{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T02:33:41Z","timestamp":1774751621747,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T00:00:00Z","timestamp":1688428800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T00:00:00Z","timestamp":1688428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11227-023-05507-6","type":"journal-article","created":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T13:05:00Z","timestamp":1688994300000},"page":"865-914","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor"],"prefix":"10.1007","volume":"80","author":[{"given":"Namrata","family":"Singh","sequence":"first","affiliation":[]},{"given":"Ayan Kumar","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,4]]},"reference":[{"key":"5507_CR1","doi-asserted-by":"publisher","first-page":"7916","DOI":"10.1007\/s11227-020-03570-x","volume":"77","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R (2021) Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology. J Supercomput 77:7916\u20137955. https:\/\/doi.org\/10.1007\/s11227-020-03570-x","journal-title":"J Supercomput"},{"issue":"11","key":"5507_CR2","doi-asserted-by":"publisher","first-page":"8883","DOI":"10.1109\/JIOT.2021.3117762","volume":"9","author":"W Wang","year":"2022","unstructured":"Wang W et al (2022) Blockchain and PUF-based lightweight authentication protocol for wireless medical sensor networks. IEEE Internet Things J 9(11):8883\u20138891. https:\/\/doi.org\/10.1109\/JIOT.2021.3117762","journal-title":"IEEE Internet Things J"},{"key":"5507_CR3","doi-asserted-by":"publisher","first-page":"171771","DOI":"10.1109\/ACCESS.2020.3022429","volume":"8","author":"X Xiang","year":"2020","unstructured":"Xiang X, Wang M, Fan W (2020) A permissioned blockchain-based identity management and user authentication scheme for E-health systems. IEEE Access 8:171771\u2013171783. https:\/\/doi.org\/10.1109\/ACCESS.2020.3022429","journal-title":"IEEE Access"},{"issue":"14","key":"5507_CR4","doi-asserted-by":"publisher","first-page":"5401","DOI":"10.3390\/s22145401","volume":"22","author":"C-M Chen","year":"2022","unstructured":"Chen C-M, Chen Z, Kumari S, Lin M-C (2022) LAP-IoHT: a lightweight authentication protocol for the internet of health things. Sensors 22(14):5401. https:\/\/doi.org\/10.3390\/s22145401. ISSN 0743-7315","journal-title":"Sensors"},{"key":"5507_CR5","doi-asserted-by":"publisher","first-page":"108500","DOI":"10.1016\/j.comnet.2021.108500","volume":"200","author":"B Zaabar","year":"2021","unstructured":"Zaabar B, Cheikhrouhou O, Jamil F, Ammi M, Abid M (2021) HealthBlock: a secure blockchain-based healthcare data management system. Comput Netw 200:108500. https:\/\/doi.org\/10.1016\/j.comnet.2021.108500. ISSN 2214-2126","journal-title":"Comput Netw"},{"key":"5507_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.comcom.2021.08.011","volume":"180","author":"KM Hossein","year":"2021","unstructured":"Hossein KM, Esmaeili ME, Dargahi T, Khonsari A, Conti M (2021) BCHealth: a novel blockchain-based privacy-preserving architecture for IoT healthcare applications. Comput Commun 180:31\u201347. https:\/\/doi.org\/10.1016\/j.comcom.2021.08.011","journal-title":"Comput Commun"},{"key":"5507_CR7","doi-asserted-by":"publisher","first-page":"102491","DOI":"10.1016\/j.cose.2021.102491","volume":"111","author":"M Mamdouh","year":"2021","unstructured":"Mamdouh M, Awad AI, Khalaf AAM, Hamed HFA (2021) Authentication and identity management of IoHT devices: achievements, challenges, and future directions. Comput Secur 111:102491. https:\/\/doi.org\/10.1016\/j.cose.2021.102491. ISSN 1084-8045","journal-title":"Comput Secur"},{"key":"5507_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/7727685","volume":"2021","author":"A Mehbodniya","year":"2021","unstructured":"Mehbodniya A, Neware R, Vyas S, Kumar MR, Ngulube P, Ray S (2021) Blockchain and IPFS integrated framework in bilevel fog-cloud network for security and privacy