{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T00:07:39Z","timestamp":1718323659325},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,1,13]],"date-time":"2016-01-13T00:00:00Z","timestamp":1452643200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Science Foundation of shandong Province","award":["ZR2013FM009"],"award-info":[{"award-number":["ZR2013FM009"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s11042-015-3220-2","type":"journal-article","created":{"date-parts":[[2016,1,13]],"date-time":"2016-01-13T11:03:06Z","timestamp":1452682986000},"page":"2315-2329","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An anonymous and secure authentication and key agreement scheme for session initiation protocol"],"prefix":"10.1007","volume":"76","author":[{"given":"Hao","family":"Lin","sequence":"first","affiliation":[]},{"given":"Fengtong","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Chunxia","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,13]]},"reference":[{"issue":"2","key":"3220_CR1","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s11042-011-0787-0","volume":"66","author":"R Arshad","year":"2013","unstructured":"Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165\u2013178","journal-title":"Multimed Tools Appl"},{"key":"3220_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2282-x","author":"H Arshad","year":"2014","unstructured":"Arshad H, Nikooghadam M (2014) An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimed Tools Appl. doi: 10.1007\/s11042-014-2282-x","journal-title":"Multimed Tools Appl"},{"key":"3220_CR3","doi-asserted-by":"crossref","unstructured":"Franks J, Hallam-Baker PM, Hostetler JL, Lawrence SD, Leach PJ, Luotonen A, Stewart LC (1999) HTTP authentication: basic and digest access authentication. IETF RFC 2617","DOI":"10.17487\/rfc2617"},{"key":"3220_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0194-6","author":"DL Guo","year":"2015","unstructured":"Guo DL, Wen QY, Li WM, Zhang H, Jin ZP (2015) An improved biometrics-based authentication scheme for Telecare medical information systems. J Med Syst. doi: 10.1007\/s10916-015-0194-6","journal-title":"J Med Syst"},{"key":"3220_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1807-z","author":"A Irshad","year":"2013","unstructured":"Irshad A, Sher M, Rehman E, Ashraf ChS, Hassan MU, Ghani A (2013) A single round-trip SIP authentication scheme for voice over internet protocol using smart card. Multimed Tools Appl. doi: 10.1007\/s11042-013-1807-z","journal-title":"Multimed Tools Appl"},{"issue":"16","key":"3220_CR6","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume":"1666","author":"P Kocher","year":"1999","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. Advances in Cryptology-CRYPTO\u201999 1666(16):388\u2013397","journal-title":"Advances in Cryptology-CRYPTO\u201999"},{"issue":"2","key":"3220_CR7","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.istr.2009.06.006","volume":"14","author":"XF Leng","year":"2009","unstructured":"Leng XF (2009) Smart card applications and security. Inf Secur Tech Rep 14 (2):36\u201345","journal-title":"Inf Secur Tech Rep"},{"issue":"2","key":"3220_CR8","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li X, Ma J, Wang WD, Xiong YP (2012) An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J Netw Comput Appl 35(2):763\u2013769","journal-title":"J Netw Comput Appl"},{"issue":"5","key":"3220_CR9","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"key":"3220_CR10","doi-asserted-by":"crossref","unstructured":"Rosenberg J, Schulzrinne H, Camarillo G, Johnston A, Peterson J, Sparks R (2002) SIP: session initiation protocol. IETF RFC 3261","DOI":"10.17487\/rfc3261"},{"issue":"5","key":"3220_CR11","first-page":"1","volume":"38","author":"FT Wen","year":"2014","unstructured":"Wen FT (2014) A more secure anonymous user authentication scheme for the integrated EPR information system. J Med Syst 38(5):1\u20137","journal-title":"J Med Syst"},{"issue":"6","key":"3220_CR12","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1002\/sec.816","volume":"7","author":"FT Wen","year":"2014","unstructured":"Wen FT, Susilo W, Yang GM (2014) A robust smart card based anonymous user authentication protocol for wireless communications. Secur Commun Netw 7(6):987\u2013993","journal-title":"Secur Commun Netw"},{"issue":"10","key":"3220_CR13","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"A Wood","year":"2002","unstructured":"Wood A, Stankovic JA (2002) Denial of service in sensor networks. Computer 35(10):54\u201362","journal-title":"Computer"},{"issue":"1","key":"3220_CR14","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","volume":"80","author":"KP Xue","year":"2014","unstructured":"Xue KP, Hong PL, Ma CS (2014) A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J Comput Syst Sci 80(1):195\u2013206","journal-title":"J Comput Syst Sci"},{"issue":"2","key":"3220_CR15","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/j.csi.2013.08.010","volume":"36","author":"HL Yeh","year":"2014","unstructured":"Yeh HL, Chen TH, Shih WK (2014) Robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Comput Stand Inter 36(2):397\u2013402","journal-title":"Comput Stand Inter"},{"issue":"5","key":"3220_CR16","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1109\/TCSVT.2006.888822","volume":"17","author":"Z Zhang","year":"2007","unstructured":"Zhang Z, Sun Q, Wong WC, Apostolopoulos J, Wee S (2007) Rate-distortion-authentication optimized streaming of authenticated video. IEEE Trans Circuits Syst Video Technol 17(5):544\u2013557","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"11","key":"3220_CR17","doi-asserted-by":"crossref","first-page":"2691","DOI":"10.1002\/dac.2499","volume":"27","author":"L Zhang","year":"2013","unstructured":"Zhang L, Tang S, Cai Z (2013) Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. Int ournal Commun Syst 27(11):2691\u20132702","journal-title":"Int ournal Commun Syst"},{"issue":"7","key":"3220_CR18","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1109\/JSAC.2011.110803","volume":"29","author":"L Zhou","year":"2011","unstructured":"Zhou L, Chao HC, Vasilakos AV (2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Areas Commun 29(7):1358\u20131367","journal-title":"IEEE J Sel Areas Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-3220-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3220-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3220-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-3220-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T19:43:01Z","timestamp":1718307781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-3220-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,13]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["3220"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-3220-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,13]]}}}