{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T05:52:33Z","timestamp":1745387553899,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"36","license":[{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18625-x","type":"journal-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T06:02:11Z","timestamp":1711346531000},"page":"83805-83835","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An efficient hybrid multifactor mutual authentication and session key agreement scheme for patient monitoring system using IoMT"],"prefix":"10.1007","volume":"83","author":[{"given":"Shanvendra","family":"Rai","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rituparna","family":"Paul","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-1913","authenticated-orcid":false,"given":"Subhasish","family":"Banerjee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Preetisudha","family":"Meher","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,3,25]]},"reference":[{"issue":"21","key":"18625_CR1","doi-asserted-by":"crossref","first-page":"15683","DOI":"10.1109\/JIOT.2020.3033129","volume":"8","author":"H Lin","year":"2020","unstructured":"Lin H, Garg S, Hu J, Wang X, Piran MJ, Hossain MS (2020) Privacy-enhanced data fusion for COVID-19 applications in intelligent Internet of medical things. IEEE Internet Things J 8(21):15683\u201315693","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"18625_CR2","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/JSYST.2015.2470644","volume":"11","author":"MS Hossain","year":"2015","unstructured":"Hossain MS (2015) Cloud-supported cyber\u2013physical localization framework for patients monitoring. IEEE Syst J 11(1):118\u2013127","journal-title":"IEEE Syst J"},{"key":"18625_CR3","doi-asserted-by":"crossref","first-page":"69722","DOI":"10.1109\/ACCESS.2020.2986480","volume":"8","author":"GS Gaba","year":"2020","unstructured":"Gaba GS, Kumar G, Monga H, Kim TH, Kumar P (2020) Robust and lightweight mutual authentication scheme in distributed smart environments. IEEE Access 8:69722\u201369733","journal-title":"IEEE Access"},{"key":"18625_CR4","doi-asserted-by":"crossref","first-page":"183339","DOI":"10.1109\/ACCESS.2019.2960617","volume":"7","author":"Y Sun","year":"2019","unstructured":"Sun Y, Lo FPW, Lo B (2019) Security and privacy for the internet of medical things enabled healthcare systems: a survey. IEEE Access 7:183339\u2013183355","journal-title":"IEEE Access"},{"issue":"2","key":"18625_CR5","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/MNET.011.2000439","volume":"35","author":"R Gupta","year":"2020","unstructured":"Gupta R, Kumari A, Tanwar S, Kumar N (2020) Blockchain-envisioned softwarized multi-swarming UAVs to tackle COVID-I9 situations. IEEE Network 35(2):160\u2013167","journal-title":"IEEE Network"},{"key":"18625_CR6","doi-asserted-by":"publisher","unstructured":"Tanwar S, Tyagi S, Kumar N (Eds.) (2019) Security and privacy of electronic healthcare records: Concepts, paradigms and solutions. Inst Eng Technol.\u00a0https:\/\/doi.org\/10.1049\/PBHE020E","DOI":"10.1049\/PBHE020E"},{"key":"18625_CR7","volume-title":"Security in wireless sensor networks","author":"Y Wang","year":"2008","unstructured":"Wang Y, Attebury G, Ramamurthy B (2008) Security in wireless sensor networks. Auerbach Publications, CRC Press"},{"key":"18625_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0182-2","volume":"39","author":"A Ali","year":"2015","unstructured":"Ali A, Khan FA (2015) Key agreement schemes in wireless body area networks: taxonomy and state-of-the-art. J Med Syst 39:1\u201314","journal-title":"J Med Syst"},{"key":"18625_CR9","doi-asserted-by":"crossref","first-page":"205034","DOI":"10.1109\/ACCESS.2020.3036916","volume":"8","author":"L Caruccio","year":"2020","unstructured":"Caruccio L, Desiato D, Polese G, Tortora G (2020) GDPR compliant information confidentiality preservation in big data processing. IEEE Access 8:205034\u2013205050","journal-title":"IEEE Access"},{"key":"18625_CR10","unstructured":"Desiato D, Tortora G (2018) A methodology for GDPR compliant data processing. In ceur workshop proceedings (Vol. 2161, pp. 1\u20134). CEUR-WS.