of IoMT devices. Comput Math Methods Med 2021:1\u20139. https:\/\/doi.org\/10.1155\/2021\/7727685","journal-title":"Comput Math Methods Med"},{"key":"5507_CR9","doi-asserted-by":"publisher","first-page":"100422","DOI":"10.1016\/j.iot.2021.100422","volume":"15","author":"S Shukla","year":"2021","unstructured":"Shukla S, Thakur S, Hussain S, Breslin JG, Jameel SM (2021) Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet Things 15:100422. https:\/\/doi.org\/10.1016\/j.iot.2021.100422","journal-title":"Internet Things"},{"key":"5507_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893185","author":"S Barman","year":"2019","unstructured":"Barman S, Shum H, Chattopadhyay S, Samanta D (2019) A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2019.2893185. ISSN 1389-1286","journal-title":"IEEE Access"},{"key":"5507_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3018778","author":"B Sikdar","year":"2020","unstructured":"Sikdar B (2020) An efficient privacy-preserving authenticated key agreement scheme for edge-assisted internet of drones. IEEE Trans Veh Technol. https:\/\/doi.org\/10.1109\/TVT.2020.3018778","journal-title":"IEEE Trans Veh Technol"},{"issue":"15","key":"5507_CR12","doi-asserted-by":"publisher","first-page":"7487","DOI":"10.3390\/app12157487","volume":"12","author":"N Alsaeed","year":"2022","unstructured":"Alsaeed N, Nadeem F (2022) Authentication in the internet of medical things: taxonomy, review, and open issues. Appl Sci 12(15):7487. https:\/\/doi.org\/10.3390\/app12157487. ISSN 0140-3664","journal-title":"Appl Sci"},{"key":"5507_CR13","doi-asserted-by":"publisher","first-page":"640","DOI":"10.3390\/jcp2030033","volume":"2","author":"R Hireche","year":"2022","unstructured":"Hireche R, Mansouri H, Pathan A-SK (2022) Security and privacy management in internet of medical things (IoMT): a synthesis. J Cybersecur Privacy 2:640\u2013661. https:\/\/doi.org\/10.3390\/jcp2030033","journal-title":"J Cybersecur Privacy"},{"key":"5507_CR14","doi-asserted-by":"publisher","unstructured":"Shi S, Luo M, Wen Y, Wang L, He D (2022) A blockchain-based user authentication scheme with access control for telehealth systems. Secur Commun Netw 2022, Article ID 6735003. https:\/\/doi.org\/10.1155\/2022\/6735003. ISSN 2542-6605","DOI":"10.1155\/2022\/6735003"},{"issue":"1","key":"5507_CR15","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2017.2780232","volume":"5","author":"M Wazid","year":"2018","unstructured":"Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2018) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J 5(1):269\u2013282. https:\/\/doi.org\/10.1109\/JIOT.2017.2780232","journal-title":"IEEE Internet Things J"},{"key":"5507_CR16","doi-asserted-by":"publisher","first-page":"103766","DOI":"10.1016\/j.scs.2022.103766","volume":"80","author":"GS Gaba","year":"2022","unstructured":"Gaba GS, Hedabou M, Kumar P, Braeken A, Liyanage M, Alazab M (2022) Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare. Sustain Cities Soc 80:103766. https:\/\/doi.org\/10.1016\/j.scs.2022.103766","journal-title":"Sustain Cities Soc"},{"key":"5507_CR17","doi-asserted-by":"publisher","first-page":"102590","DOI":"10.1016\/j.jisa.2020.102590","volume":"55","author":"S Shamshad","year":"2020","unstructured":"Shamshad S, Minahil KM, Kumari S, Chen C-M (2020) A secure blockchain-based e-health records storage and sharing scheme. J Inf Secur Appl 55:102590. https:\/\/doi.org\/10.1016\/j.jisa.2020.102590","journal-title":"J Inf Secur Appl"},{"key":"5507_CR18","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.csbj.2018.07.004","volume":"16","author":"P Zhang","year":"2018","unstructured":"Zhang P, White J, Schmidt DC, Lenz G, Rosenbloom ST (2018) FHIRChain: applying blockchain to securely and scalably share clinical data. Comput Struct Biotechnol J 16:267\u2013278. https:\/\/doi.org\/10.1016\/j.csbj.2018.07.004","journal-title":"Comput Struct Biotechnol