{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T16:43:00Z","timestamp":1761324180154,"version":"3.44.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,9,24]],"date-time":"2018-09-24T00:00:00Z","timestamp":1537747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"The science and technology programs of SGCC"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11276-018-1839-4","type":"journal-article","created":{"date-parts":[[2018,9,24]],"date-time":"2018-09-24T12:59:28Z","timestamp":1537793968000},"page":"913-924","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A heterogeneous user authentication and key establishment for mobile client\u2013server environment"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6289-1265","authenticated-orcid":false,"given":"Fagen","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiye","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuyang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Jin","sequence":"additional","affiliation":[]},{"given":"SK Hafizul","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,24]]},"reference":[{"issue":"11","key":"1839_CR1","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1002\/sec.1419","volume":"9","author":"Y Lu","year":"2016","unstructured":"Lu, Y., Li, L., Peng, H., & Yang, Y. (2016). Robust anonymous two-factor authenticated key exchange scheme for mobile client\u2013server environment. Security and Communication Networks, 9(11), 1331\u20131339.","journal-title":"Security and Communication Networks"},{"issue":"3","key":"1839_CR2","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/JSYST.2013.2284696","volume":"9","author":"Y Najaflou","year":"2015","unstructured":"Najaflou, Y., Jedari, B., Xia, F., Yang, L. T., & Obaidat, M. S. (2015). Safety challenges and solutions in mobile social networks. IEEE Systems Journal, 9(3), 834\u2013854.","journal-title":"IEEE Systems Journal"},{"issue":"3","key":"1839_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TCSS.2016.2519819","volume":"2","author":"K Zhang","year":"2015","unstructured":"Zhang, K., Liang, X., Lu, R., & Shen, X. (2015). PIF: A personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks. IEEE Transactions on Computational Social Systems, 2(3), 41\u201352.","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"3","key":"1839_CR4","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/COMST.2014.2371813","volume":"17","author":"X Hu","year":"2015","unstructured":"Hu, X., Chu, T. H. S., Leung, V. C. M., Ngai, E. C. H., Kruchten, P., & Chan, H. C. B. (2015). A survey on mobile social networks: Applications, platforms, system architectures, and future research directions. IEEE Communications Surveys Tutorials, 17(3), 1557\u20131581.","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"7","key":"1839_CR5","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.1109\/TIFS.2016.2541633","volume":"11","author":"M Senftleben","year":"2016","unstructured":"Senftleben, M., Barroso, A., Bucicoiu, M., Hollick, M., Katzenbeisser, S., & Tews, E. (2016). On the privacy and performance of mobile anonymous microblogging. IEEE Transactions on Information Forensics and Security, 11(7), 1578\u20131591.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1839_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40657-7","volume-title":"Introduction to public key infrastructures","author":"JA Buchmann","year":"2013","unstructured":"Buchmann, J. A., Karatsiolis, E., & Wiesmaier, A. (2013). Introduction to public key infrastructures. Berlin: Springer."},{"issue":"3","key":"1839_CR7","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh, D., & Franklin, M. (2003). Identity-based encryption from the weil pairing. SIAM Journal on Computing, 32(3), 586\u2013615.","journal-title":"SIAM Journal on Computing"},{"key":"1839_CR8","first-page":"490","volume-title":"Advances in cryptology-EUROCRYPT\u201991. Lecture notes in computer science","author":"M Girault","year":"1991","unstructured":"Girault, M. (1991). Self-certified public keys. In D. Davies (Ed.), Advances in cryptology-EUROCRYPT\u201991. Lecture notes in computer science (Vol. 547, pp. 490\u2013497). Berlin: Springer."