\u00a0https:\/\/www.iris.unisa.it\/handle\/11386\/4834471"},{"issue":"18","key":"18625_CR11","doi-asserted-by":"crossref","first-page":"5166","DOI":"10.3390\/s20185166","volume":"20","author":"K Choudhary","year":"2020","unstructured":"Choudhary K, Gaba GS, Butun I, Kumar P (2020) Make-it\u2014A lightweight mutual authentication and key exchange protocol for industrial internet of things. Sensors 20(18):5166","journal-title":"Sensors"},{"key":"18625_CR12","doi-asserted-by":"crossref","first-page":"132808","DOI":"10.1109\/ACCESS.2020.3010302","volume":"8","author":"GS Gaba","year":"2020","unstructured":"Gaba GS, Kumar G, Monga H, Kim TH, Liyanage M, Kumar P (2020) Robust and lightweight key exchange (LKE) protocol for industry 4.0. IEEE Access 8:132808\u2013132824","journal-title":"IEEE Access"},{"issue":"11","key":"18625_CR13","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.1109\/TIFS.2018.2832849","volume":"13","author":"P Gope","year":"2018","unstructured":"Gope P, Lee J, Quek TQ (2018) Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans Inf Forensics Secur 13(11):2831\u20132843","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"18625_CR14","doi-asserted-by":"crossref","first-page":"e7602","DOI":"10.1002\/cpe.7602","volume":"35","author":"C Chunka","year":"2023","unstructured":"Chunka C, Banerjee S, Sachin Kumar G (2023) A secure communication using multifactor authentication and key agreement techniques in internet of medical things for COVID-19 patients. Concurr Comput: Pract Experience 35(7):e7602","journal-title":"Concurr Comput: Pract Experience"},{"issue":"15","key":"18625_CR15","doi-asserted-by":"crossref","first-page":"7487","DOI":"10.3390\/app12157487","volume":"12","author":"N Alsaeed","year":"2022","unstructured":"Alsaeed N, Nadeem F (2022) Authentication in the internet of medical things: taxonomy, review, and open issues. Appl Sci 12(15):7487","journal-title":"Appl Sci"},{"key":"18625_CR16","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovi\u0107","year":"2014","unstructured":"Turkanovi\u0107 M, Brumen B, H\u00f6lbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw 20:96\u2013112","journal-title":"Ad Hoc Netw"},{"key":"18625_CR17","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","volume":"36","author":"MS Farash","year":"2016","unstructured":"Farash MS, Turkanovi\u0107 M, Kumari S, H\u00f6lbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw 36:152\u2013176","journal-title":"Ad Hoc Netw"},{"key":"18625_CR18","doi-asserted-by":"crossref","first-page":"105101","DOI":"10.1109\/ACCESS.2021.3099299","volume":"9","author":"W Yuanbing","year":"2021","unstructured":"Yuanbing W, Wanrong L, Bin L (2021) an improved authentication protocol for smart healthcare system using wireless medical sensor network. IEEE Access 9:105101\u2013105117","journal-title":"IEEE Access"},{"key":"18625_CR19","doi-asserted-by":"crossref","first-page":"105054","DOI":"10.1016\/j.cmpb.2019.105054","volume":"182","author":"P Soni","year":"2019","unstructured":"Soni P, Pal AK, Islam SH (2019) An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput Methods Programs Biomed 182:105054","journal-title":"Comput Methods Programs Biomed"},{"key":"18625_CR20","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","volume":"96","author":"SF Aghili","year":"2019","unstructured":"Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Futur Gener Comput Syst 96:410\u2013424","journal-title":"Futur Gener Comput Syst"},{"issue":"8","key":"18625_CR21","doi-asserted-by":"crossref","first-page":"3753","DOI":"10.1007\/s11276-022-03070-1","volume":"28","author":"X Shao","year":"2022","unstructured":"Shao X, Guo Y, Guo Y (2022) A PUF-based anonymous authentication protocol for wireless medical sensor networks. Wireless Netw 28(8):3753\u20133770","journal-title":"Wireless Netw"},{"key":"18625_CR22","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.future.2018.09.017","volume":"91","author":"M Wazid","year":"2019","unstructured":"Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475\u2013492","journal-title":"Futur Gener Comput Syst"},{"key":"18625_CR23","doi-asserted-by":"crossref","first-page":"4737","DOI":"10.1007\/s11276-018-1759-3","volume":"25","author":"X Jia","year":"2019","unstructured":"Jia X, He D, Kumar N, Choo KKR (2019) Authenticated key agreement scheme for fog-driven IoT healthcare system. Wireless Netw 25:4737\u20134750","journal-title":"Wireless Netw"},{"key":"18625_CR24","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1007\/s10922-019-09496-x","volume":"27","author":"S Naoui","year":"2019","unstructured":"Naoui S, Elhdhili ME, Saidane LA (2019) Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J Netw Syst Manage 27:1020\u20131042","journal-title":"J Netw Syst Manage"},{"key":"18625_CR25","doi-asserted-by":"publisher","unstructured":"Aysu A, Gulcan E, Moriyama D, Schaumont P, Yung M (2015) End-to-end design of a PUF-based privacy preserving authentication protocol. In\u00a0Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International Workshop, Saint-Malo, France, September 13\u201316, 2015, Proceedings 17\u00a0(pp. 556\u2013576). Springer Berlin Heidelberg.