{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:08:35Z","timestamp":1774541315205,"version":"3.50.1"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,23]],"date-time":"2022-11-23T00:00:00Z","timestamp":1669161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11042-022-14140-z","type":"journal-article","created":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T13:53:18Z","timestamp":1669297998000},"page":"22525-22576","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud"],"prefix":"10.1007","volume":"82","author":[{"given":"Anuj Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]},{"given":"Ankit","family":"Garg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,23]]},"reference":[{"key":"14140_CR1","volume-title":"Password-based authenticated key exchange in the three-party setting. In international workshop on public key cryptography (pp. 65-84)","author":"M Abdalla","year":"2005","unstructured":"Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In international workshop on public key cryptography (pp. 65-84). Springer, Berlin, Heidelberg"},{"key":"14140_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-022-12946-5","volume":"81","author":"L Agilandeeswari","year":"2022","unstructured":"Agilandeeswari L, Paliwal S, Chandrakar A, Prabukumar M (2022) A new lightweight conditional privacy preserving authentication and key\u2013agreement protocol in social internet of things for vehicle to smart grid networks. Multimed Tools Appl 81:1\u201328","journal-title":"Multimed Tools Appl"},{"key":"14140_CR3","doi-asserted-by":"crossref","unstructured":"Amin R, Islam SH, Biswas GP, Giri D, Khan MK, Kumar N\u00a0(2016) A more secure and privacy\u2010aware anonymous user authentication scheme for distributed mobile cloud computing environments. Future Gener Comput Syst 78:1005\u20131019","DOI":"10.1002\/sec.1655"},{"key":"14140_CR4","doi-asserted-by":"crossref","unstructured":"Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2018) A light weight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005\u20131019","DOI":"10.1016\/j.future.2016.12.028"},{"key":"14140_CR5","doi-asserted-by":"crossref","unstructured":"Azrour, M, Mabrouki, J, Chaganti, R (2021) New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT Security and Communication Networks, 2021","DOI":"10.1155\/2021\/5546334"},{"issue":"4","key":"14140_CR6","doi-asserted-by":"crossref","first-page":"1215","DOI":"10.3390\/s20041215","volume":"20","author":"S Banerjee","year":"2020","unstructured":"Banerjee S, Odelu V, Das AK, Chattopadhyay S, Park Y (2020) An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 20(4):1215","journal-title":"Sensors"},{"key":"14140_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D (1998) The decision Diffe-Hellman problem. In Proceedings of the Third Algorithmic Number Theory Symposium (pp. 48\u201363)","DOI":"10.1007\/BFb0054851"},{"issue":"1871","key":"14140_CR8","first-page":"233","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proceedings of the Royal Society of London. A Math Phys Sci 426(1871):233\u2013271","journal-title":"A Math Phys Sci"},{"key":"14140_CR9","doi-asserted-by":"crossref","first-page":"205034","DOI":"10.1109\/ACCESS.2020.3036916","volume":"8","author":"L Caruccio","year":"2020","unstructured":"Caruccio L, Desiato D, Polese G, Tortora G (2020) GDPR compliant information confidentiality preservation in big data processing. IEEE Access 8:205034\u2013205050","journal-title":"IEEE Access"},{"key":"14140_CR10","doi-asserted-by":"crossref","first-page":"3028","DOI":"10.1109\/ACCESS.2017.2676119","volume":"5","author":"S Challa","year":"2017","unstructured":"Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEE Access 5:3028\u20133043","journal-title":"IEE Access"},{"issue":"1","key":"14140_CR11","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1109\/TWC.2015.2473165","volume":"15","author":"CC Chang","year":"2015","unstructured":"Chang CC, Le HD (2015) A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans Wirel Commun 15(1):357\u2013366","journal-title":"IEEE Trans Wirel Commun"},{"issue":"10","key":"14140_CR12","doi-asserted-by":"crossref","first-page":"1366","DOI":"10.1002\/wcm.933","volume":"11","author":"YC Chen","year":"2011","unstructured":"Chen YC, Chuang SC, Yeh LY, Huang JL (2011) A practical authentication protocol with anonymity for wireless access networks. Wirel Commun Mob Comput 11(10):1366\u20131375","journal-title":"Wirel Commun Mob Comput"},{"issue":"2","key":"14140_CR13","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s41635-017-0029-7","volume":"2","author":"K Chen","year":"2018","unstructured":"Chen K, Zhang S, Li Z, Zhang Y, Deng Q, Ray S, Jin Y (2018) Internet-of-things security and vulnerabilities: taxonomy, challenges, and practice. J Hardware Syst Secur 2(2):97\u2013110","journal-title":"J Hardware Syst Secur"},{"key":"14140_CR14","doi-asserted-by":"crossref","unstructured":"Chen H, Xu C, Xu Z, Tu X (2019) An enhanced lightweight biometric-based three-factor anonymous authentication protocol for mobile cloud computing. In:\u00a02019 IEEE 21st international conference on high performance computing and communications; IEEE 17th international conference on Smart City; IEEE 5th international conference on data science and systems (HPCC\/SmartCity\/DSS). IEEE,\u00a0pp 1682\u20131691","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00230"},{"key":"14140_CR15","doi-asserted-by":"crossref","unstructured":"Chen, CM, Li, X, Liu, S, Wu, ME, Kumari, S (2022) Enhanced Authentication Protocol for the Internet of Things Environment Security and Communication Networks, 2022","DOI":"10.1155\/2022\/8543894"},{"issue":"2","key":"14140_CR16","first-page":"193","volume":"27","author":"AK Das","year":"2015","unstructured":"Das AK, Goswami A (2015) A robust anonymous biometric-based remote user authentication scheme using smart cards. J King Saud Univ-Comput Inf Sci 27(2):193\u2013210","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"14140_CR17","doi-asserted-by":"crossref","first-page":"101938","DOI":"10.1016\/j.cose.2020.101938","volume":"97","author":"AK Das","year":"2020","unstructured":"Das AK, Kalam S, Sahar N, Sinha D (2020) UCFL: user categorization using fuzzy logic towards PUF based two-phase authentication of fog assisted IoT devices. Comput Secur 97:101938","journal-title":"Comput Secur"},{"key":"14140_CR18","volume-title":"Attack prevention scheme for privacy preservation (apsp) using k anonymity in location based services for iot. In computational intelligence in pattern recognition (pp. 267\u2013277)","author":"AK Das","year":"2020","unstructured":"Das AK, Tabassum A, Sadaf S, Sinha D (2020) Attack prevention scheme for privacy preservation (apsp) using k anonymity in location based services for iot. In computational intelligence in pattern recognition (pp. 267\u2013277). Springer, Singapore"},{"key":"14140_CR19","first-page":"255","volume":"34","author":"PK Dhillon","year":"2017","unstructured":"Dhillon PK, Kalra S (2017) A lightweight biometrics based remote user authentication scheme for IoT services. J Inf Secur Appl 34:255\u2013270","journal-title":"J Inf Secur Appl"},{"issue":"4","key":"14140_CR20","first-page":"2919","volume":"17","author":"AT Fadi","year":"2020","unstructured":"Fadi AT, Deebak BD (2020) Seamless authentication: for IoT-big data technologies in smart industrial application systems. IEEE Trans Indust Inf 17(4):2919\u20132927","journal-title":"IEEE Trans Indust Inf"},{"key":"14140_CR21","doi-asserted-by":"crossref","first-page":"100158","DOI":"10.1016\/j.iot.2020.100158","volume":"9","author":"M Fakroon","year":"2020","unstructured":"Fakroon M, Alshahrani M, Gebali F, Traore I (2020) Secure remote anonymous user authentication scheme for smart home environment. Int Things 9:100158","journal-title":"Int Things"},{"issue":"4","key":"14140_CR22","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1109\/TSG.2011.2160661","volume":"2","author":"MM Fouda","year":"2011","unstructured":"Fouda MM, Fadlullah