{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:55:16Z","timestamp":1762005316746,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61662046"],"award-info":[{"award-number":["61662046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11276-021-02547-9","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T16:08:34Z","timestamp":1611850114000},"page":"1901-1912","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Mutual heterogeneous signcryption schemes with different system parameters for 5G network slicings"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2231-3775","authenticated-orcid":false,"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yusi","family":"Pei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,1,28]]},"reference":[{"unstructured":"ITU-R Recommendation M.2083 (2015). IMT Vision-Framework and overall objectives of the future development of IMT for 2020 and beyond.","key":"2547_CR1"},{"key":"2547_CR2","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.comnet.2018.09.014","volume":"146","author":"L Tang","year":"2018","unstructured":"Tang, L., Zhao, G. F., Wang, C. M., Zhao, P. P., & Chen, Q. B. (2018). Queue-aware reliable embedding algorithm for 5G network slicing. Computer Networks, 146, 138\u2013150.","journal-title":"Computer Networks"},{"key":"2547_CR3","first-page":"1","volume":"2","author":"Z Kotulski","year":"2018","unstructured":"Kotulski, Z., Nowak, T. W., Sepczuk, M., Tunia, M., Artych, R., Bocianiak, K., et al. (2018). Towards constructive approach to end-to-end slice isolation in 5G networks. EURASIP Journal on Information Security, 2, 1\u201323.","journal-title":"EURASIP Journal on Information Security"},{"issue":"4","key":"2547_CR4","doi-asserted-by":"publisher","first-page":"2904","DOI":"10.1109\/JIOT.2017.2741580","volume":"5","author":"A Karati","year":"2018","unstructured":"Karati, A., Islam, S. H., Biswas, G. P., et al. (2018). Provably secure identity-based signcryption scheme for crowdsourced industrial internet of things environments. IEEE Internet of Things Journal, 5(4), 2904\u20132914.","journal-title":"IEEE Internet of Things Journal"},{"key":"2547_CR5","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1007\/s11277-017-4995-4","volume":"983","author":"M Luo","year":"2018","unstructured":"Luo, M., & Wan, Y. W. (2018). An enhanced certificateless signcryption in the standard model. Wireless Personal Communications, 983, 2693\u20132709.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"2547_CR6","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s12083-018-0659-8","volume":"12","author":"M Nikravan","year":"2019","unstructured":"Nikravan, M., Movaghar, A., & Hosseinzadeh, M. (2019). A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks. Peer-to-Peer Networking and Applications, 12(1), 209\u2013226.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"5","key":"2547_CR7","doi-asserted-by":"publisher","first-page":"1430","DOI":"10.1109\/TITS.2017.2722688","volume":"19","author":"M Khodaei","year":"2018","unstructured":"Khodaei, M., Jin, H., & Papadimitratos, P. (2018). SECMACE: Scalable and robust identity and credential management infrastructure in vehicular communication systems. IEEE Transactions on Intelligent Transportation Systems, 19(5), 1430\u20131444.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"3","key":"2547_CR8","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1109\/JSYST.2017.2730580","volume":"12","author":"P Ting","year":"2018","unstructured":"Ting, P., Tsai, J., & Wu, T. (2018). Signcryption method suitable for low-power iot devices in a wireless sensor network. IEEE Systems Journal, 12(3), 2385\u20132394.","journal-title":"IEEE Systems Journal"},{"key":"2547_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.actaastro.2018.05.003","volume":"149","author":"VM Olga","year":"2018","unstructured":"Olga, V. M., & Alessandro, G. (2018). Data authentication, integrity and confidentiality mechanisms for federated satellite systems. Acta Astronautica, 149, 61\u201376.","journal-title":"Acta Astronautica"},{"issue":"3","key":"2547_CR10","first-page":"557","volume":"53","author":"Y Sun","year":"2010","unstructured":"Sun, Y., & Li, H. (2010). Heterogeneous signcryption with key privacy. The Computer Journal, 53(3), 557\u2013566.","journal-title":"The Computer Journal"},{"issue":"4","key":"2547_CR11","first-page":"525","volume":"54","author":"Q Huang","year":"2011","unstructured":"Huang, Q., Wong, D. S., & Yang, G. (2011). Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. Science China Information Sciences, 54(4), 525\u2013536.","journal-title":"Science China Information Sciences"},{"issue":"3","key":"2547_CR12","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/JSYST.2012.2221897","volume":"7","author":"F Li","year":"2013","unstructured":"Li, F., Zhang, H., & Takagi, T. (2013). Efficient signcryption for heterogeneous systems. IEEE Systems Journal, 7(3), 420\u2013429.","journal-title":"IEEE Systems Journal"},{"key":"2547_CR13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0208311","author":"C Jin","year":"2018","unstructured":"Jin, C., Chen, G., Yu, C., et al. (2018). An efficient heterogeneous signcryption for smart grid. PLOS ONE. https:\/\/doi.org\/10.1371\/journal.pone.0208311.","journal-title":"PLOS ONE"},{"issue":"4","key":"2547_CR14","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1007\/s11277-016-3327-4","volume":"89","author":"F Li","year":"2016","unstructured":"Li, F., Han, Y., & Jin, C. (2016). Practical signcryption for secure communication of wireless sensor networks. Wireless Personal Communications, 89(4), 1391\u20131412.","journal-title":"Wireless Personal Communications"},{"key":"2547_CR15","doi-asserted-by":"publisher","first-page":"3141","DOI":"10.1007\/s11276-017-1524-z","volume":"24","author":"M Saeed","year":"2018","unstructured":"Saeed, M., Liu, Q., Tian, G., et al. (2018). HOOSC: Heterogeneous online\/offline signcryption for the Internet of Things. Wireless Networks, 24, 3141\u20133160.","journal-title":"Wireless Networks"},{"key":"2547_CR16","doi-asserted-by":"publisher","first-page":"7854","DOI":"10.1109\/ACCESS.2018.2797102","volume":"6","author":"JW Liu","year":"2018","unstructured":"Liu, J. W., Zhang, L. H., Sun, R., & Du, X. J. (2018). Mutual heterogeneous signcryption schemes for 5g network slicings. IEEE ACCESS, 6, 7854\u20137863.","journal-title":"IEEE ACCESS"},{"unstructured":"Miracl Cryptographic Library: Multiprecision Integer and Rational Arithmetic Cryptographic Library. Available: https:\/\/github.com\/miracl\/MIRACL.","key":"2547_CR17"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02547-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02547-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02547-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T07:34:38Z","timestamp":1619076878000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02547-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["2547"],"URL":"https:\/\/doi.org\/10.1007\/s11276-021-02547-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2021,1,28]]},"assertion":[{"value":"10 January 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}