{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:22:46Z","timestamp":1776680566685,"version":"3.51.2"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T00:00:00Z","timestamp":1588550400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T00:00:00Z","timestamp":1588550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61662046"],"award-info":[{"award-number":["61662046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11235-020-00673-x","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T13:03:41Z","timestamp":1588597421000},"page":"437-449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Cross-domain certificateless authenticated group key agreement protocol for 5G network slicings"],"prefix":"10.1007","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2231-3775","authenticated-orcid":false,"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiayu","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiangjun","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,5,4]]},"reference":[{"issue":"2","key":"673_CR1","doi-asserted-by":"publisher","first-page":"2241","DOI":"10.1109\/JIOT.2018.2887086","volume":"6","author":"B Li","year":"2019","unstructured":"Li, B., Fei, Z., & Zhang, Y. (2019). UAV communications for 5G and beyond: Recent advances and future trends. IEEE Internet of Things Journal,6(2), 2241\u20132263.","journal-title":"IEEE Internet of Things Journal"},{"key":"673_CR2","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.jnca.2019.01.009","volume":"137","author":"R Shrivastava","year":"2019","unstructured":"Shrivastava, R., Samdanis, K., & Sciancalepore, V. (2019). Towards service-oriented soft spectrum slicing for 5G TDD networks. Journal of Network and Computer Applications,137, 78\u201390.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"673_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/JSAC.2018.2815418","volume":"36","author":"J Ni","year":"2018","unstructured":"Ni, J., Lin, X., & Shen, X. S. (2018). Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT. IEEE Journal on Selected Areas in Communications,36(3), 644\u2013657.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"673_CR4","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.ins.2015.01.037","volume":"321","author":"HM Sun","year":"2015","unstructured":"Sun, H. M., He, B. Z., Chen, C. M., Wu, T. Y., Lin, C. H., & Wang, H. (2015). A provable authenticated group key agreement protocol for mobile environment. Information Sciences,321, 224\u2013237.","journal-title":"Information Sciences"},{"issue":"11","key":"673_CR5","doi-asserted-by":"publisher","first-page":"2716","DOI":"10.1587\/transinf.2016EDP7210","volume":"99","author":"D Cheng","year":"2016","unstructured":"Cheng, D., Liu, J., Guan, Z., & Shang, T. (2016). A one-round certificateless authenticated group key agreement protocol for mobile ad hoc networks. IEICE Transactions on Information and Systems,99(11), 2716\u20132722.","journal-title":"IEICE Transactions on Information and Systems"},{"key":"673_CR6","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.future.2017.06.025","volume":"84","author":"Y Yang","year":"2018","unstructured":"Yang, Y., Zheng, X., Liu, X., Zhong, S., & Chang, V. (2018). Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system. Future Generation Computer Systems,84, 160\u2013176.","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"673_CR7","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory,22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"key":"673_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2015.05.008","volume":"72","author":"B Daghighi","year":"2015","unstructured":"Daghighi, B., Kiah, M. L. M., Shamshirband, S., Iqbal, S., & Asghari, P. (2015). Key management paradigm for mobile secure group communications: Issues, solutions, and challenges. Computer Communications,72, 1\u201316.","journal-title":"Computer Communications"},{"key":"673_CR9","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., & Pointcheval, D. (2002). Dynamic group Diffie\u2013Hellman key exchange under standard assumptions. In International conference on the theory and applications of cryptographic techniques (pp. 321\u2013336).","DOI":"10.1007\/3-540-46035-7_21"},{"issue":"2","key":"673_CR10","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1504\/IJACT.2008.021083","volume":"1","author":"E Bresson","year":"2008","unstructured":"Bresson, E., & Manulis, M. (2008). Securing group key exchange against strong corruptions and key registration attacks. International Journal of Applied Cryptography,1(2), 91\u2013107.","journal-title":"International Journal of Applied Cryptography"},{"issue":"4","key":"673_CR11","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/2043628.2043629","volume":"14","author":"MC Gorantla","year":"2011","unstructured":"Gorantla, M. C., Boyd, C., Nieto, J. M. G., & Manulis, M. (2011). Modeling key compromise impersonation attacks on group key exchange protocols. ACM Transactions on Information and System Security,14(4), 