},{"issue":"3\u20134","key":"1839_CR9","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"JH Yang","year":"2009","unstructured":"Yang, J. H., & Chang, C. C. (2009). An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Computers & Security, 28(3\u20134), 138\u2013143.","journal-title":"Computers & Security"},{"issue":"2","key":"1839_CR10","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120\u2013126.","journal-title":"Communications of the ACM"},{"key":"1839_CR11","doi-asserted-by":"crossref","unstructured":"Yoon, E. J., & Yoo, K. Y. (2009). Robust ID-based remote mutual authentication with key agreement scheme for mobile devices on ECC. In International conference on computational science and engineering (CSE \u201909) (Vol. 2, pp. 633\u2013640).","DOI":"10.1109\/CSE.2009.363"},{"issue":"2","key":"1839_CR12","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/s11227-013-0962-3","volume":"66","author":"CH Chou","year":"2013","unstructured":"Chou, C. H., Tsai, K. Y., & Lu, C. F. (2013). Two ID-based authenticated schemes with key agreement for mobile environments. The Journal of Supercomputing, 66(2), 973\u2013988.","journal-title":"The Journal of Supercomputing"},{"issue":"1","key":"1839_CR13","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11227-014-1170-5","volume":"69","author":"M Farash","year":"2014","unstructured":"Farash, M., & Attari, M. (2014). A secure and efficient identity-based authenticated key exchange protocol for mobile client\u2013server networks. The Journal of Supercomputing, 69(1), 395\u2013411.","journal-title":"The Journal of Supercomputing"},{"issue":"11","key":"1839_CR14","doi-asserted-by":"publisher","first-page":"4015","DOI":"10.1007\/s11227-015-1496-7","volume":"71","author":"RH Shi","year":"2015","unstructured":"Shi, R. H., Zhong, H., & Zhang, S. (2015). Comments on two schemes of identity-based user authentication and key agreement for mobile client\u2013server networks. The Journal of Supercomputing, 71(11), 4015\u20134018.","journal-title":"The Journal of Supercomputing"},{"issue":"16","key":"1839_CR15","doi-asserted-by":"publisher","first-page":"e3341","DOI":"10.1002\/dac.3341","volume":"30","author":"M Qi","year":"2017","unstructured":"Qi, M., & Chen, J. (2017). An efficient two-party authentication key exchange protocol for mobile environment. International Journal of Communication Systems, 30(16), e3341.","journal-title":"International Journal of Communication Systems"},{"issue":"9","key":"1839_CR16","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1016\/j.comnet.2009.12.008","volume":"54","author":"TY Wu","year":"2010","unstructured":"Wu, T. Y., & Tseng, Y. M. (2010). An efficient user authentication and key exchange protocol for mobile client\u2013server environment. Computer Networks, 54(9), 1520\u20131530.","journal-title":"Computer Networks"},{"issue":"6","key":"1839_CR17","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1016\/j.adhoc.2012.01.002","volume":"10","author":"D He","year":"2012","unstructured":"He, D. (2012). An efficient remote user authentication and key agreement protocol for mobile client\u2013server environment from pairings. Ad Hoc Networks, 10(6), 1009\u20131016.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"1839_CR18","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.inffus.2010.02.001","volume":"13","author":"D He","year":"2012","unstructured":"He, D., Chen, J., & Hu, J. (2012). An ID-based client authentication with key agreement protocol for mobile client\u2013server environment on ECC with provable security. Information Fusion, 13(3), 223\u2013230.","journal-title":"Information Fusion"},{"issue":"4","key":"1839_CR19","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1016\/j.inffus.2012.12.002","volume":"14","author":"D Wang","year":"2013","unstructured":"Wang, D., & Ma, C. (2013). Cryptanalysis of a remote user authentication scheme for mobile client\u2013server environment based on ECC. Information Fusion, 14(4), 498\u2013503.","journal-title":"Information Fusion"},{"key":"1839_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0622-1","author":"A Hassan","year":"2017","unstructured":"Hassan, A., Eltayieb, N., Elhabob, R., & Li, F. (2017). An efficient certificateless user authentication and key exchange protocol for client\u2013server environment. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-017-0622-1 .","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"4","key":"1839_CR21","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1002\/dac.1268","volume":"25","author":"YH Chuang","year":"2012","unstructured":"Chuang, Y. H., & Tseng, Y. M. (2012). Towards generalized ID-based user authentication for mobile multi-server environment. International Journal of Communication Systems, 25(4), 447\u2013460.","journal-title":"International Journal of Communication Systems"},{"issue":"3","key":"1839_CR22","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1016\/j.future.2012.03.017","volume":"29","author":"YP Liao","year":"2013","unstructured":"Liao, Y. P., & Hsiao, C. M. (2013). A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients. Future Generation Computer Systems, 29(3), 