J"},{"key":"5507_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/s22072449","author":"F Pelekoudas-Oikonomou","year":"2022","unstructured":"Pelekoudas-Oikonomou F, Zachos G, Papaioannou M, de Ree M, Ribeiro J, Mantas G, Rodriguez J (2022) Blockchain-based security mechanisms for IoMT edge networks in IoMT-based healthcare monitoring systems. Sensors (Basel, Switzerland). https:\/\/doi.org\/10.3390\/s22072449. ISSN 2210-6707","journal-title":"Sensors (Basel, Switzerland)"},{"key":"5507_CR20","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jpdc.2022.03.009","volume":"164","author":"J Jayabalan","year":"2022","unstructured":"Jayabalan J, Jeyanthi N (2022) Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. J Parallel Distrib Comput 164:152\u2013167. https:\/\/doi.org\/10.1016\/j.jpdc.2022.03.009. ISSN 2214-2126","journal-title":"J Parallel Distrib Comput"},{"key":"5507_CR21","doi-asserted-by":"publisher","unstructured":"Radhakrishnan BL, Joseph AS, Sudhakar S (2019) Securing blockchain based electronic health record using multilevel authentication. In: 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), 2019, pp 699\u2013703. https:\/\/doi.org\/10.1109\/ICACCS.2019.8728483. ISSN 1574-1192","DOI":"10.1109\/ICACCS.2019.8728483"},{"issue":"15","key":"5507_CR22","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.3390\/electronics11152314","volume":"11","author":"J Ktari","year":"2022","unstructured":"Ktari J, Frikha T, Ben Amor N, Louraidh L, Elmannai H, Hamdi M (2022) IoMT-based platform for e-health monitoring based on the blockchain. Electronics 11(15):2314. https:\/\/doi.org\/10.3390\/electronics11152314","journal-title":"Electronics"},{"key":"5507_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2775248","author":"J Shen","year":"2017","unstructured":"Shen J, Zhou T, Wei F, Sun X, Xiang Y (2017) Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2017.2775248","journal-title":"IEEE Internet Things J"},{"key":"5507_CR24","doi-asserted-by":"publisher","first-page":"102496","DOI":"10.1016\/j.jnca.2019.102496","volume":"150","author":"M Wazid","year":"2020","unstructured":"Wazid M, Das AK, Bhat VK, Vasilakos AV (2020) LAM-CIoT: lightweight authentication mechanism in cloud-based IoT environment. J Netw Comput Appl 150:102496. https:\/\/doi.org\/10.1016\/j.jnca.2019.102496","journal-title":"J Netw Comput Appl"},{"key":"5507_CR25","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"S Kalra","year":"2015","unstructured":"Kalra S, Sood SK (2015) Secure authentication scheme for IoT and cloud servers. Pervasive Mobile Comput 24:210\u2013223. https:\/\/doi.org\/10.1016\/j.pmcj.2015.08.001","journal-title":"Pervasive Mobile Comput"},{"issue":"6","key":"5507_CR26","doi-asserted-by":"publisher","first-page":"4900","DOI":"10.1109\/JIOT.2018.2877690","volume":"5","author":"AK Das","year":"2018","unstructured":"Das AK, Wazid M, Kumar N, Vasilakos AV, Rodrigues JJPC (2018) Biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment. IEEE Internet Things J 5(6):4900\u20134913. https:\/\/doi.org\/10.1109\/JIOT.2018.2877690","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"5507_CR27","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1109\/TDSC.2018.2857811","volume":"17","author":"J Srinivas","year":"2020","unstructured":"Srinivas J, Das AK, Wazid M, Kumar N (2020) Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Trans Depend Secure Comput 17(6):1133\u20131146. https:\/\/doi.org\/10.1109\/TDSC.2018.2857811. ISSN 0743-7315","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"5507_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2714179","author":"S Roy","year":"2017","unstructured":"Roy S, Chatterjee S, Das AK, Chattopadhyay S, Kumari S, Jo M (2017) Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing internet of things. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2017.2714179. ISSN 2001-0370","journal-title":"IEEE Internet Things J"},{"key":"5507_CR29","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.procs.2021.07.027","volume":"191","author":"F Zerrouki","year":"2021","unstructured":"Zerrouki F, Ouchani S, Bouarfa H (2021) Towards a foundation of a mutual authentication protocol for a robust and resilient PUF-based communication network. Procedia Comput Sci 191:215\u2013222. https:\/\/doi.org\/10.1016\/j.procs.2021.07.027","journal-title":"Procedia Comput Sci"},{"key":"5507_CR30","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.jpdc.2021.04.003","volume":"154","author":"L Vishwakarma","year":"2021","unstructured":"Vishwakarma L, Das D (2021) SCAB-IoTA: secure communication and authentication for IoT applications using blockchain. J Parallel Distrib Comput 154:94\u2013105. https:\/\/doi.org\/10.1016\/j.jpdc.2021.04.003","journal-title":"J Parallel Distrib Comput"},{"key":"5507_CR31","doi-asserted-by":"publisher","first-page":"107333","DOI":"10.1016\/j.comnet.2020.107333","volume":"177","author":"M Fotouhi","year":"2020","unstructured":"Fotouhi M, Bayat M, Das AK, Far HAN, Pournaghi SM, Doostari MA (2020) A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput Netw 177:107333. https:\/\/doi.org\/10.1016\/j.comnet.2020.107333","journal-title":"Comput Netw"},{"issue":"17","key":"5507_CR32","doi-asserted-by":"publisher","first-page":"6960","DOI":"10.3390\/su12176960","volume":"12","author":"M Tahir","year":"2020","unstructured":"Tahir M, Sardaraz M, Muhammad S, Saud Khan M (2020) A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics. Sustainability 12(17):6960. https:\/\/doi.org\/10.3390\/su12176960","journal-title":"Sustainability"},{"issue":"3","key":"5507_CR33","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/TCE.2019.2926192","volume":"65","author":"VP Yanambaka","year":"2019","unstructured":"Yanambaka VP, Mohanty SP, Kougianos E, Puthal D (2019) PMsec: physical unclonable function-based robust and lightweight authentication in the internet of medical things. IEEE Trans Consum Electron 65(3):388\u2013397. https:\/\/doi.org\/10.1109\/TCE.2019.2926192. ISSN 2214-2126","journal-title":"IEEE Trans Consum Electron"},{"issue":"17","key":"5507_CR34","doi-asserted-by":"publisher","first-page":"13183","DOI":"10.1109\/JIOT.2021.3055827","volume":"8","author":"J Li","year":"2021","unstructured":"Li J, Su Z, Guo D, Choo K-KR, Ji Y (2021) PSL-MAAKA: provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in internet of medical things. IEEE Internet Things J 8(17):13183\u201313195. https:\/\/doi.org\/10.1109\/JIOT.2021.3055827. ISSN 0167-4048","journal-title":"IEEE Internet Things J"},{"key":"5507_CR35","doi-asserted-by":"publisher","unstructured":"Wu S, Zhang A, Chen J et al (2022) A Blockchain-Assisted Lightweight Anonymous Authentication Scheme for Medical Services in Internet of Medical Things. 05 July 2022, PREPRINT (Version 1) available at Research Square. https:\/\/doi.org\/10.21203\/rs.3.rs-1226695\/v1. ISSN 1877-0509","DOI":"10.21203\/rs.3.rs-1226695\/v1"},{"key":"5507_CR36","doi-asserted-by":"publisher","DOI":"10.1145\/3511898","author":"M Wazid","year":"2022","unstructured":"Wazid M, Gope P (2022) BACKM-EHA: a novel blockchain-enabled security solution for IoMT-based e-healthcare applications. ACM Trans Internet Technol. https:\/\/doi.org\/10.1145\/3511898","journal-title":"ACM Trans Internet Technol"},{"key":"5507_CR37","doi-asserted-by":"publisher","first-page":"95956","DOI":"10.1109\/ACCESS.2020.2995917","volume":"8","author":"N Garg","year":"2020","unstructured":"Garg N, Wazid M, Das AK, Singh DP, Rodrigues JJPC, Park Y (2020) BAKMP-IoMT: design of blockchain enabled authenticated key management protocol for internet of medical things deployment. IEEE Access 8:95956\u201395977. https:\/\/doi.org\/10.1109\/ACCESS.2020.2995917","journal-title":"IEEE Access"},{"issue":"14","key":"5507_CR38","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1109\/JIOT.2021.3058946","volume":"8","author":"BS Egala","year":"2021","unstructured":"Egala BS, Pradhan