28.","journal-title":"ACM Transactions on Information and System Security"},{"key":"673_CR12","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/367264","author":"TY Wu","year":"2014","unstructured":"Wu, T. Y., Tsai, T. T., & Tseng, Y. M. (2014). A provably secure revocable id-based authenticated group key exchange protocol with identifying malicious participants. The Scientific World Journal. https:\/\/doi.org\/10.1155\/2014\/367264.","journal-title":"The Scientific World Journal"},{"key":"673_CR13","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1002\/dac.2685","volume":"28","author":"Z Tan","year":"2015","unstructured":"Tan, Z. (2015). An efficient pairing-free identity-based authenticated group key agreement protocol. International Journal of Communication Systems,28, 534\u2013545.","journal-title":"International Journal of Communication Systems"},{"issue":"1","key":"673_CR14","first-page":"93","volume":"20","author":"S Bala","year":"2019","unstructured":"Bala, S., Sharma, G., Bansal, H., & Bhatia, T. (2019). On the security of authenticated group key agreement protocols. Scalable Computing: Practice and Experience,20(1), 93\u201399.","journal-title":"Scalable Computing: Practice and Experience"},{"key":"673_CR15","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S. S., & Paterson, K. G. (2003). Certificateless public key cryptography. In International conference on the theory and application of cryptology and information security (pp. 452\u2013473).","DOI":"10.1007\/978-3-540-40061-5_29"},{"issue":"2","key":"673_CR16","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s11277-014-2264-3","volume":"82","author":"A Kumar","year":"2015","unstructured":"Kumar, A., & Tripathi, S. (2015). A pairing free anonymous certificateless group key agreement protocol for dynamic group. Wireless Personal Communications,82(2), 1027\u20131045.","journal-title":"Wireless Personal Communications"},{"key":"673_CR17","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.ins.2018.12.023","volume":"480","author":"Q Zhang","year":"2019","unstructured":"Zhang, Q., Wang, X., Yuan, J., Liu, L., Wang, R., Huang, H., et al. (2019). A hierarchical group key agreement protocol using orientable attributes for cloud computing. Information Sciences,480, 55\u201369.","journal-title":"Information Sciences"},{"issue":"6","key":"673_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.3633","volume":"30","author":"G Sharma","year":"2019","unstructured":"Sharma, G., Kuchta, V., Anand Sahu, R., Ellinidou, S., Bala, S., Markowitch, O., et al. (2019). A twofold group key agreement protocol for NoC-based MPSoCs. Transactions on Emerging Telecommunications Technologies,30(6), 1\u201318.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"9","key":"673_CR19","first-page":"1","volume":"26","author":"VS Naresh","year":"2019","unstructured":"Naresh, V. S., Reddi, S., & Murthy, N. V. E. S. (2019). A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks. Human-Centric Computing and Information Sciences,26(9), 1\u201332.","journal-title":"Human-Centric Computing and Information Sciences"},{"key":"673_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-1115-2","volume":"43","author":"S Kavitha","year":"2019","unstructured":"Kavitha, S., Alphonse, P. J. A., & Reddy, Y. V. (2019). An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for IoT health care system. Journal of Medical Systems,43, 1\u20136.","journal-title":"Journal of Medical Systems"},{"key":"673_CR21","first-page":"1","volume":"1","author":"S Mandal","year":"2020","unstructured":"Mandal, S., Mohanty, S., & Majhi, B. (2020). CL-AGKA: Certificateless authenticated group key agreement protocol for mobile networks. Wireless Networks,1, 1\u201321.","journal-title":"Wireless Networks"},{"issue":"2","key":"673_CR22","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1109\/TIFS.2018.2850299","volume":"14","author":"L Wu","year":"2019","unstructured":"Wu, L., Wang, J., Choo, K. K. R., & He, D. (2019). Secure key agreement and key protection for mobile device user authentication. IEEE Transactions on Information Forensics and Security,14(2), 319\u2013330.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"673_CR23","unstructured":"Miracl Cryptographic Library. Multiprecision integer and rational arithmetic cryptographic library. Available: https:\/\/github.com\/miracl\/MIRACL. Accessed 10 Oct 2018."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-020-00673-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-020-00673-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-020-00673-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T23:47:56Z","timestamp":1620085676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-020-00673-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,4]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["673"],"URL":"https:\/\/doi.org\/10.1007\/s11235-020-00673-x","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,4]]},"assertion":[{"value":"4 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}