{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T07:11:53Z","timestamp":1769843513616,"version":"3.49.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2018,1,10]],"date-time":"2018-01-10T00:00:00Z","timestamp":1515542400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572379"],"award-info":[{"award-number":["61572379"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant 61501333"],"award-info":[{"award-number":["Grant 61501333"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11042-017-5560-6","type":"journal-article","created":{"date-parts":[[2018,1,9]],"date-time":"2018-01-09T21:43:54Z","timestamp":1515534234000},"page":"18355-18382","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Signature-based three-factor authenticated key exchange for internet of things applications"],"prefix":"10.1007","volume":"77","author":[{"given":"Xiaoying","family":"Jia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2446-7436","authenticated-orcid":false,"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,10]]},"reference":[{"key":"5560_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: International conference on theory and practice in public key cryptography, pp 65\u201384","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"5560_CR2","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.comnet.2016.01.006","volume":"101","author":"R Amin","year":"2016","unstructured":"Amin R, Islam SH, Biswas GP, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101: 42\u201362","journal-title":"Comput Netw"},{"issue":"15","key":"5560_CR3","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"key":"5560_CR4","first-page":"139","volume":"1807","author":"M Bellare","year":"2000","unstructured":"Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. Tecnologia Electronica E Informatica 1807:139\u2013155","journal-title":"Tecnologia Electronica E Informatica"},{"key":"5560_CR5","doi-asserted-by":"crossref","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","volume":"5","author":"S Challa","year":"2017","unstructured":"Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future iot applications. IEEE Access 5:3028\u20133043","journal-title":"IEEE Access"},{"key":"5560_CR6","doi-asserted-by":"crossref","unstructured":"Chen CL, Lee CC, Hsu CY (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Wiley","DOI":"10.1002\/dac.1277"},{"issue":"1","key":"5560_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s12083-014-0307-x","volume":"9","author":"AK Das","year":"2016","unstructured":"Das AK (2016) A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications 9(1):1\u201322","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"99","key":"5560_CR8","first-page":"1","volume":"PP","author":"W Ding","year":"2016","unstructured":"Ding W, Ping W (2016) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput PP (99):1\u20131","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"5560_CR9","first-page":"1","volume":"1","author":"N Doshi","year":"2017","unstructured":"Doshi N, Kumari S, Mishra D, Li X, Choo KKR, Sangaiah AK (2017) A password based authentication scheme for wireless multimedia systems. Multimedia Tools & Applications 1:1\u201326","journal-title":"Multimedia Tools & Applications"},{"key":"5560_CR10","doi-asserted-by":"crossref","unstructured":"Gennaro R (2008) Faster and shorter password-authenticated key exchange. In: Conference on theory of cryptography, pp 589\u2013606","DOI":"10.1007\/978-3-540-78524-8_32"},{"key":"5560_CR11","doi-asserted-by":"crossref","unstructured":"Groce A, Katz J (2010) A new framework for efficient password-based authenticated key exchange. In: ACM conference on computer and communications security, pp 516\u2013525","DOI":"10.1145\/1866307.1866365"},{"issue":"7","key":"5560_CR12","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (iot): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645\u20131660","journal-title":"Futur Gener Comput Syst"},{"issue":"10","key":"5560_CR13","doi-asserted-by":"crossref","first-page":"3826","DOI":"10.1007\/s11227-015-1610-x","volume":"72","author":"Q Jiang","year":"2016","unstructured":"Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput 72(10):3826\u20133849","journal-title":"J Supercomput"},{"issue":"9","key":"5560_CR14","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1007\/s00607-013-0308-2","volume":"96","author":"MK Khan","year":"2014","unstructured":"Khan MK, Kumari S, Gupta MK (2014) More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9):793\u2013816","journal-title":"Computing"},{"key":"5560_CR15","unstructured":"Kumari S, Das AK, Wazid M, Li X, Wu F, Choo KR, Khan MK (2016) On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurrency & Computation Practice & Experience 29(23):1\u201318"},{"issue":"4","key":"5560_CR16","first-page":"2485","volume":"79","author":"CC Lee","year":"2014","unstructured":"Lee CC, Li CT, Chiu ST, Lai YM (2014) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 79(4):2485\u20132495","journal-title":"Nonlinear Dyn"},{"key":"5560_CR17","doi-asserted-by":"publisher","unstructured":"Li CT, Lee CC, Weng CY, Chen CM (2017) Towards secure authenticating of cache in the reader for rfid-based iot systems. Peer-to-Peer Networking and Applications 1\u201311. https:\/\/doi.org\/10.1007\/s12083-017-0564-6","DOI":"10.1007\/s12083-017-0564-6"},{"issue":"11","key":"5560_CR18","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/s10916-015-0322-3","volume":"39","author":"CT Li","year":"2015","unstructured":"Li CT, Weng CY, Lee CC, Wang CC (2015) A hash based remote user authentication and authenticated key agreement scheme for the integrated epr information system. J Med Syst 39(11):144","journal-title":"J Med Syst"},{"issue":"4","key":"5560_CR19","doi-asserted-by":"crossref","first-page":"e0116709","DOI":"10.1371\/journal.pone.0116709","volume":"10","author":"J Nam","year":"2015","unstructured":"Nam J, Choo K-KR, Han S, Kim M, Paik J, Won D (2015) Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. PLoS ONE 10(4):e0116709","journal-title":"PLoS ONE"},{"issue":"3","key":"5560_CR20","first-page":"1","volume":"38","author":"Z Tan","year":"2014","unstructured":"Tan Z (2014) A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J Med Syst 38(3):1\u20139","journal-title":"J Med Syst"},{"issue":"2","key":"5560_CR21","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovic","year":"2014","unstructured":"Turkanovic M, Brumen B, Holbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20(2):96\u2013112","journal-title":"Ad Hoc Netw"},{"issue":"C","key":"5560_CR22","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.compeleceng.2015.02.015","volume":"45","author":"F Wu","year":"2015","unstructured":"Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput Electr Eng 45(C):274\u2013285","journal-title":"Comput Electr Eng"},{"key":"5560_CR23","unstructured":"Yang Y, Cai H, Wei Z, Lu H, Choo K-KR (2015) Towards lightweight anonymous entity authentication for iot applications. In: 21st australasian conference on information security and privacy, pp 265\u2013 280"},{"key":"5560_CR24","doi-asserted-by":"crossref","unstructured":"Zhang M (2007) Computationally-efficient password authenticated key exchange based on quadratic residues. In: Progress in cryptology - indocrypt 2007, Proceedings of the international conference on cryptology in India, Chennai, India, December 9\u201313, 2007, pp 312\u2013321","DOI":"10.1007\/978-3-540-77026-8_23"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5560-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5560-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5560-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T01:31:58Z","timestamp":1570584718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5560-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,10]]},"references-count":24,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["5560"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5560-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,10]]}}}