{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T07:12:36Z","timestamp":1757574756240},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09799-1","type":"journal-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T17:03:08Z","timestamp":1601658188000},"page":"5047-5066","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Proactive discovery protocol with security enhancement for D2D communication system"],"prefix":"10.1007","volume":"80","author":[{"given":"A.","family":"Hussein","sequence":"first","affiliation":[]},{"given":"S.","family":"El-Rabaie","sequence":"additional","affiliation":[]},{"given":"M. G.","family":"El-Mashed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"9799_CR1","doi-asserted-by":"crossref","unstructured":"Abdellatif S, Tibermacine O, Bechkit W, Bachir A (2020) Efficient distributed D2D ProSe-based service discovery and querying in disaster situations. Adv Inf Netw Appl Adv Intell Syst Comput 115:910\u2013921","DOI":"10.1007\/978-3-030-44041-1_79"},{"key":"9799_CR2","doi-asserted-by":"crossref","unstructured":"Adhikari S, Ray S, Biswas GP, Obaidat MS (2018) Efficient and secure business model for content centric network using elliptic curve cryptography. Int J Commun Syst 32(1) e3839","DOI":"10.1002\/dac.3839"},{"key":"9799_CR3","doi-asserted-by":"crossref","unstructured":"Ahishakiye F, Li FY (2014) Service discovery protocols in D2D-enabled cellular networks: Reactive versus proactive. 2014 IEEE Globecom Workshops (GC Wkshps)","DOI":"10.1109\/GLOCOMW.2014.7063536"},{"key":"9799_CR4","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1016\/j.compeleceng.2018.01.003","volume":"74","author":"M Al-Ayyoub","year":"2019","unstructured":"Al-Ayyoub M, Al-Andoli M, Jararweh Y, Smadi M, Gupta B (2019) Improving fuzzy C-mean-based community detection in social networks using dynamic parallelism. Comput Electr Eng 74:533\u2013546","journal-title":"Comput Electr Eng"},{"issue":"3","key":"9799_CR5","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1504\/IJHPCN.2018.094972","volume":"12","author":"M Almiani","year":"2018","unstructured":"Almiani M, Razaque A, Aidja T, Dmour AA (2018) Context-aware latency reduction protocol for secure encryption and decryption. Int J High Perform Comput Netw 12(3):251","journal-title":"Int J High Perform Comput Netw"},{"issue":"7","key":"9799_CR6","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.3390\/s17071517","volume":"17","author":"R Alvarez","year":"2017","unstructured":"Alvarez R, Caballero-Gil C, Santonja J, Zamora A (2017) Algorithms for Lightweight Key Exchange \u2020. Sensors 17(7):1517","journal-title":"Sensors"},{"issue":"3","key":"9799_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSCI.2019070101","volume":"11","author":"R Bharathi","year":"2019","unstructured":"Bharathi R, Rangasamy RS (2019) Software reliability assessment of safety critical system using computational intelligence. Int J Softw Sci Comput Intell 11(3):1\u201325","journal-title":"Int J Softw Sci Comput Intell"},{"key":"9799_CR8","doi-asserted-by":"publisher","first-page":"33759","DOI":"10.1109\/ACCESS.2019.2900727","volume":"7","author":"M Cao","year":"2019","unstructured":"Cao M, Wang L, Xu H, Chen D, Lou C, Zhang N, Zhu Y, Qin Z (2019) Sec-D2D: a secure and lightweight D2D communication system with multiple sensors. IEEE Access 7:33759\u201333770","journal-title":"IEEE Access"},{"issue":"4","key":"9799_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"key":"9799_CR10","doi-asserted-by":"publisher","first-page":"3183","DOI":"10.1007\/s11276-019-02131-2","volume":"26","author":"H Hussein","year":"2019","unstructured":"Hussein H, Elsayed H, El-Kader A, Sherine (2019) Intensive benchmarking of D2D communication over 5G cellular networks: prototype, integrated features, challenges, and main applications. Wirel Netw 26:3183\u20133202. https:\/\/doi.org\/10.1007\/s11276-019-02131-2","journal-title":"Wirel Netw"},{"key":"9799_CR11","unstructured":"Javed Y, Khan A, Qahar A (2018) EEoP: A Lightweight Security Scheme over PKI in D2D Cellular Networks 9:3\u201311"},{"issue":"2","key":"9799_CR12","first-page":"21","volume":"2","author":"A Khalique","year":"2010","unstructured":"Khalique A, Singh K, Sood S (2010) Implementation of elliptic curve digital signature algorithm. Int J Comput Appl 2(2):21\u201327","journal-title":"Int J Comput Appl"},{"key":"9799_CR13","doi-asserted-by":"publisher","unstructured":"Kim S (2019) A new multicasting device-to-device communication control scheme for virtualized cellular networks. Wirel Commun Mob Comput 2019. 1\u20139. https:\/\/doi.org\/10.1155\/2019\/3540674.","DOI":"10.1155\/2019\/3540674"},{"issue":"4","key":"9799_CR14","first-page":"343","volume":"99","author":"S Kota","year":"2018","unstructured":"Kota S, Padmanabhuni VNR, Budda K, Sruthi K (2018) Authentication and encryption using modified elliptic curve cryptography with particle swarm optimization and cuckoo search algorithm. J Inst Eng (India): Series B 99(4):343\u2013351","journal-title":"J Inst Eng (India): Series B"},{"key":"9799_CR15","doi-asserted-by":"crossref","unstructured":"Nasraoui L, Atallah LN (2017) SRS-based D2D neighbor discovery scheme for LTE cellular networks. 