\u00a0https:\/\/doi.org\/10.1007\/978-3-662-48324-4_28","DOI":"10.1007\/978-3-662-48324-4_28"},{"key":"18625_CR26","doi-asserted-by":"crossref","unstructured":"Van Herrewege A, Katzenbeisser S, Maes R, Peeters R, Sadeghi AR, Verbauwhede I, Wachsmann C (2012) Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs. In\u00a0Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers 16\u00a0(pp. 374-389). Springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-32946-3_27"},{"key":"18625_CR27","unstructured":"Moriyama D, Matsuo SI, Yung M (2013) PUF-based RFID authentication secure and private under memory leakage.\u00a0Cryptology ePrint Archive.\u00a0https:\/\/eprint.iacr.org\/2013\/712"},{"issue":"3","key":"18625_CR28","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1109\/TDSC.2018.2832201","volume":"16","author":"U Chatterjee","year":"2018","unstructured":"Chatterjee U, Govindan V, Sadhukhan R, Mukhopadhyay D, Chakraborty RS, Mahata D, Prabhu MM (2018) Building PUF based authentication and key exchange protocol for IoT without explicit CRPs in verifier database. IEEE Trans Dependable Secure Comput 16(3):424\u2013437","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"18625_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3005715","volume":"16","author":"U Chatterjee","year":"2017","unstructured":"Chatterjee U, Chakraborty RS, Mukhopadhyay D (2017) A PUF-based secure communication protocol for IoT. ACM Trans Embed Comput Syst (TECS) 16(3):1\u201325","journal-title":"ACM Trans Embed Comput Syst (TECS)"},{"issue":"1","key":"18625_CR30","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","volume":"6","author":"P Gope","year":"2018","unstructured":"Gope P, Sikdar B (2018) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580\u2013589","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"18625_CR31","doi-asserted-by":"crossref","first-page":"3335","DOI":"10.1109\/JIOT.2018.2882610","volume":"6","author":"MN Aman","year":"2018","unstructured":"Aman MN, Basheer MH, Sikdar B (2018) Two-factor authentication for IoT with location information. IEEE Internet Things J 6(2):3335\u20133351","journal-title":"IEEE Internet Things J"},{"key":"18625_CR32","doi-asserted-by":"crossref","first-page":"85627","DOI":"10.1109\/ACCESS.2019.2926578","volume":"7","author":"S Banerjee","year":"2019","unstructured":"Banerjee S, Odelu V, Das AK, Chattopadhyay S, Rodrigues JJ, Park Y (2019) Physically secure lightweight anonymous user authentication protocol for internet of things using physically unclonable functions. IEEE Access 7:85627\u201385644","journal-title":"IEEE Access"},{"issue":"2","key":"18625_CR33","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1109\/JIOT.2020.3010893","volume":"8","author":"MN Aman","year":"2020","unstructured":"Aman MN, Javaid U, Sikdar B (2020) A privacy-preserving and scalable authentication protocol for the internet of vehicles. IEEE Internet Things J 8(2):1123\u20131139","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"18625_CR34","doi-asserted-by":"crossref","first-page":"3801","DOI":"10.1109\/JIOT.2020.3024703","volume":"8","author":"R Vinoth","year":"2020","unstructured":"Vinoth R, Deborah LJ, Vijayakumar P, Kumar N (2020) Secure multifactor authenticated key agreement scheme for industrial IoT. IEEE Internet Things J 8(5):3801\u20133811","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"18625_CR35","doi-asserted-by":"crossref","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2017","unstructured":"Li X, Niu J, Bhuiyan MZA, Wu F, Karuppiah M, Kumari S (2017) A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans Industr Inf 14(8):3599\u20133609","journal-title":"IEEE Trans Industr Inf"},{"key":"18625_CR36","doi-asserted-by":"crossref","first-page":"136073","DOI":"10.1109\/ACCESS.2019.2941701","volume":"7","author":"S Paliwal","year":"2019","unstructured":"Paliwal S (2019) Hash-based conditional privacy preserving authentication and key exchange protocol suitable for industrial internet of things. IEEE Access 7:136073\u2013136093","journal-title":"IEEE Access"},{"issue":"21","key":"18625_CR37","doi-asserted-by":"crossref","first-page":"15694","DOI":"10.1109\/JIOT.2020.3047662","volume":"8","author":"M Masud","year":"2020","unstructured":"Masud M, Gaba GS, Alqahtani S, Muhammad G, Gupta BB, Kumar P, Ghoneim A (2020) A lightweight and robust secure key establishment protocol for internet of medical things in COVID-19 patients care. IEEE Internet Things J 8(21):15694\u201315703","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"18625_CR38","first-page":"66","volume":"2","author":"S