{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:43:46Z","timestamp":1740123826893,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:00:00Z","timestamp":1643241600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:00:00Z","timestamp":1643241600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"General Project of Education Department in Sichuan","award":["18ZB0485"],"award-info":[{"award-number":["18ZB0485"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11276-021-02820-x","type":"journal-article","created":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:03:17Z","timestamp":1643241797000},"page":"745-763","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An improved anonymous DoS-resistant authentication protocol in smart city"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7005-5416","authenticated-orcid":false,"given":"Rui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yongcong","family":"Mou","sequence":"additional","affiliation":[]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,27]]},"reference":[{"issue":"2","key":"2820_CR1","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s11277-016-3891-7","volume":"95","author":"MU Farooq","year":"2016","unstructured":"Farooq, M. U., Waseem, M., Qadri, M. T., & Waqar, M. (2016). Understanding 5g wireless cellular network: Challenges, emerging research directions and enabling technologies. Wireless Personal Communications, 95(2), 261\u2013285.","journal-title":"Wireless Personal Communications"},{"issue":"12","key":"2820_CR2","first-page":"3619","volume":"5","author":"G Akpakwu","year":"2017","unstructured":"Akpakwu, G., Silva, B., Hancke, G. P., & Abu-Mahfouz, A. M. (2017). A survey on 5g networks for the internet of things: Communication technologies and challenges. IEEE Access, 5(12), 3619\u20133647.","journal-title":"IEEE Access"},{"issue":"4","key":"2820_CR3","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1007\/s11277-015-2480-5","volume":"81","author":"P Lynggaard","year":"2015","unstructured":"Lynggaard, P., & Skouby, K. E. (2015). Deploying 5g-technologies in smart city and smart home wireless sensor networks with interferences. Wireless Personal Communications, 81(4), 1399\u20131413.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"2820_CR4","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MCOM.2013.6461199","volume":"51","author":"D He","year":"2013","unstructured":"He, D., Chen, C., Bu, J., Chan, S., & Yan, Z. (2013). Security and efficiency in roaming services for wireless networks: Challenges, approaches, and prospects. Communications Magazine IEEE, 51(2), 142\u2013150.","journal-title":"Communications Magazine IEEE"},{"issue":"21","key":"2820_CR5","first-page":"231","volume":"51","author":"J Zhu","year":"2004","unstructured":"Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 51(21), 231\u2013235.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"2820_CR6","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s11277-010-0033-5","volume":"61","author":"D He","year":"2011","unstructured":"He, D., Chan, S., Chen, C., Bu, J., & Fan, R. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465\u2013476.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"2820_CR7","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68(4), 1477\u20131491.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"2820_CR8","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11277-014-1750-y","volume":"78","author":"F Wen","year":"2014","unstructured":"Wen, F., Susilo, W., & Yang, G. (2014). A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247\u2013269.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"2820_CR9","doi-asserted-by":"publisher","first-page":"e3019","DOI":"10.1002\/dac.3019","volume":"30","author":"MS Farash","year":"2015","unstructured":"Farash, M. S., Chaudhry, S. A., Heydari, M., Sadough, S. M. S., Kumari, S., & Khan, M. K. (2015). A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. International Journal of Communication Systems, 30(4), e3019.","journal-title":"International Journal of Communication Systems"},{"issue":"4","key":"2820_CR10","doi-asserted-by":"publisher","first-page":"2231","DOI":"10.1007\/s11277-015-2344-z","volume":"82","author":"P Gope","year":"2015","unstructured":"Gope, P., & Hwang, T. (2015). Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks. Wireless Personal Communications, 82(4), 2231\u20132245.","journal-title":"Wireless Personal Communications"},{"issue":"10","key":"2820_CR11","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.3390\/s16101653","volume":"16","author":"Y Chung","year":"2016","unstructured":"Chung, Y., Choi, S., Lee, Y., Park, N., & Won, D. (2016). An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks. Sensors, 16(10), 1653.","journal-title":"Sensors"},{"issue":"17","key":"2820_CR12","doi-asserted-by":"publisher","first-page":"4192","DOI":"10.1002\/sec.1598","volume":"9","author":"M Karuppiah","year":"2016","unstructured":"Karuppiah, M., Kumari, S., Das, A. K., Li, X., Wu, F., & Basu, S. (2016). A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. Security & Communication Networks, 9(17), 4192\u20134209.","journal-title":"Security & Communication Networks"},{"issue":"1","key":"2820_CR13","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11277-014-1750-y","volume":"78","author":"D Zhao","year":"2014","unstructured":"Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247\u2013269.","journal-title":"Wireless Personal Communications"},{"issue":"1\u20132","key":"2820_CR14","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.mcm.2011.04.036","volume":"55","author":"H Mun","year":"2012","unstructured":"Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical & Computer Modelling, 