{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T05:12:06Z","timestamp":1772773926240,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T00:00:00Z","timestamp":1539043200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272525"],"award-info":[{"award-number":["61272525"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["ZYGX2016J081"],"award-info":[{"award-number":["ZYGX2016J081"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Laboratory for Internet of Things and Mobile Internet Technology of Jiangsu Province","award":["JSWLW-2017-006"],"award-info":[{"award-number":["JSWLW-2017-006"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11036-018-1145-5","type":"journal-article","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T21:28:03Z","timestamp":1539034083000},"page":"890-902","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity"],"prefix":"10.1007","volume":"24","author":[{"given":"Alzubair","family":"Hassan","sequence":"first","affiliation":[]},{"given":"Anyembe Andrew","family":"Omala","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Ali","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Jin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-1265","authenticated-orcid":false,"given":"Fagen","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,9]]},"reference":[{"issue":"9","key":"1145_CR1","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1016\/j.comnet.2009.12.008","volume":"54","author":"TY Wu","year":"2010","unstructured":"Wu TY, Tseng YM (2010) An efficient user authentication and key exchange protocol for mobile client\u2013server environment. Comput Netw 54(9):1520\u20131530","journal-title":"Comput Netw"},{"issue":"3","key":"1145_CR2","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.inffus.2011.01.001","volume":"13","author":"H Debiao","year":"2012","unstructured":"Debiao H, Jianhua C, Jin H (2012) An ID-based client authentication with key agreement protocol for mobile client\u2013server environment on ECC with provable security. Information Fusion 13(3):223\u2013230","journal-title":"Information Fusion"},{"issue":"6","key":"1145_CR3","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1016\/j.adhoc.2012.01.002","volume":"10","author":"D He","year":"2012","unstructured":"He D (2012) An efficient remote user authentication and key agreement protocol for mobile client\u2013server environment from pairings. Ad Hoc Netw 10(6):1009\u20131016","journal-title":"Ad Hoc Netw"},{"issue":"6","key":"1145_CR4","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s12652-015-0305-8","volume":"6","author":"H Shen","year":"2015","unstructured":"Shen H, Gao C, He D, Wu L (2015) New biometrics-based authentication scheme for multi-server environment in critical systems. J Ambient Intell Humaniz Comput 6(6):825\u2013834","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1145_CR5","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/11496137_34","volume-title":"Efficient identity based ring signature","author":"SSM Chow","year":"2005","unstructured":"Chow SSM, Yiu SM, Hui LCK (2005) Efficient identity based ring signature. Springer, Berlin, pp 499\u2013512. \n                    https:\/\/doi.org\/10.1007\/11496137_34"},{"key":"1145_CR6","unstructured":"Pleva P (2012) A revised classification of anonymity. arXiv:\n                    1211.5613"},{"key":"1145_CR7","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques. Springer, pp 47\u201353"},{"issue":"6","key":"1145_CR8","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"LH Li","year":"2001","unstructured":"Li LH, Lin LC, Hwang MS (2001) A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans Neural Netw 12(6):1498\u20131504. \n                    https:\/\/doi.org\/10.1109\/72.963786","journal-title":"IEEE Trans Neural Netw"},{"issue":"1","key":"1145_CR9","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"WS Juang","year":"2004","unstructured":"Juang WS (2004) Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans Consum Electron 50(1):251\u2013255. \n                    https:\/\/doi.org\/10.1109\/TCE.2004.1277870","journal-title":"IEEE Trans Consum Electron"},{"key":"1145_CR10","doi-asserted-by":"publisher","unstructured":"Chang CC, Lee JS (2004) An efficient and secure multi-server password authentication scheme using smart cards. In: 2004 International conference on cyberworlds, pp 417\u2013422. \n                    https:\/\/doi.org\/10.1109\/CW.2004.17","DOI":"10.1109\/CW.2004.17"},{"issue":"1","key":"1145_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"YP Liao","year":"2009","unstructured":"Liao YP, Wang SS (2009) A secure dynamic id based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 31(1):24\u201329","journal-title":"Computer Standards & Interfaces"},{"issue":"6","key":"1145_CR12","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","volume":"31","author":"HC Hsiang","year":"2009","unstructured":"Hsiang HC, Shih WK (2009) Improvement of the secure dynamic id based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces 31(6):1118\u2013 1123","journal-title":"Computer Standards & Interfaces"},{"issue":"2","key":"1145_CR13","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.jnca.2010.11.011","volume":"34","author":"SK Sood","year":"2011","unstructured":"Sood SK, Sarje AK, Singh K (2011) A secure dynamic identity based authentication protocol for multi-server architecture. J Netw Comput Appl 34(2):609\u2013618","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"1145_CR14","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li