ZM, Kato N, Lu R, Shen XS (2011) A lightweight message authentication scheme for smart grid communications. IEEE Trans Smart Grid 2(4):675\u2013685","journal-title":"IEEE Trans Smart Grid"},{"issue":"16","key":"14140_CR23","doi-asserted-by":"crossref","DOI":"10.1002\/dac.4139","volume":"32","author":"A Ghani","year":"2019","unstructured":"Ghani A, Mansoor K, Mehmood S, Chaudhry SA, Rahman AU, Najmus Saqib M (2019) Security and key management in IoT-based wireless sensor networks: an authentication protocol using symmetric key. Int J Commun Syst 32(16):e4139","journal-title":"Int J Commun Syst"},{"key":"14140_CR24","unstructured":"Hussain, K, Jhanjhi, NZ, Mati-ur-Rahman, H, Hussain, J, Islam, MH (2019) Using a systematic framework to critically analyze proposed smart card based two factor authentication schemes. J King Saud Univ-Comput Inf Sci"},{"issue":"10","key":"14140_CR25","doi-asserted-by":"crossref","first-page":"10250","DOI":"10.1109\/JIOT.2020.2997651","volume":"7","author":"W Iqbal","year":"2020","unstructured":"Iqbal W, Abbas H, Daneshmand M, Rauf B, Bangash YA (2020) An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security. IEEE Internet Things J 7(10):10250\u201310276","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"14140_CR26","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.jksus.2017.01.003","volume":"29","author":"SH Islam","year":"2017","unstructured":"Islam SH, Amin R, Biswas GP, Farash MS, Li X, Kumari S (2017) An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J King Saud Univ-Comput Inf Sci 29(3):311\u2013324","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"14140_CR27","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"S Kalra","year":"2015","unstructured":"Kalra S, Sood SK (2015) Secure authentication scheme for IoT and cloud servers. Pervasive Mob Comput 24:210\u2013223","journal-title":"Pervasive Mob Comput"},{"issue":"9","key":"14140_CR28","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1007\/s00607-013-0308-2","volume":"96","author":"MK Khan","year":"2014","unstructured":"Khan MK, Kumari S, Gupta MK (2014) More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9):793\u2013816","journal-title":"Computing"},{"issue":"2","key":"14140_CR29","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz N, Menezes A, Vanstone S (2000) The state of elliptic curve cryptography. Des Codes Crypt 19(2):173\u2013193","journal-title":"Des Codes Crypt"},{"issue":"11","key":"14140_CR30","doi-asserted-by":"crossref","first-page":"13581","DOI":"10.1007\/s11042-016-3771-x","volume":"76","author":"S Kumari","year":"2017","unstructured":"Kumari S (2017) Design flaws of \u201can anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography\u201d. Multimed Tools Appl 76(11):13581\u201313583","journal-title":"Multimed Tools Appl"},{"key":"14140_CR31","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2016.04.016","volume":"63","author":"S Kumari","year":"2016","unstructured":"Kumari S, Li X, Wu F, Das AK, Arshad H, Khan MK (2016) A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Futur Gener Comput Syst 63:56\u201375","journal-title":"Futur Gener Comput Syst"},{"issue":"12","key":"14140_CR32","doi-asserted-by":"crossref","first-page":"6428","DOI":"10.1007\/s11227-017-2048-0","volume":"74","author":"S Kumari","year":"2018","unstructured":"Kumari S, Karuppiah M, Das AK, Li X, Wu F, Kumar N (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74(12):6428\u20136453","journal-title":"J Supercomput"},{"issue":"11","key":"14140_CR33","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770\u2013772","journal-title":"Commun ACM"},{"key":"14140_CR34","volume-title":"The elliptic curve discrete logarithm problem and equivalent hard problems for elliptic divisibility sequences. In international workshop on selected areas in cryptography (pp. 309\u2013327)","author":"KE Lauter","year":"2008","unstructured":"Lauter KE, Stange KE (2008) The elliptic curve discrete logarithm problem and equivalent hard problems