{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:12:47Z","timestamp":1759133567123},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2010,11,11]],"date-time":"2010-11-11T00:00:00Z","timestamp":1289433600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s11036-010-0274-2","type":"journal-article","created":{"date-parts":[[2010,11,10]],"date-time":"2010-11-10T12:28:12Z","timestamp":1289392092000},"page":"683-694","source":"Crossref","is-referenced-by-count":78,"title":["A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network"],"prefix":"10.1007","volume":"16","author":[{"given":"Rongxing","family":"Lu","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,11]]},"reference":[{"key":"274_CR1","doi-asserted-by":"crossref","unstructured":"Lu R, Lin X, Liang X, Shen X (2010) Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network. In: Proc. BodyNets 2010, Corfu Island, Greece","DOI":"10.1145\/2221924.2221927"},{"key":"274_CR2","doi-asserted-by":"crossref","unstructured":"Appari A, Johnson ME, Anthony DL (2009) HIPAA compliance in home health: a neo-institutional theoretic perspective. In: SPIMACS \u201909, pp 13\u201320","DOI":"10.1145\/1655084.1655087"},{"issue":"1","key":"274_CR3","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MWC.2010.5416348","volume":"17","author":"M Chen","year":"2010","unstructured":"Chen M, Gonzalez S, Zhang Q, Li M, Leung V (2010) A 2g-rfid based e-healthcare system. IEEE Wirel Commun Mag 17(1):37\u201343","journal-title":"IEEE Wirel Commun Mag"},{"issue":"1","key":"274_CR4","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MWC.2010.5416345","volume":"17","author":"H Wang","year":"2010","unstructured":"Wang H, Peng D, Wang W, Sharif H, Chen HH, Khoynezhad A (2010) Resource-aware secure ECG healthcare monitoring through body sensor networks. IEEE Wirel Commun Mag 17(1):12\u201319","journal-title":"IEEE Wirel Commun Mag"},{"issue":"1","key":"274_CR5","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","volume":"17","author":"M Li","year":"2010","unstructured":"Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun Mag 17(1):51\u201358","journal-title":"IEEE Wirel Commun Mag"},{"issue":"1","key":"274_CR6","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MWC.2010.5416352","volume":"17","author":"J Sun","year":"2010","unstructured":"Sun J, Fang Y, Zhu X (2010) Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel Commun Mag 17(1):66\u201373","journal-title":"IEEE Wirel Commun Mag"},{"issue":"1","key":"274_CR7","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MWC.2010.5416353","volume":"17","author":"H Cheng","year":"2010","unstructured":"Cheng H, Zhuang W (2010) Bluetooth-enabled in-home patient monitoring system: early detection of Alzheimer\u2019s disease. IEEE Wirel Commun Mag 17(1):74\u201379","journal-title":"IEEE Wirel Commun Mag"},{"issue":"1","key":"274_CR8","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MWC.2010.5416355","volume":"17","author":"J Misic","year":"2010","unstructured":"Misic J, Misic V (2010) Bridge performance in a multitier wireless network for healthcare monitoring. IEEE Wirel Commun Mag 17(1):90\u201395","journal-title":"IEEE Wirel Commun Mag"},{"issue":"1","key":"274_CR9","first-page":"37","volume":"17","author":"M Chen","year":"2010","unstructured":"Chen M, Gonzalez S, Vasilakos A, Cao H, Leung V (2010) Body area networks: a survey. ACM\/Springer Mob Netw Appl (MONET) 17(1):37\u201343. doi: 10.1007\/s11036-010-0260-8","journal-title":"ACM\/Springer Mob Netw Appl (MONET)"},{"key":"274_CR10","doi-asserted-by":"crossref","unstructured":"Kotz D, Avancha S, Baxi A (2009) A privacy framework for mobile health and home-care systems. In: SPIMACS \u201909, Chicago, Illinois, USA, pp 1\u201312","DOI":"10.1145\/1655084.1655086"},{"key":"274_CR11","unstructured":"Liang X, Lu R, Lin X, Shen X (2010) Patient self-controllable access policy on PHI in ehealthcare systems. In: AHIC 2010, Kitchener, Ontario, Canada"},{"key":"274_CR12","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1109\/JSAC.2009.090502","volume":"27","author":"X Lin","year":"2009","unstructured":"Lin X, Lu R, Shen X, Nemoto Y, Kato N (2009) SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J Sel Areas Commun 27:365\u2013378","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"274_CR13","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh D, Franklin M (2003) Identity-based encryption from the weil pairing. SIAM J Comput 32(3):586\u2013615","journal-title":"SIAM J Comput"},{"issue":"4","key":"274_CR14","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/s00145-002-0133-9","volume":"15","author":"V Shoup","year":"2002","unstructured":"Shoup V (2002) OAEP reconsidered. J Cryptol 15(4):223\u2013249","journal-title":"J Cryptol"},{"key":"274_CR15","doi-asserted-by":"crossref","unstructured":"Izabachene M, Pointcheval D (2008) New anonymity notions for identity-based encryption. In: SCN \u201908. LNCS 5229, pp 375\u2013391","DOI":"10.1007\/978-3-540-85855-3_25"},{"key":"274_CR16","doi-asserted-by":"crossref","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: CCS \u201993, pp 62\u201373","DOI":"10.1145\/168588.168596"},{"key":"274_CR17","unstructured":"Pietilainen AK, Diot C (2009) Social pocket switched networks. In: INFOCOM\u201909, Rio de Janeiro, Brazil, pp 403\u2013404"},{"key":"274_CR18","doi-asserted-by":"crossref","unstructured":"Balfanz D, Durfee G, Shankar N, Smetters D, Staddon J, Wong H (2003) Secret handshake from pairing-based key agreements. In: IEEE S&P \u201903, pp 180\u2013196","DOI":"10.1109\/SECPRI.2003.1199336"},{"issue":"9","key":"274_CR19","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1109\/LCOMM.2009.091228","volume":"13","author":"R Su","year":"2009","unstructured":"Su R (2009) On the security of a novel and efficient unlinkable secret handshakes scheme. IEEE Commun Lett 13(9):712\u2013713","journal-title":"IEEE Commun Lett"},{"key":"274_CR20","unstructured":"Zhou L, Susilo W, Mu Y (2006) Three-move secret handshakes. In: ISPEC 2006. LNCS 3903, pp 332\u2013342"},{"issue":"4","key":"274_CR21","doi-asserted-by":"crossref","first-page":"1483","DOI":"10.1109\/TWC.2010.04.090557","volume":"9","author":"R Lu","year":"2010","unstructured":"Lu R, Lin X, Zhu H, Shen X, Preiss BR (2010) Pi: A practical incentive protocol for delay tolerant networks. IEEE Trans Wirel Commun 9(4):1483\u20131493","journal-title":"IEEE Trans Wirel Commun"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-010-0274-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-010-0274-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-010-0274-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T05:16:53Z","timestamp":1559798213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-010-0274-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,11]]},"references-count":21,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["274"],"URL":"https:\/\/doi.org\/10.1007\/s11036-010-0274-2","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,11]]}}}