X, Xiong Y, Ma J, Wang W (2012) An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J Netw Comput Appl 35(2):763\u2013769","journal-title":"J Netw Comput Appl"},{"key":"1145_CR15","unstructured":"Han W (2012) Weaknesses of a dynamic identity based authentication protocol for multi-server architecture. arXiv:\n                    1201.0883"},{"issue":"1","key":"1145_CR16","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s11227-010-0512-1","volume":"63","author":"EJ Yoon","year":"2013","unstructured":"Yoon EJ, Yoo KY (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J Supercomput 63(1):235\u2013255. \n                    https:\/\/doi.org\/10.1007\/s11227-010-0512-1","journal-title":"J Supercomput"},{"issue":"11","key":"1145_CR17","doi-asserted-by":"publisher","first-page":"1260","DOI":"10.1002\/sec.573","volume":"5","author":"MK Khan","year":"2012","unstructured":"Khan MK, He D (2012) A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Security and Communication Networks 5(11):1260\u20131266. \n                    https:\/\/doi.org\/10.1002\/sec.573","journal-title":"Security and Communication Networks"},{"issue":"8","key":"1145_CR18","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.1002\/dac.2405","volume":"27","author":"W Han","year":"2014","unstructured":"Han W, Zhu Z (2014) An id-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int J Commun Syst 27(8):1173\u20131185. \n                    https:\/\/doi.org\/10.1002\/dac.2405","journal-title":"Int J Commun Syst"},{"issue":"3","key":"1145_CR19","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He D, Wang D (2015) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816\u2013823. \n                    https:\/\/doi.org\/10.1109\/JSYST.2014.2301517","journal-title":"IEEE Syst J"},{"issue":"6","key":"1145_CR20","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s12652-015-0305-8","volume":"6","author":"H Shen","year":"2015","unstructured":"Shen H, Gao C, He D, Wu L (2015) New biometrics-based authentication scheme for multi-server environment in critical systems. J Ambient Intell Humaniz Comput 6(6):825\u2013834. \n                    https:\/\/doi.org\/10.1007\/s12652-015-0305-8","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"11","key":"1145_CR21","doi-asserted-by":"publisher","first-page":"e3251","DOI":"10.1002\/dac.3251","volume":"30","author":"YM Tseng","year":"2017","unstructured":"Tseng YM, Huang SS, You ML (2017) Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments. Int J Commun Syst 30(11):e3251\u2013n\/a. \n                    https:\/\/doi.org\/10.1002\/dac.3251\n                    \n                  . E3251 IJCS-16-0586.R1","journal-title":"Int J Commun Syst"},{"issue":"1","key":"1145_CR22","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/s11704-014-3125-7","volume":"9","author":"P Jiang","year":"2015","unstructured":"Jiang P, Wen Q, Li W, Jin Z, Zhang H (2015) An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Front Comp Sci 9(1):142\u2013156. \n                    https:\/\/doi.org\/10.1007\/s11704-014-3125-7","journal-title":"Front Comp Sci"},{"issue":"4","key":"1145_CR23","doi-asserted-by":"publisher","first-page":"2351","DOI":"10.1007\/s11277-015-2708-4","volume":"84","author":"H Lin","year":"2015","unstructured":"Lin H, Wen F, Du C (2015) An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Wirel Pers Commun 84(4):2351\u20132362. \n                    https:\/\/doi.org\/10.1007\/s11277-015-2708-4","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"1145_CR24","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1016\/j.future.2012.03.017","volume":"29","author":"YP Liao","year":"2013","unstructured":"Liao YP, Hsiao CM (2013) A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients. Futur Gener Comput Syst 29(3):886\u2013900","journal-title":"Futur Gener Comput Syst"},{"issue":"9","key":"1145_CR25","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","volume":"11","author":"D He","year":"2016","unstructured":"He D, Zeadally S, Kumar N, Wu W (2016) Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans Inf Forensics Secur 11(9):2052\u20132064. \n                    https:\/\/doi.org\/10.1109\/TIFS.2016.2573746","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"1145_CR26","doi-asserted-by":"publisher","first-page":"811","DOI":"10.3837\/tiis.2015.02.019","volume":"9","author":"H Zhu","year":"2015","unstructured":"Zhu H (2015) A provable one-way authentication key agreement scheme with user anonymity for multi-server environment. KSII Trans Internet Inf Syst (TIIS) 9(2):811\u2013829","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"issue":"3","key":"1145_CR27","doi-asserted-by":"publisher","first-page":"2735","DOI":"10.1007\/s11277-017-3956-2","volume":"95","author":"S Jangirala","year":"2017","unstructured":"Jangirala S, Mukhopadhyay S, Das AK (2017) A multi-server environment with secure and efficient remote user authentication scheme based on dynamic id using smart cards. Wirel Pers Commun 95(3):2735\u20132767. \n                    https:\/\/doi.org\/10.1007\/s11277-017-3956-2","journal-title":"Wirel Pers Commun"},{"issue":"13","key":"1145_CR28","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1002\/dac.2829","volume":"28","author":"JL Tsai","year":"2015","unstructured":"Tsai JL, Lo NW (2015) A chaotic map-based anonymous multi-server authenticated key agreement protocol using smart card. Int J Commun Syst 28(13):1955\u20131963. \n                    