for elliptic divisibility sequences. In international workshop on selected areas in cryptography (pp. 309\u2013327). Springer, Berlin, Heidelberg"},{"key":"14140_CR35","doi-asserted-by":"crossref","unstructured":"Li, L (2012) Study on security architecture in the internet of things. In proceedings of 2012 international conference on measurement, information and control (Vol. 1, pp. 374-377). IEEE","DOI":"10.1109\/MIC.2012.6273274"},{"issue":"2","key":"14140_CR36","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1109\/TIE.2009.2028351","volume":"57","author":"X Li","year":"2010","unstructured":"Li X, Qiu W, Zheng D, Chen K, Li J (2010) Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 57(2):793\u2013800","journal-title":"IEEE Trans Ind Electron"},{"issue":"2","key":"14140_CR37","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li X, Xiong Y, Ma J, Wang W (2012) An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J Netw Comput Appl 35(2):763\u2013769","journal-title":"J Netw Comput Appl"},{"issue":"2","key":"14140_CR38","doi-asserted-by":"crossref","first-page":"1801","DOI":"10.1007\/s11042-015-3166-4","volume":"76","author":"Y Lu","year":"2017","unstructured":"Lu Y, Li L, Peng H, Yang Y (2017) An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography. Multimed Tools Appl 76(2):1801\u20131815","journal-title":"Multimed Tools Appl"},{"key":"14140_CR39","doi-asserted-by":"crossref","unstructured":"Luo, H, Wang, F, Xu, G (2021) Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre Wirel Commun Mob Comput, 2021","DOI":"10.1155\/2021\/8848032"},{"issue":"17","key":"14140_CR40","doi-asserted-by":"crossref","first-page":"4615","DOI":"10.1002\/sec.1653","volume":"9","author":"T Maitra","year":"2016","unstructured":"Maitra T, Islam SH, Amin R, Giri D, Khan MK, Kumar N (2016) An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design. Secur Commun Netw 9(17):4615\u20134638","journal-title":"Secur Commun Netw"},{"key":"14140_CR41","unstructured":"Malik, MY (2010) Efficient implementation of elliptic curve cryptography using low-power digital signal processor. In 2010 the 12th international conference on advanced communication technology (ICACT) (Vol. 2, pp. 1464-1468). IEEE"},{"issue":"9","key":"14140_CR42","doi-asserted-by":"crossref","first-page":"2098","DOI":"10.3390\/s19092098","volume":"19","author":"R Mart\u00ednez-Pel\u00e1ez","year":"2019","unstructured":"Mart\u00ednez-Pel\u00e1ez R, Toral-Cruz H, Parra-Michel JR, Garc\u00eda V, Mena LJ, F\u00e9lix VG, Ochoa-Brust A (2019) An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances. Sensors 19(9):2098","journal-title":"Sensors"},{"issue":"18","key":"14140_CR43","doi-asserted-by":"crossref","first-page":"8129","DOI":"10.1016\/j.eswa.2014.07.004","volume":"41","author":"D Mishra","year":"2014","unstructured":"Mishra D, Das AK, Mukhopadhyay S (2014) A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst Appl 41(18):8129\u20138143","journal-title":"Expert Syst Appl"},{"key":"14140_CR44","doi-asserted-by":"crossref","unstructured":"Mo J, Hu Z, Chen H, Shen W (2019) An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing. Wirel Commun Mob Comput 2019:4520685","DOI":"10.1155\/2019\/4520685"},{"key":"14140_CR45","doi-asserted-by":"crossref","unstructured":"Ouafi K, Phan RCW (2008) Traceable privacy of recent provably-secure RFID protocols. In international conference on applied cryptography and network security. Springer, Berlin, Heidelberg,\u00a0pp 479\u2013489","DOI":"10.1007\/978-3-540-68914-0_29"},{"issue":"20","key":"14140_CR46","doi-asserted-by":"crossref","first-page":"5897","DOI":"10.3390\/s20205897","volume":"20","author":"S Pal","year":"2020","unstructured":"Pal S, Hitchens M, Rabehaja T, Mukhopadhyay S (2020) Security requirements for the internet of things: a systematic approach. Sensors 20(20):5897","journal-title":"Sensors"},{"issue":"2","key":"14140_CR47","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s40860-020-00098-y","volume":"6","author":"PK