Qiu","year":"2021","unstructured":"Qiu S, Wang D (2021) Revisiting three anonymous two-factor authentication schemes for roaming service in global mobility networks. J Surveill, Secur Saf 2(2):66\u201382","journal-title":"J Surveill, Secur Saf"},{"key":"18625_CR39","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.jnca.2018.02.003","volume":"107","author":"G Xu","year":"2018","unstructured":"Xu G, Liu J, Lu Y, Zeng X, Zhang Y, Li X (2018) A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks. J Netw Comput Appl 107:83\u201392","journal-title":"J Netw Comput Appl"},{"key":"18625_CR40","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.adhoc.2018.07.030","volume":"84","author":"M Gupta","year":"2019","unstructured":"Gupta M, Chaudhari NS (2019) Anonymous two factor authentication protocol for roaming service in global mobility network with security beyond traditional limit. Ad Hoc Netw 84:56\u201367","journal-title":"Ad Hoc Netw"},{"key":"18625_CR41","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s12083-019-0717-x","volume":"13","author":"R Madhusudhan","year":"2020","unstructured":"Madhusudhan R (2020) Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET. Peer-to-Peer Netw Appl 13:82\u2013103","journal-title":"Peer-to-Peer Netw Appl"},{"key":"18625_CR42","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1016\/j.compeleceng.2017.08.003","volume":"69","author":"S Challa","year":"2018","unstructured":"Challa S, Das AK, Odelu V, Kumar N, Kumari S, Khan MK, Vasilakos AV (2018) An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput Electr Eng 69:534\u2013554","journal-title":"Comput Electr Eng"},{"key":"18625_CR43","doi-asserted-by":"crossref","first-page":"205071","DOI":"10.1109\/ACCESS.2020.3037474","volume":"8","author":"MA Rahman","year":"2020","unstructured":"Rahman MA, Hossain MS, Islam MS, Alrajeh NA, Muhammad G (2020) Secure and provenance enhanced internet of health things framework: a blockchain managed federated learning approach. Ieee Access 8:205071\u2013205087","journal-title":"Ieee Access"},{"key":"18625_CR44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2022.09.004","volume":"613","author":"L Caruccio","year":"2022","unstructured":"Caruccio L, Desiato D, Polese G, Tortora G, Zannone N (2022) A decision-support framework for data anonymization with application to machine learning processes. Inf Sci 613:1\u201332","journal-title":"Inf Sci"},{"key":"18625_CR45","doi-asserted-by":"crossref","unstructured":"Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cu\u00e9llar J, ... Vigneron L (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification: 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005. Proceedings 17\u00a0(pp. 281-285). Springer Berlin Heidelberg","DOI":"10.1007\/11513988_27"},{"key":"18625_CR46","unstructured":"AVISPA S (2019) The Security Protocol ANimator for AVISPA.\u00a0https:\/\/people.irisa.fr\/Thomas.Genet\/span\/"},{"key":"18625_CR47","doi-asserted-by":"crossref","first-page":"47282","DOI":"10.1109\/ACCESS.2020.2978891","volume":"8","author":"G Xu","year":"2020","unstructured":"Xu G, Wang F, Zhang M, Peng J (2020) Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks. IEEE Access 8:47282\u201347294","journal-title":"IEEE Access"},{"key":"18625_CR48","first-page":"1","volume":"2021","author":"TY Wu","year":"2021","unstructured":"Wu TY, Wang T, Lee YQ, Zheng W, Kumari S, Kumar S (2021) Improved authenticated key agreement scheme for fog-driven IoT healthcare system. Secur Commun Netw 2021:1\u201316","journal-title":"Secur Commun Netw"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18625-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18625-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18625-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T13:16:56Z","timestamp":1731590216000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18625-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,25]]},"references-count":48,"journal-issue":{"issue":"36","published-online":{"date-parts":[[2024,11]]}},"alternative-id":["18625"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18625-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,3,25]]},"assertion":[{"value":"10 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 March 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"I, Subhasish Banerjee, on behalf of all co-authors listed in the manuscript grant my consent to publish the manuscript titled \u201cAn Efficient Hybrid Multifactor Mutual Authentication and session Key Agreement scheme for Patient Monitoring system using IoMT\u201d in your reputed journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}