https:\/\/doi.org\/10.1002\/dac.2829\n                    \n                  . IJCS-13-0727.R2","journal-title":"Int J Commun Syst"},{"issue":"4","key":"1145_CR29","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.1007\/s11227-016-1688-9","volume":"72","author":"A Irshad","year":"2016","unstructured":"Irshad A, Sher M, Chaudhary SA, Naqvi H, Farash MS (2016) An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging registration centre. J Supercomput 72(4):1623\u20131644. \n                    https:\/\/doi.org\/10.1007\/s11227-016-1688-9","journal-title":"J Supercomput"},{"key":"1145_CR30","doi-asserted-by":"crossref","unstructured":"Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: International conference on the theory and application of cryptology and information security. Springer, pp 552\u2013565","DOI":"10.1007\/3-540-45682-1_32"},{"key":"1145_CR31","doi-asserted-by":"crossref","unstructured":"Zhang F, Kim K (2002) ID-based blind signature and ring signature from pairings. In: International conference on the theory and application of cryptology and information security. Springer, pp 533\u2013547","DOI":"10.1007\/3-540-36178-2_33"},{"key":"1145_CR32","unstructured":"Lin CY, Wu TC (2004) An identity-based ring signature scheme from bilinear pairings. In: 18th international conference on advanced information networking and applications, 2004. AINA 2004, vol 2. IEEE, pp 182\u2013185"},{"key":"1145_CR33","unstructured":"Awasthi AK, Lal S (2005) ID-based ring signature and proxy ring signature schemes from bilinear pairings. arXiv:\n                    cs\/0504097"},{"key":"1145_CR34","doi-asserted-by":"crossref","unstructured":"Herranz J, S\u00e1ez G (2004) New identity-based ring signature schemes. In: ICICS, vol 4. Springer, pp 27\u201339","DOI":"10.1007\/978-3-540-30191-2_3"},{"key":"1145_CR35","doi-asserted-by":"crossref","unstructured":"Chow SSM, Hui LCK, Yiu SM (2005) Identity based threshold ring signature. In: Park CS, Chee S (eds) Information security and cryptology \u2013 ICISC 2004. Springer, Berlin, pp 218\u2013 232","DOI":"10.1007\/11496618_17"},{"key":"1145_CR36","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. In: Advances in cryptology \u2013 CRYPTO 2001. Springer, pp 213\u2013229","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"4","key":"1145_CR37","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297\u2013319. \n                    https:\/\/doi.org\/10.1007\/s00145-004-0314-9","journal-title":"J Cryptol"},{"key":"1145_CR38","doi-asserted-by":"publisher","unstructured":"Sui A, Chow SSM, Hui LCK, Yiu SM, Chow KP, Tsang WW, Chong CF, Pun KH, Chan HW (2005) Separable and anonymous identity-based key issuing. In: 11Th international conference on parallel and distributed systems (ICPADS\u201905), vol 2. pp 275\u2013279. \n                    https:\/\/doi.org\/10.1109\/ICPADS.2005.263","DOI":"10.1109\/ICPADS.2005.263"},{"key":"1145_CR39","doi-asserted-by":"publisher","unstructured":"Bellare M, Rogaway P (1993) Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM conference on computer and communications security, CCS \u201993. ACM, New York, pp 62\u201373. \n                    https:\/\/doi.org\/10.1145\/168588.168596","DOI":"10.1145\/168588.168596"},{"key":"1145_CR40","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-36288-6_2","volume-title":"An identity-based signature from gap Diffie-Hellman groups","author":"JC Choon","year":"2002","unstructured":"Choon JC, Hee Cheon J (2002) An identity-based signature from gap Diffie-Hellman groups. Springer, Berlin, pp 18\u201330. \n                    https:\/\/doi.org\/10.1007\/3-540-36288-6_2"},{"issue":"2","key":"1145_CR41","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1007\/s11277-015-2449-4","volume":"83","author":"JL Tsai","year":"2015","unstructured":"Tsai JL, Lo NW (2015) Provably secure and efficient anonymous id-based authentication protocol for mobile devices using bilinear pairings. Wirel Pers Commun 83(2):1273\u20131286. \n                    https:\/\/doi.org\/10.1007\/s11277-015-2449-4","journal-title":"Wirel Pers Commun"},{"key":"1145_CR42","doi-asserted-by":"publisher","unstructured":"Caro AD, Iovino V (2011) JPBC: java pairing based cryptography. In: 2011 IEEE symposium on computers and communications (ISCC), pp 850\u2013855. \n                    https:\/\/doi.org\/10.1109\/ISCC.2011.5983948","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"1145_CR43","unstructured":"Daemen J, Rijmen V (2013) The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media"},{"issue":"1","key":"1145_CR44","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.adhoc.2012.04.015","volume":"11","author":"KA Shim","year":"2013","unstructured":"Shim KA, Lee YR, Park CM (2013) EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Netw 11(1):182\u2013189","journal-title":"Ad Hoc Netw"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1145-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1145-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1145-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T19:19:35Z","timestamp":1570562375000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1145-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,9]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["1145"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1145-5","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,9]]},"assertion":[{"value":"9 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}