Panda","year":"2020","unstructured":"Panda PK, Chattopadhyay S (2020) A secure mutual authentication protocol for IoT environment. J Reliable Intell Environ 6(2):79\u201394","journal-title":"J Reliable Intell Environ"},{"issue":"12","key":"14140_CR48","doi-asserted-by":"crossref","first-page":"6401","DOI":"10.1007\/s11227-018-2652-7","volume":"74","author":"DS Park","year":"2018","unstructured":"Park DS (2018) Future computing with IoT and cloud computing. J Supercomput 74(12):6401\u20136407","journal-title":"J Supercomput"},{"key":"14140_CR49","doi-asserted-by":"crossref","first-page":"25110","DOI":"10.1109\/ACCESS.2017.2773535","volume":"5","author":"K Park","year":"2017","unstructured":"Park K, Park Y, Park Y, Reddy AG, Das AK (2017) Provably secure and efficient authentication protocol for roaming service in global mobility networks. IEEE Access 5:25110\u201325125","journal-title":"IEEE Access"},{"key":"14140_CR50","doi-asserted-by":"crossref","unstructured":"Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In:\u00a02014 IEEE wireless communications and networking conference (WCNC). IEEE,\u00a0pp 2728\u20132733","DOI":"10.1109\/WCNC.2014.6952860"},{"key":"14140_CR51","doi-asserted-by":"crossref","unstructured":"Ray, S, Biswas, GP (2011) Design of mobile-PKI for using mobile phones in various applications. In 2011 international conference on recent trends in information systems (pp. 297-302). IEEE","DOI":"10.1109\/ReTIS.2011.6146885"},{"issue":"3","key":"14140_CR52","doi-asserted-by":"crossref","first-page":"1331","DOI":"10.1007\/s11277-016-3393-7","volume":"90","author":"S Ray","year":"2016","unstructured":"Ray S, Biswas GP, Dasgupta M (2016) Secure multi-purpose mobile-banking using elliptic curve cryptography. Wirel Pers Commun 90(3):1331\u20131354","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"14140_CR53","doi-asserted-by":"crossref","first-page":"1114","DOI":"10.1007\/s11227-020-03318-7","volume":"77","author":"D Sadhukhan","year":"2021","unstructured":"Sadhukhan D, Ray S, Biswas GP, Khan MK, Dasgupta M (2021) A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J Supercomput 77(2):1114\u20131151","journal-title":"J Supercomput"},{"key":"14140_CR54","first-page":"95","volume":"42","author":"G Sharma","year":"2018","unstructured":"Sharma G, Kalra S (2018) A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications. J Inf Secur Appl 42:95\u2013106","journal-title":"J Inf Secur Appl"},{"key":"14140_CR55","doi-asserted-by":"crossref","unstructured":"Shparlinski I (2011) Computational Di_e-Hellman problem. In: Encyclopedia of cryptography and security. Springer, Berlin\/Heidelberg, pp 240\u2013244","DOI":"10.1007\/978-1-4419-5906-5_882"},{"key":"14140_CR56","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.cose.2019.06.002","volume":"86","author":"M Shuai","year":"2019","unstructured":"Shuai M, Yu N, Wang H, Xiong L (2019) Anonymous authentication scheme for smart home environment with provable security. Comput Secur 86:132\u2013146","journal-title":"Comput Secur"},{"issue":"1","key":"14140_CR57","first-page":"133","volume":"19","author":"AK Singh","year":"2019","unstructured":"Singh AK, Patro BDK (2019) Security of low computing power devices: a survey of requirements, challenges & possible solutions. Cybernet Inf Technol 19(1):133\u2013164","journal-title":"Cybernet Inf Technol"},{"key":"14140_CR58","doi-asserted-by":"crossref","unstructured":"Singh, AK, Patro, DB (2019) A novel security protocol for wireless sensor networks based on elliptic curve Signcryption. Int J Comput Netw Commun (IJCNC) Vol, 11","DOI":"10.5121\/ijcnc.2019.11506"},{"issue":"22","key":"14140_CR59","doi-asserted-by":"crossref","first-page":"8291","DOI":"10.3390\/app10228291","volume":"10","author":"AK Singh","year":"2020","unstructured":"Singh AK, Solanki A, Nayyar A, Qureshi B (2020) Elliptic curve signcryption-based mutual authentication protocol for smart cards. Appl Sci 10(22):8291","journal-title":"Appl