{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:31:09Z","timestamp":1772119869373,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T00:00:00Z","timestamp":1700611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s11227-023-05749-4","type":"journal-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T11:02:58Z","timestamp":1700650978000},"page":"8434-8468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare"],"prefix":"10.1007","volume":"80","author":[{"given":"Mahdi","family":"Nikooghadam","sequence":"first","affiliation":[]},{"given":"Haleh","family":"Amintoosi","sequence":"additional","affiliation":[]},{"given":"Hamid Reza","family":"Shahriari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,22]]},"reference":[{"issue":"3","key":"5749_CR1","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MCE.2016.2556879","volume":"5","author":"SP Mohanty","year":"2016","unstructured":"Mohanty SP, Choppali U, Kougianos E (2016) Everything you wanted to know about smart cities: the internet of things is the backbone. IEEE Consum Electron Mag 5(3):60\u201370","journal-title":"IEEE Consum Electron Mag"},{"key":"5749_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-019-1471-6","volume":"44","author":"D Dharminder","year":"2020","unstructured":"Dharminder D, Mishra D, Li X (2020) Construction of rsa-based authentication scheme in authorized access to healthcare services. J Med Syst 44:1\u20139","journal-title":"J Med Syst"},{"key":"5749_CR3","volume":"68","author":"A Gupta","year":"2022","unstructured":"Gupta A, Tripathi M, Muhuri S, Singal G, Kumar N (2022) A secure and lightweight anonymous mutual authentication scheme for wearable devices in medical internet of things. J Inf Secur Appl 68:103259","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"5749_CR4","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst (TOCS) 8(1):18\u201336","journal-title":"ACM Trans Comput Syst (TOCS)"},{"key":"5749_CR5","unstructured":"Cremers CJF et al (2006) Scyther: semantics and verification of security protocols. Eindhoven university of Technology Eindhoven, Netherlands"},{"key":"5749_CR6","doi-asserted-by":"crossref","unstructured":"Abdalla M, Fouque P-A, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23\u201326 2005. Springer, Berlin, pp 65\u201384","DOI":"10.1007\/978-3-540-30580-4_6"},{"issue":"1","key":"5749_CR7","doi-asserted-by":"crossref","first-page":"4332","DOI":"10.1002\/dac.4332","volume":"36","author":"M Nikooghadam","year":"2023","unstructured":"Nikooghadam M, Amintoosi H (2023) Secure communication in cloudiot through design of a lightweight authentication and session key agreement scheme. Int J Commun Syst 36(1):4332","journal-title":"Int J Commun Syst"},{"key":"5749_CR8","doi-asserted-by":"crossref","unstructured":"Amintoosi H, Nikooghadam M (2019) A novel provably-secure ecc-based authentication and key management protocol for telecare medical information systems. In: 2019 9th International Conference on Computer and Knowledge Engineering (ICCKE). IEEE, pp 85\u201390","DOI":"10.1109\/ICCKE48569.2019.8965036"},{"key":"5749_CR9","doi-asserted-by":"crossref","first-page":"1061","DOI":"10.1007\/s12652-017-0516-2","volume":"9","author":"Q Jiang","year":"2018","unstructured":"Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2018) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Humaniz Comput 9:1061\u20131073","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"5749_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0182-2","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39:1\u20138","journal-title":"J Med Syst"},{"issue":"1","key":"5749_CR11","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/s10916-018-1120-5","volume":"43","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) A robust and efficient ecc-based mutual authentication and session key generation scheme for healthcare applications. J Med Syst 43(1):10","journal-title":"J Med Syst"},{"key":"5749_CR12","doi-asserted-by":"crossref","first-page":"39717","DOI":"10.1109\/ACCESS.2019.2905731","volume":"7","author":"S Kumari","year":"2019","unstructured":"Kumari S, Chaudhary P, Chen C-M, Khan MK (2019) Questioning key compromise attack on ostad-sharif et al.