886\u2013900.","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"1839_CR23","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s11227-014-1135-8","volume":"70","author":"WB Hsieh","year":"2014","unstructured":"Hsieh, W. B., & Leu, J. S. (2014). An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures. The Journal of Supercomputing, 70(1), 133\u2013148.","journal-title":"The Journal of Supercomputing"},{"issue":"1","key":"1839_CR24","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/JSYST.2016.2557850","volume":"12","author":"F Li","year":"2018","unstructured":"Li, F., Han, Y., & Jin, C. (2018). Cost-effective and anonymous access control for wireless body area networks. IEEE Systems Journal, 12(1), 747\u2013758.","journal-title":"IEEE Systems Journal"},{"issue":"3","key":"1839_CR25","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/JSYST.2012.2221897","volume":"7","author":"F Li","year":"2013","unstructured":"Li, F., Zhang, H., & Takagi, T. (2013). Efficient signcryption for heterogeneous systems. IEEE Systems Journal, 7(3), 420\u2013429.","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"1839_CR26","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 1(1), 36\u201363.","journal-title":"International Journal of Information Security"},{"key":"1839_CR27","first-page":"232","volume-title":"Advances in cryptology-CRYPTO\u201993. Lecture notes in computer science","author":"M Bellare","year":"1994","unstructured":"Bellare, M., & Rogaway, P. (1994). Entity authentication and key distribution. In D. R. Stinson (Ed.), Advances in cryptology-CRYPTO\u201993. Lecture notes in computer science (Vol. 773, pp. 232\u2013249). Berlin: Springer."},{"key":"1839_CR28","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/BFb0024447","volume-title":"Crytography and coding. Lecture notes in computer science","author":"S Blake-Wilson","year":"1997","unstructured":"Blake-Wilson, S., Johnson, D., & Menezes, A. (1997). Key agreement protocols and their security analysis. In M. Darnell (Ed.), Crytography and coding. Lecture notes in computer science (Vol. 1355, pp. 30\u201345). Berlin: Springer."},{"key":"1839_CR29","doi-asserted-by":"crossref","unstructured":"Chen, L., & Kudla, C. (2003). Identity based authenticated key agreement protocols from pairings. In 16th IEEE computer security foundations workshop (CSFW\u201903) (pp. 219\u2013233).","DOI":"10.1109\/CSFW.2003.1212715"},{"key":"1839_CR30","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-30574-3_18","volume-title":"Topics in cryptology-CT-RSA 2005. Lecture notes in computer science","author":"N McCullagh","year":"2005","unstructured":"McCullagh, N., & Barreto, P. S. (2005). A new two-party identity-based authenticated key agreement. In A. Menezes (Ed.), Topics in cryptology-CT-RSA 2005. Lecture notes in computer science (Vol. 3376, pp. 262\u2013274). Berlin: Springer."},{"key":"1839_CR31","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/978-3-540-77272-9_17","volume-title":"Cryptography and coding. Lecture notes in computer science","author":"MC Gorantla","year":"2007","unstructured":"Gorantla, M. C., Boyd, C., & Gonz\u00e1lez Nieto, J. M. (2007). On the connection between signcryption and one-pass key establishment. In S. Galbraith (Ed.), Cryptography and coding. Lecture notes in computer science (Vol. 4887, pp. 277\u2013301). Berlin: Springer."},{"key":"1839_CR32","doi-asserted-by":"crossref","unstructured":"De Caro, A., & Iovino, V. (2011). jPBC: Java pairing based cryptography. In 16th IEEE symposium on computers and communications (ISCC 2011), Kerkyra, Greece (pp. 850\u2013855).","DOI":"10.1109\/ISCC.2011.5983948"},{"issue":"4","key":"1839_CR33","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.1109\/TVT.2012.2186992","volume":"61","author":"KA Shim","year":"2012","unstructured":"Shim, K. A. (2012). CPAS: An efficient conditional privacy-preserving authentication scheme for vehicular sensor networks. IEEE Transactions on Vehicular Technology, 61(4), 1874\u20131883.","journal-title":"IEEE Transactions on Vehicular Technology"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-018-1839-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-018-1839-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-018-1839-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T19:10:21Z","timestamp":1755630621000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-018-1839-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,24]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["1839"],"URL":"https:\/\/doi.org\/10.1007\/s11276-018-1839-4","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2018,9,24]]},"assertion":[{"value":"24 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}