Sci"},{"issue":"2","key":"14140_CR60","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.jnca.2010.11.011","volume":"34","author":"SK Sood","year":"2011","unstructured":"Sood SK, Sarje AK, Singh K (2011) A secure dynamic identity based authentication protocol for multi-server architecture. J Netw Comput Appl 34(2):609\u2013618","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"14140_CR61","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s12927-019-0003-8","volume":"11","author":"A Souri","year":"2019","unstructured":"Souri A, Norouzi M (2019) A state-of-the-art survey on formal verification of the internet of things applications. J Serv Sci Res 11(1):47\u201367","journal-title":"J Serv Sci Res"},{"key":"14140_CR62","first-page":"102761","volume":"58","author":"K Sowjanya","year":"2021","unstructured":"Sowjanya K, Dasgupta M, Ray S (2021) Elliptic curve cryptography based authentication scheme for internet of medical things. J Inf Secur Appl 58:102761","journal-title":"J Inf Secur Appl"},{"issue":"4","key":"14140_CR63","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10586-020-03069-3","volume":"23","author":"EK Subramanian","year":"2020","unstructured":"Subramanian EK, Tamilselvan L (2020) Elliptic curve Diffie\u2013Hellman cryptosystem in big data cloud security. Cluster Comput 23(4):1\u201311","journal-title":"Cluster Comput"},{"key":"14140_CR64","volume-title":"Secure anti-void energy-efficient routing (SAVEER) protocol for WSN-based IoT network. In advances in computational intelligence (pp. 129\u2013142)","author":"A Tabassum","year":"2020","unstructured":"Tabassum A, Sadaf S, Sinha D, Das AK (2020) Secure anti-void energy-efficient routing (SAVEER) protocol for WSN-based IoT network. In advances in computational intelligence (pp. 129\u2013142). Springer, Singapore"},{"key":"14140_CR65","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2021\/8871204","volume":"2021","author":"BH Taher","year":"2021","unstructured":"Taher BH, Liu H, Abedi F, Lu H, Yassin AA, Mohammed AJ (2021) A secure and lightweight three-factor remote user authentication protocol for future IoT applications. J Sens 2021:1\u201318","journal-title":"J Sens"},{"issue":"3","key":"14140_CR66","doi-asserted-by":"crossref","first-page":"1260","DOI":"10.3390\/app11031260","volume":"11","author":"A Thakare","year":"2021","unstructured":"Thakare A, Kim YG (2021) Secure and efficient authentication scheme in IoT environments. Appl Sci 11(3):1260","journal-title":"Appl Sci"},{"issue":"12","key":"14140_CR67","doi-asserted-by":"crossref","first-page":"1449","DOI":"10.1002\/dac.1118","volume":"23","author":"JL Tsai","year":"2010","unstructured":"Tsai JL, Wu TC, Tsai KY (2010) New dynamic ID authentication scheme using smart cards. Int J Commun Syst 23(12):1449\u20131462","journal-title":"Int J Commun Syst"},{"issue":"4","key":"14140_CR68","first-page":"708","volume":"15","author":"D Wang","year":"2016","unstructured":"Wang D, Wang P (2016) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Depend Secure Comput 15(4):708\u2013722","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"4","key":"14140_CR69","first-page":"708","volume":"15","author":"D Wang","year":"2018","unstructured":"Wang D, Wang P (2018) Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans Depend Secur Comput 15(4):708\u2013722","journal-title":"IEEE Trans Depend Secur Comput"},{"issue":"11","key":"14140_CR70","doi-asserted-by":"crossref","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","volume":"12","author":"D Wang","year":"2017","unstructured":"Wang D, Cheng H, Wang P, Huang X, Jian G (2017) Zipf\u2019s law in passwords. IEEE Trans Inf Forensic Secur 12(11):2776\u20132791","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"14140_CR71","doi-asserted-by":"publisher","unstructured":"Wang C, Ding K, Li B, Zhao Y, Xu G, Guo Y, Wang P (2018) An enhanced user authentication protocol based on elliptic curve cryptosystem in cloud computing environment.