\u2019s authentication and session key generation scheme for healthcare applications. IEEE Access 7:39717\u201339720","journal-title":"IEEE Access"},{"key":"5749_CR13","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.future.2019.02.020","volume":"96","author":"SF Aghili","year":"2019","unstructured":"Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) Laco: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Fut Gener Comput Syst 96:410\u2013424","journal-title":"Fut Gener Comput Syst"},{"issue":"3","key":"5749_CR14","doi-asserted-by":"crossref","first-page":"2795","DOI":"10.1109\/TIE.2017.2739683","volume":"65","author":"L Zhang","year":"2017","unstructured":"Zhang L, Zhang Y, Tang S, Luo H (2017) Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement. IEEE Trans Industr Electron 65(3):2795\u20132805","journal-title":"IEEE Trans Industr Electron"},{"key":"5749_CR15","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/j.future.2016.05.032","volume":"80","author":"R Amin","year":"2018","unstructured":"Amin R, Islam SH, Biswas G, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur Gener Comput Syst 80:483\u2013495","journal-title":"Futur Gener Comput Syst"},{"key":"5749_CR16","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.compeleceng.2017.03.016","volume":"63","author":"Q Jiang","year":"2017","unstructured":"Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput Electr Eng 63:182\u2013195","journal-title":"Comput Electr Eng"},{"issue":"1","key":"5749_CR17","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/JSYST.2019.2899580","volume":"14","author":"X Li","year":"2019","unstructured":"Li X, Peng J, Obaidat MS, Wu F, Khan MK, Chen C (2019) A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst J 14(1):39\u201350","journal-title":"IEEE Syst J"},{"issue":"5","key":"5749_CR18","doi-asserted-by":"crossref","first-page":"728","DOI":"10.3390\/s16050728","volume":"16","author":"J Liu","year":"2016","unstructured":"Liu J, Zhang L, Sun R (2016) 1-raap: an efficient 1-round anonymous authentication protocol for wireless body area networks. Sensors 16(5):728","journal-title":"Sensors"},{"key":"5749_CR19","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.compeleceng.2017.02.011","volume":"61","author":"X Li","year":"2017","unstructured":"Li X, Peng J, Kumari S, Wu F, Karuppiah M, Choo K-KR (2017) An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput Electr Eng 61:238\u2013249","journal-title":"Comput Electr Eng"},{"issue":"4","key":"5749_CR20","doi-asserted-by":"crossref","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","volume":"11","author":"D He","year":"2016","unstructured":"He D, Zeadally S, Kumar N, Lee J-H (2016) Anonymous authentication for wireless body area networks with provable security. IEEE Syst J 11(4):2590\u20132601","journal-title":"IEEE Syst J"},{"key":"5749_CR21","doi-asserted-by":"crossref","first-page":"47962","DOI":"10.1109\/ACCESS.2019.2909556","volume":"7","author":"S Khatoon","year":"2019","unstructured":"Khatoon S, Rahman SMM, Alrubaian M, Alamri A (2019) Privacy-preserved, provable secure, mutually authenticated key agreement protocol for healthcare in a smart city environment. IEEE Access 7:47962\u201347971","journal-title":"IEEE Access"},{"key":"5749_CR22","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2022.107803","volume":"99","author":"H Amintoosi","year":"2022","unstructured":"Amintoosi H, Nikooghadam M, Shojafar M, Kumari S, Alazab M (2022) Slight: a lightweight authentication scheme for smart healthcare services. Comput Electr Eng 99:107803","journal-title":"Comput Electr Eng"},{"key":"5749_CR23","doi-asserted-by":"crossref","DOI":"10.1016\/j.cmpb.2019.105054","volume":"182","author":"P Soni","year":"2019","unstructured":"Soni P, Pal AK, Islam SH (2019) An improved three-factor authentication scheme for patient monitoring using wsn in remote health-care system. Comput Methods Progr Biomed 182:105054","journal-title":"Comput Methods Progr Biomed"},{"key":"5749_CR24","doi-asserted-by":"crossref","first-page":"47282","DOI":"10.1109\/ACCESS.2020.2978891","volume":"8","author":"G