold attribute-based signcryption for mHealthcare social network. International Journal of Sensor Networks. 26(1): 43\u201353, 2018.","journal-title":"International Journal of Sensor Networks."},{"issue":"11","key":"1598_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0615-1","volume":"40","author":"AA Omala","year":"2016","unstructured":"Omala, A. A., Robert, N., Li, F., A Provably-Secure Transmission Scheme for Wireless Body Area Networks. Journal of Medical Systems. 40(11):1-14, 2016.","journal-title":"Journal of Medical Systems."},{"issue":"3","key":"1598_CR18","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TIFS.2016.2631950","volume":"12","author":"A Zhang","year":"2017","unstructured":"Zhang, A., Wang, L., Ye, X. et al. Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE Transactions on Information Forensics & Security. 12(3):662-675, 2017.","journal-title":"IEEE Transactions on Information Forensics & Security."},{"issue":"7","key":"1598_CR19","doi-asserted-by":"publisher","first-page":"1869","DOI":"10.1109\/TIFS.2018.2799582","volume":"13","author":"C Zhou","year":"2018","unstructured":"Zhou, C., Comments on \u201cLight-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems\u201d. IEEE Transactions on Information Forensics & Security. 13(7):1869-1870, 2018.","journal-title":"IEEE Transactions on Information Forensics & Security."},{"issue":"1","key":"1598_CR20","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/JSYST.2016.2557850","volume":"12","author":"F Li","year":"2018","unstructured":"Li, F., Han, Y., Jin, C., Cost-Effective and Anonymous Access Control for Wireless Body Area Networks. IEEE Systems Journal. 12(1):747-758, 2018.","journal-title":"IEEE Systems Journal."},{"issue":"6","key":"1598_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0964-z","volume":"42","author":"AA Omala","year":"2018","unstructured":"Omala, A. A., Mbandu, A. S., Mutiria, K. D. et al. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network. Journal of Medical Systems. 42(6):1-14, 2018.","journal-title":"Journal of Medical Systems."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-020-01598-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10916-020-01598-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-020-01598-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T23:30:07Z","timestamp":1623713407000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10916-020-01598-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,15]]},"references-count":21,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["1598"],"URL":"https:\/\/doi.org\/10.1007\/s10916-020-01598-3","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,15]]},"assertion":[{"value":"16 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"133"}}