\u00a0Wirel Commun Mob Comput. https:\/\/doi.org\/10.1155\/2018\/3048697","DOI":"10.1155\/2018\/3048697"},{"key":"14140_CR72","doi-asserted-by":"crossref","first-page":"101619","DOI":"10.1016\/j.cose.2019.101619","volume":"88","author":"D Wang","year":"2020","unstructured":"Wang D, Zhang X, Zhang Z, Wang P (2020) Understanding security failures of multi-factor authentication schemes for multi-server environments. Comput Secur 88:101619","journal-title":"Comput Secur"},{"key":"14140_CR73","doi-asserted-by":"crossref","unstructured":"Wang, F, Xu, G, Xu, G, Wang, Y, Peng, J (2020) A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure Wirel Commun Mob Comput, 2020","DOI":"10.1155\/2020\/3805058"},{"issue":"1","key":"14140_CR74","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1109\/JIOT.2017.2780232","volume":"5","author":"M Wazid","year":"2017","unstructured":"Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2017) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J 5(1):269\u2013282","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"14140_CR75","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1002\/sec.315","volume":"5","author":"S Wu","year":"2012","unstructured":"Wu S, Zhu Y, Pu Q (2012) Robust smart-cards-based user authentication scheme with user anonymity. Secur Commun Netw 5(2):236\u2013248","journal-title":"Secur Commun Netw"},{"issue":"19","key":"14140_CR76","doi-asserted-by":"crossref","first-page":"5604","DOI":"10.3390\/s20195604","volume":"20","author":"HL Wu","year":"2020","unstructured":"Wu HL, Chang CC, Zheng YZ, Chen LS, Chen CC (2020) A secure IoT-based authentication system in cloud computing environment. Sensors 20(19):5604","journal-title":"Sensors"},{"issue":"2","key":"14140_CR77","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1007\/s11277-013-1309-3","volume":"74","author":"Q Xie","year":"2014","unstructured":"Xie Q, Hu B, Tan X, Bao M, Yu X (2014) Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wirel Pers Commun 74(2):601\u2013614","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"14140_CR78","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1016\/j.jnca.2012.05.010","volume":"36","author":"K Xue","year":"2013","unstructured":"Xue K, Ma C, Hong P, Ding R (2013) A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J Netw Comput Appl 36(1):316\u2013323","journal-title":"J Netw Comput Appl"},{"key":"14140_CR79","doi-asserted-by":"crossref","unstructured":"Yang, D, Yang, B (2010) A biometric password-based multi-server authentication scheme with smart card. In 2010 international conference on computer design and applications (Vol. 5, pp. V5-554). IEEE","DOI":"10.1109\/ISDPE.2010.11"},{"issue":"16","key":"14140_CR80","doi-asserted-by":"crossref","first-page":"3598","DOI":"10.3390\/s19163598","volume":"19","author":"S Yu","year":"2019","unstructured":"Yu S, Park K, Park Y (2019) A secure lightweight three-factor authentication scheme for IoT in cloud computing environment. Sensors 19(16):3598","journal-title":"Sensors"},{"key":"14140_CR81","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.future.2018.08.038","volume":"91","author":"L Zhou","year":"2019","unstructured":"Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Future Gener Comput Syst 91:244\u2013251","journal-title":"Future Gener Comput Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14140-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14140-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14140-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T13:22:39Z","timestamp":1728480159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14140-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,23]]},"references-count":81,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["14140"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14140-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,23]]},"assertion":[{"value":"28 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors declare that there is no conflicts of interests of any sort associated with this manusctipt.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}