Xu","year":"2020","unstructured":"Xu G, Wang F, Zhang M, Peng J (2020) Efficient and provably secure anonymous user authentication scheme for patient monitoring using wireless medical sensor networks. IEEE Access 8:47282\u201347294","journal-title":"IEEE Access"},{"issue":"5","key":"5749_CR25","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1007\/s42979-022-01300-z","volume":"3","author":"AN Bahache","year":"2022","unstructured":"Bahache AN, Chikouche N, Mezrag F (2022) Authentication schemes for healthcare applications using wireless medical sensor networks: a survey. SN Comput Sci 3(5):382","journal-title":"SN Comput Sci"},{"key":"5749_CR26","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1007\/s11277-019-06897-8","volume":"111","author":"SS Sahoo","year":"2020","unstructured":"Sahoo SS, Mohanty S, Majhi B (2020) Improved biometric-based mutual authentication and key agreement scheme using ecc. Wirel Pers Commun 111:991\u20131017","journal-title":"Wirel Pers Commun"},{"issue":"10","key":"5749_CR27","doi-asserted-by":"crossref","first-page":"12792","DOI":"10.1007\/s11227-021-04280-8","volume":"78","author":"C Meshram","year":"2022","unstructured":"Meshram C, Ibrahim RW, Meshram SG, Imoize AL, Jamal SS, Barve SK (2022) An efficient remote user authentication with key agreement procedure based on convolution-chebyshev chaotic maps using biometric. J Supercomput 78(10):12792\u201312814","journal-title":"J Supercomput"},{"key":"5749_CR28","doi-asserted-by":"crossref","first-page":"1419","DOI":"10.1007\/s12652-020-02213-6","volume":"12","author":"SS Sahoo","year":"2021","unstructured":"Sahoo SS, Mohanty S, Majhi B (2021) A secure three factor based authentication scheme for health care systems using iot enabled devices. J Ambient Intell Humaniz Comput 12:1419\u20131434","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"5749_CR29","doi-asserted-by":"crossref","first-page":"11511","DOI":"10.1109\/ACCESS.2022.3145959","volume":"10","author":"J Ryu","year":"2022","unstructured":"Ryu J, Oh J, Kwon D, Son S, Lee J, Park Y, Park Y (2022) Secure ecc-based three-factor mutual authentication protocol for telecare medical information system. IEEE Access 10:11511\u201311526","journal-title":"IEEE Access"},{"issue":"4","key":"5749_CR30","doi-asserted-by":"crossref","first-page":"2649","DOI":"10.1109\/JIOT.2021.3080461","volume":"9","author":"M Masud","year":"2021","unstructured":"Masud M, Gaba GS, Choudhary K, Hossain MS, Alhamid MF, Muhammad G (2021) Lightweight and anonymity-preserving user authentication scheme for iot-based healthcare. IEEE Int Things J 9(4):2649\u20132656","journal-title":"IEEE Int Things J"},{"issue":"18","key":"5749_CR31","doi-asserted-by":"crossref","first-page":"6039","DOI":"10.3390\/s21186039","volume":"21","author":"D Kwon","year":"2021","unstructured":"Kwon D, Park Y, Park Y (2021) Provably secure three-factor-based mutual authentication scheme with puf for wireless medical sensor networks. Sensors 21(18):6039","journal-title":"Sensors"},{"key":"5749_CR32","volume-title":"Cyber security in parallel and distributed computing: concepts, techniques, applications and case studies","author":"D-N Le","year":"2019","unstructured":"Le D-N, Kumar R, Mishra BK, Chatterjee JM, Khari M (2019) Cyber security in parallel and distributed computing: concepts, techniques, applications and case studies. John Wiley & Sons, New Jersey"},{"issue":"1","key":"5749_CR33","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/s11042-016-4208-2","volume":"77","author":"N Ravanbakhsh","year":"2018","unstructured":"Ravanbakhsh N, Nazari M (2018) An efficient improvement remote user mutual authentication and session key agreement scheme for e-health care systems. Multimed Tools Appl 77(1):55\u201388","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"5749_CR34","doi-asserted-by":"crossref","first-page":"3913","DOI":"10.1002\/dac.3913","volume":"32","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) An enhanced anonymous and unlinkable user authentication and key agreement protocol for tmis by utilization of ecc. Int J Commun Syst 32(5):3913","journal-title":"Int J Commun