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","DOI":"10.1109\/PIMRC.2017.8292531"},{"issue":"2","key":"9799_CR16","first-page":"79","volume":"9","author":"OO Olakanmi","year":"2019","unstructured":"Olakanmi OO, Dada A (2019) An efficient privacy-preserving approach for secure verifiable outsourced computing on untrusted platforms. Int J Cloud Appl Comput 9(2):79\u201398","journal-title":"Int J Cloud Appl Comput"},{"issue":"2","key":"9799_CR17","first-page":"27","volume":"8","author":"B Qureshi","year":"2018","unstructured":"Qureshi B (2018) An affordable hybrid cloud based cluster for secure health informatics research. Int J Cloud Appl Comput 8(2):27\u201346","journal-title":"Int J Cloud Appl Comput"},{"issue":"1","key":"9799_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.3390\/cryptography1010009","volume":"1","author":"S Roy","year":"2017","unstructured":"Roy S, Khatwani C (2017) Cryptanalysis and improvement of ECC based authentication and key exchanging protocols. Cryptography 1(1):9","journal-title":"Cryptography"},{"key":"9799_CR19","doi-asserted-by":"crossref","unstructured":"Shen W, Hong W, Cao X, Yin B, Shila DM, Cheng Y (2014) Secure key establishment for device-to-device communications 2014 IEEE Global Communications Conference","DOI":"10.1109\/GLOCOM.2014.7036830"},{"key":"9799_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974","volume-title":"Information security: principles and practice","author":"M Stamp","year":"2011","unstructured":"Stamp M (2011) Information security: principles and practice. Wiley, Hoboken"},{"key":"9799_CR21","doi-asserted-by":"crossref","unstructured":"Sun Y, Cao J, Ma M, Li H, Niu B, Li F (2019) Privacy-preserving device discovery and authentication scheme for d2d communication in 3GPP 5G HetNet. 2019 International Conference on Computing, Networking and Communications (ICNC)","DOI":"10.1109\/ICCNC.2019.8685499"},{"issue":"2","key":"9799_CR22","first-page":"108","volume":"9","author":"S Tayeb","year":"2019","unstructured":"Tayeb S, Ruiz A, Latifi S (2019) Secure device discovery in big data communications networks: opportunities and challenges. Int Journal of e-Educ e-Bus e-Manag e-Learn 9(2):108\u2013115","journal-title":"Int Journal of e-Educ e-Bus e-Manag e-Learn"},{"issue":"5","key":"9799_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.5923\/j.algorithms.20120105.01","volume":"1","author":"TS Vassilev","year":"2013","unstructured":"Vassilev TS, Twizell A (2013) Cryptography: a comparison of public key systems. Algorithms Res 1(5):31\u201342","journal-title":"Algorithms Res"},{"key":"9799_CR24","doi-asserted-by":"crossref","unstructured":"Wang W, Teh KC, Li KH (2016) Enhanced physical layer security in D2D Spectrum sharing networks. IEEE Wirel Commun Lett 1\u20131 6(1):106\u2013109","DOI":"10.1109\/LWC.2016.2634559"},{"issue":"11","key":"9799_CR25","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/LSP.2016.2611614","volume":"23","author":"J Wang","year":"2016","unstructured":"Wang J, Tang Q, Yang C, Schober R, Li J (2016) Security enhancement via device-to-device communication in cellular networks. IEEE Signal Process Lett 23(11):1622\u20131626","journal-title":"IEEE Signal Process Lett"},{"issue":"6","key":"9799_CR26","doi-asserted-by":"publisher","first-page":"3918","DOI":"10.1109\/TWC.2018.2817607","volume":"17","author":"M Waqas","year":"2018","unstructured":"Waqas M, Ahmed M, Li Y, Jin D, Chen S (2018) Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays. IEEE Trans Wirel Commun 17(6):3918\u20133930","journal-title":"IEEE Trans Wirel Commun"},{"key":"9799_CR27","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.future.2017.08.052","volume":"82","author":"Z Yan","year":"2017","unstructured":"Yan Z, Xie H, Zhang P, Gupta BB (2017) Flexible data access control in D2D communications. Futur Gener Comput Syst 82:738\u2013751. https:\/\/doi.org\/10.1016\/j.future.2017.08.052","journal-title":"Futur Gener Comput Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09799-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09799-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09799-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T01:07:13Z","timestamp":1633136833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09799-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,2]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9799"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09799-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,2]]},"assertion":[{"value":"27 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}