AK, Badarla V, Mohanty SP (2021) Fortified-chain: a blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet Things J 8(14):11717\u201311731. https:\/\/doi.org\/10.1109\/JIOT.2021.3058946","journal-title":"IEEE Internet Things J"},{"issue":"20","key":"5507_CR39","doi-asserted-by":"publisher","first-page":"20214","DOI":"10.1109\/JIOT.2022.3171791","volume":"9","author":"S Yu","year":"2022","unstructured":"Yu S, Park Y (2022) A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions. IEEE Internet Things J 9(20):20214\u201320228. https:\/\/doi.org\/10.1109\/JIOT.2022.3171791","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"5507_CR40","doi-asserted-by":"publisher","first-page":"2146","DOI":"10.1109\/JBHI.2020.2969648","volume":"24","author":"A Yazdinejad","year":"2020","unstructured":"Yazdinejad A, Srivastava G, Parizi RM, Dehghantanha A, Choo KR, Aledhari M (2020) Decentralized authentication of distributed patients in hospital networks using blockchain. IEEE J Biomed Health Inform 24(8):2146\u20132156. https:\/\/doi.org\/10.1109\/JBHI.2020.2969648","journal-title":"IEEE J Biomed Health Inform"},{"key":"5507_CR41","doi-asserted-by":"publisher","first-page":"102407","DOI":"10.1016\/j.jisa.2019.102407","volume":"50","author":"S Tanwar","year":"2020","unstructured":"Tanwar S, Parekh K, Evans R (2020) Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J Inf Secur Appl 50:102407. https:\/\/doi.org\/10.1016\/j.jisa.2019.102407","journal-title":"J Inf Secur Appl"},{"issue":"8","key":"5507_CR42","doi-asserted-by":"publisher","first-page":"5779","DOI":"10.1109\/TII.2020.3037889","volume":"17","author":"AP Singh","year":"2021","unstructured":"Singh AP et al (2021) A novel patient-centric architectural framework for blockchain-enabled healthcare applications. IEEE Trans Industr Inf 17(8):5779\u20135789. https:\/\/doi.org\/10.1109\/TII.2020.3037889","journal-title":"IEEE Trans Industr Inf"},{"issue":"8","key":"5507_CR43","doi-asserted-by":"publisher","first-page":"2865","DOI":"10.3390\/s21082865","volume":"21","author":"I Abunadi","year":"2021","unstructured":"Abunadi I, Kumar RL (2021) BSF-EHR: blockchain security framework for electronic health records of patients. Sensors (Basel, Switzerland) 21(8):2865. https:\/\/doi.org\/10.3390\/s21082865","journal-title":"Sensors (Basel, Switzerland)"},{"key":"5507_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904300","author":"F Tang","year":"2019","unstructured":"Tang F, Ma S, Xiang Y, Lin C (2019) An efficient authentication scheme for blockchain-based electronic health records. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2019.2904300","journal-title":"IEEE Access"},{"issue":"14","key":"5507_CR45","doi-asserted-by":"publisher","first-page":"11743","DOI":"10.1109\/JIOT.2021.3058953","volume":"8","author":"DC Nguyen","year":"2021","unstructured":"Nguyen DC, Pathirana PN, Ding M, Seneviratne A (2021) BEdgeHealth: a decentralized architecture for edge-based IoMT networks using blockchain. IEEE Internet Things J 8(14):11743\u201311757. https:\/\/doi.org\/10.1109\/JIOT.2021.3058953","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"5507_CR46","doi-asserted-by":"publisher","first-page":"391","DOI":"10.3390\/electronics10040391","volume":"10","author":"D Na","year":"2021","unstructured":"Na D, Park S (2021) Fusion chain: a decentralized lightweight blockchain for IoT security and privacy. Electronics 10(4):391. https:\/\/doi.org\/10.3390\/electronics10040391","journal-title":"Electronics"},{"key":"5507_CR47","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2021.1927863","author":"S Razdan","year":"2021","unstructured":"Razdan S, Sharma S (2021) Internet of medical things (IoMT): overview, emerging technologies, and case studies. IETE Tech Rev. https:\/\/doi.org\/10.1080\/02564602.2021.1927863","journal-title":"IETE Tech Rev"},{"key":"5507_CR48","doi-asserted-by":"publisher","first-page":"102585","DOI":"10.1016\/j.jisa.2020.102585","volume":"55","author":"MF