Syst"},{"key":"5749_CR35","doi-asserted-by":"crossref","unstructured":"Nikooghadam M, Amintoosi H (2020) An improved secure authentication and key agreement scheme for healthcare applications. In: 2020 25th International Computer Conference, Computer Society of Iran (CSICC). IEEE, pp 1\u20137","DOI":"10.1109\/CSICC49403.2020.9050069"},{"key":"5749_CR36","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.cmpb.2018.02.002","volume":"157","author":"C-T Li","year":"2018","unstructured":"Li C-T, Shih D-H, Wang C-C (2018) Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. Comput Methods Progr Biomed 157:191\u2013203","journal-title":"Comput Methods Progr Biomed"},{"key":"5749_CR37","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.tele.2018.09.001","volume":"38","author":"V Kumar","year":"2019","unstructured":"Kumar V, Ahmad M, Kumari A (2019) A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted tmis. Telemat Inf 38:100\u2013117","journal-title":"Telemat Inf"},{"key":"5749_CR38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2015","unstructured":"Giri D, Maitra T, Amin R, Srivastava P (2015) An efficient and robust rsa-based remote user authentication for telecare medical information systems. J Med Syst 39:1\u20139","journal-title":"J Med Syst"},{"issue":"8","key":"5749_CR39","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s10916-015-0262-y","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin R, Biswas G (2015) An improved rsa based user authentication and session key agreement protocol usable in tmis. J Med Syst 39(8):79","journal-title":"J Med Syst"},{"issue":"2","key":"5749_CR40","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1002\/sec.967","volume":"8","author":"FT Bin Muhaya","year":"2015","unstructured":"Bin Muhaya FT (2015) Cryptanalysis and security enhancement of zhu\u2019s authentication scheme for telecare medicine information system. Secur Commun Netw 8(2):149\u2013158","journal-title":"Secur Commun Netw"},{"key":"5749_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0259-6","volume":"39","author":"H Arshad","year":"2015","unstructured":"Arshad H, Teymoori V, Nikooghadam M, Abbassi H (2015) On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J Med Syst 39:1\u201310","journal-title":"J Med Syst"},{"key":"5749_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-0001-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra D, Mukhopadhyay S, Chaturvedi A, Kumari S, Khan MK (2014) Cryptanalysis and improvement of yan et al.\u2019s biometric-based authentication scheme for telecare medicine information systems. J Med Syst 38:1\u201312","journal-title":"J Med Syst"},{"issue":"2","key":"5749_CR43","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1109\/JBHI.2016.2517146","volume":"21","author":"L Zhang","year":"2016","unstructured":"Zhang L, Zhu S, Tang S (2016) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J Biomed Health Inform 21(2):465\u2013475","journal-title":"IEEE J Biomed Health Inform"},{"key":"5749_CR44","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s10207-019-00464-9","volume":"19","author":"K Sowjanya","year":"2020","unstructured":"Sowjanya K, Dasgupta M, Ray S (2020) An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems. Int J Inf Secur 19:129\u2013146","journal-title":"Int J Inf Secur"},{"key":"5749_CR45","doi-asserted-by":"crossref","first-page":"3086","DOI":"10.1007\/s11227-019-03086-z","volume":"76","author":"M Nikooghadam","year":"2020","unstructured":"Nikooghadam M, Amintoosi H (2020) Perfect forward secrecy via an ecc-based authentication scheme for sip in voip. J Supercomput 76:3086\u20133104","journal-title":"J Supercomput"},{"key":"5749_CR46","doi-asserted-by":"crossref","unstructured":"Sarvabhatla M, Reddy MCM, Vorugunti CS (2015) A robust remote user authentication scheme resistant to known session specific temporary information attack. In: 2015 Applications and Innovations in Mobile Computing (AIMoC). IEEE, pp 164\u2013169","DOI":"10.1109\/AIMOC.2015.7083847"},{"issue":"6","key":"5749_CR47","first-page":"966","volume":"19","author":"M Luo","year":"2017","unstructured":"Luo M, Wan Y, Huang D (2017) Certificateless hybrid signcryption scheme with known session-specific temporary information security. Int J Netw Secur 19(6):966\u2013972","journal-title":"Int J Netw Secur"},{"issue":"8","key":"5749_CR48","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1093\/comjnl\/bxz157","volume":"63","author":"X-J Lin","year":"2020","unstructured":"Lin X-J, Sun L, Yan Z, Zhang X, Qu H (2020) On the security of a certificateless signcryption with known session-specific temporary information security in the standard model. Comput J 63(8):1259\u20131262","journal-title":"Comput J"},{"issue":"2","key":"5749_CR49","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"5749_CR50","doi-asserted-by":"crossref","unstructured":"Canetti R, Krawczyk H (2002) Universally composable notions of key exchange and secure channels. In: Advances in Cryptology-EUROCRYPT 2002: International Conference on the Theory and Applications of Cryptographic Techniques Amsterdam, The Netherlands, April 28\u2013May 2 2002. Springer, pp 337\u2013351","DOI":"10.1007\/3-540-46035-7_22"},{"issue":"9","key":"5749_CR51","doi-asserted-by":"crossref","first-page":"11129","DOI":"10.1007\/s11042-018-6620-2","volume":"78","author":"N Ravanbakhsh","year":"2019","unstructured":"Ravanbakhsh N, Mohammadi M, Nikooghadam M (2019) Perfect forward secrecy in voip networks through design a lightweight and secure authenticated communication scheme. Multimed Tools Appl 78(9):11129\u201311153","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"5749_CR52","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1002\/spy2.92","volume":"3","author":"M Nikooghadam","year":"2020","unstructured":"Nikooghadam M, Amintoosi H (2020) A secure and robust elliptic curve cryptography-based mutual authentication scheme for session initiation protocol. Secur Priv 3(1):92","journal-title":"Secur Priv"},{"key":"5749_CR53","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang Q, Ma J, Lu X, Tian Y (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38:1\u20138","journal-title":"J Med Syst"},{"issue":"2","key":"5749_CR54","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1109\/TDSC.2017.2764083","volume":"17","author":"M Wazid","year":"2017","unstructured":"Wazid M, Das AK, Odelu V, Kumar N, Susilo W (2017) Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Dependable Secure Comput 17(2):391\u2013406","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"4","key":"5749_CR55","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1109\/JBHI.2017.2753464","volume":"22","author":"AK Das","year":"2017","unstructured":"Das AK, Wazid M, Kumar N, Khan MK, Choo K-KR, Park Y (2017) Design of secure and lightweight authentication protocol for wearable devices environment. IEEE J Biomed Health Inform 22(4):1310\u20131322","journal-title":"IEEE J Biomed Health Inform"},{"key":"5749_CR56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0182-2","volume":"39","author":"L Xu","year":"2015","unstructured":"Xu L, Wu F (2015) Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 39:1\u20139","journal-title":"J Med Syst"},{"key":"5749_CR57","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1007\/s12652-017-0460-1","volume":"9","author":"S Kumari","year":"2018","unstructured":"Kumari S, Karuppiah M, Das AK, Li X, Wu F, Gupta V (2018) Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J Ambient Intell Humaniz Comput 9:643\u2013653","journal-title":"J Ambient Intell Humaniz Comput"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05749-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05749-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05749-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T08:25:03Z","timestamp":1711355103000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05749-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,22]]},"references-count":57,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["5749"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05749-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2735038\/v1","asserted-by":"object"}]},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,22]]},"assertion":[{"value":"19 October 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}