Ayub","year":"2020","unstructured":"Ayub MF, Saleem MA, Altaf I, Mahmood K, Kumari S (2020) Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device. J Inf Secur Appl 55:102585. https:\/\/doi.org\/10.1016\/j.jisa.2020.102585","journal-title":"J Inf Secur Appl"},{"key":"5507_CR49","doi-asserted-by":"publisher","unstructured":"Yanambaka VP, Mohanty S, Kougianos E, Puthal D, Rachakonda L (2019). PMsec: PUF-based energy-efficient authentication of devices in the internet of medical things (IoMT), pp 320\u2013321. https:\/\/doi.org\/10.1109\/iSES47678.2019.00079","DOI":"10.1109\/iSES47678.2019.00079"},{"key":"5507_CR50","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01453-5","author":"S Vimal","year":"2019","unstructured":"Vimal S, Srivatsa SK (2019) A new cluster P2P file sharing system based on IPFS and blockchain technology. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-019-01453-5. ISSN 1389-1286","journal-title":"J Ambient Intell Human Comput"},{"key":"5507_CR51","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2021.0120291","author":"T Vaiyapuri","year":"2021","unstructured":"Vaiyapuri T, Binbusayyis A, Varadarajan V (2021) Security, privacy and trust in IoMT enabled smart healthcare system: a systematic review of current and future trends. Int J Adv Comput Sci Appl. https:\/\/doi.org\/10.14569\/IJACSA.2021.0120291. ISSN 0167-739X","journal-title":"Int J Adv Comput Sci Appl"},{"key":"5507_CR52","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.future.2019.09.050","volume":"102","author":"SN Mohanty","year":"2020","unstructured":"Mohanty SN, Ramya KC, Rani SS, Gupta D, Shankar K, Lakshmanaprabu SK, Khanna A (2020) An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Future Gener Comput Syst 102:1027\u20131037. https:\/\/doi.org\/10.1016\/j.future.2019.09.050","journal-title":"Future Gener Comput Syst"},{"key":"5507_CR53","doi-asserted-by":"publisher","unstructured":"Fotopoulos F, Malamas V, Dasaklis TK, Kotzanikolaou P, Douligeris C (2020) A blockchain-enabled architecture for IoMT device authentication. In: 2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE), 2020, pp 89\u201392. https:\/\/doi.org\/10.1109\/ECICE50847.2020.9301913","DOI":"10.1109\/ECICE50847.2020.9301913"},{"key":"5507_CR54","unstructured":"Aranha D, Barreto P, Pereira G, Ricardini J (2013) A note on high-security general-purpose elliptic curves. https:\/\/eprint.iacr.org"},{"key":"5507_CR55","doi-asserted-by":"publisher","first-page":"2776","DOI":"10.1109\/TIFS.2017.2721359","volume":"12","author":"D Wang","year":"2017","unstructured":"Wang D, Cheng H, Wang P, Huang X, Jian G (2017) Zipf\u2019s law in passwords. IEEE Trans Inf Forensics Secur 12:2776\u20132791. https:\/\/doi.org\/10.1109\/TIFS.2017.2721359","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"5507_CR56","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.ins.2018.10.037","volume":"477","author":"N Lwamo","year":"2019","unstructured":"Lwamo N, Zhu L (2019) SUAA: a secure user authentication scheme with anonymity for the single & multi-server environments. Inf Sci 477:369\u2013385","journal-title":"Inf Sci"},{"issue":"2","key":"5507_CR57","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"IT-29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory IT-29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05507-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05507-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05507-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T11:28:31Z","timestamp":1704713311000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05507-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,4]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["5507"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05507-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,4]]},"assertion":[{"value":"15 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}