55(1\u20132), 214\u2013222.","journal-title":"Mathematical & Computer Modelling"},{"issue":"6","key":"2820_CR15","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1002\/sec.816","volume":"7","author":"F Wen","year":"2014","unstructured":"Wen, F., Susilo, W., & Yang, G. (2014). A robust smart card-based anonymous user authentication protocol for wireless communications. Security & Communication Networks, 7(6), 987\u2013993.","journal-title":"Security & Communication Networks"},{"issue":"1\u20132","key":"2820_CR16","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s13119-012-0009-8","volume":"2","author":"AK Das","year":"2013","unstructured":"Das, A. K. (2013). A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Networking Science, 2(1\u20132), 12\u201327.","journal-title":"Networking Science"},{"issue":"2","key":"2820_CR17","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1587\/transfun.E94.A.860","volume":"E94\u2013A","author":"M Kang","year":"2011","unstructured":"Kang, M., Rhee, H. S., & Choi, J. .-Y. (2011). Improved user authentication scheme with user anonymity for wireless communications. IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences, E94\u2013A(2), 860\u2013864.","journal-title":"IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences"},{"issue":"3","key":"2820_CR18","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1007\/s11277-015-2524-x","volume":"84","author":"M Karuppiah","year":"2015","unstructured":"Karuppiah, M., & Saravanan, R. (2015). A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wireless Personal Communications, 84(3), 2055\u20132078.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"2820_CR19","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s11277-016-3672-3","volume":"93","author":"M Karuppiah","year":"2017","unstructured":"Karuppiah, M., Kumari, S., Li, X., Wu, F., Das, A. K., Khan, M. K., Saravanan, R., & Basu, S. (2017). A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications An International Journal, 93(2), 383\u2013407.","journal-title":"Wireless Personal Communications An International Journal"},{"issue":"4","key":"2820_CR20","doi-asserted-by":"publisher","first-page":"1370","DOI":"10.1109\/JSYST.2015.2416396","volume":"10","author":"P Gope","year":"2016","unstructured":"Gope, P., & Hwang, T. (2016). Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Systems Journal, 10(4), 1370\u20131379.","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"2820_CR21","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.comnet.2010.08.008","volume":"55","author":"T Zhou","year":"2011","unstructured":"Zhou, T., & Xu, J. (2011). Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Computer Networks, 55(1), 205\u2013213.","journal-title":"Computer Networks"},{"issue":"C","key":"2820_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2015.12.003","volume":"62","author":"P Gope","year":"2016","unstructured":"Gope, P., & Hwang, T. (2016). An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of Network & Computer Applications, 62(C), 1\u20138.","journal-title":"Journal of Network & Computer Applications"},{"issue":"3","key":"2820_CR23","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367\u2013374.","journal-title":"Computer Communications"},{"issue":"16","key":"2820_CR24","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1002\/sec.1558","volume":"9","author":"F Wu","year":"2016","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X., Das, A. K., Khan, M. K., Karuppiah, M., & Baliyan, R. (2016). A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Security & Communication Networks, 9(16), 3527\u20133542.","journal-title":"Security & Communication Networks"},{"key":"2820_CR25","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.jnca.2018.02.003","volume":"107","author":"G Xu","year":"2018","unstructured":"Xu, G., Liu, J., Lu, Y., Zeng, X., Zhang, Y., & Li, X. (2018). A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. Journal of Network and Computer Application, 107, 83\u201392.","journal-title":"Journal of Network and Computer Application"},{"issue":"2","key":"2820_CR26","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1007\/s10586-017-0783-x","volume":"20","author":"SA Chaudhry","year":"2017","unstructured":"Chaudhry, S. A., Albeshri, A., Xiong, N., Lee, C., & Shon, T. (2017). A privacy preserving authentication scheme for roaming in ubiquitous networks. Cluster Computing, 20(2), 1223\u20131236.","journal-title":"Cluster Computing"},{"issue":"3","key":"2820_CR27","doi-asserted-by":"publisher","first-page":"e0193366","DOI":"10.1371\/journal.pone.0193366","volume":"13","author":"H Lee","year":"2018","unstructured":"Lee, H., Lee, D., Moon, J., Jung, J., Kang, D., Kim, H., & Won, D. (2018). An improved anonymous authentication scheme for roaming in ubiquitous networks. Plos One, 13(3), e0193366.","journal-title":"Plos One"},{"issue":"4","key":"2820_CR28","doi-asserted-by":"publisher","first-page":"e0196061","DOI":"10.1371\/journal.pone.0196061","volume":"13","author":"BA Fraz","year":"2018","unstructured":"Fraz, B. A., ul, H. K. M., Anwar, G., Ashraf, C. S., Imran, K., Usman, A. M., & Khurram, K. M. (2018). A lightweight and secure two factor anonymous authentication protocol for global mobility networks. Plos One, 13(4), e0196061.","journal-title":"Plos One"},{"issue":"3","key":"2820_CR29","first-page":"1","volume":"94","author":"CC Lee","year":"2016","unstructured":"Lee, C. C., Lai, Y. M., Chen, C. T., & Chen, S. D. (2016). Advanced secure anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 94(3), 1\u201316.","journal-title":"Wireless Personal Communications"},{"key":"2820_CR30","doi-asserted-by":"publisher","first-page":"2665","DOI":"10.1007\/s11277-017-4629-x","volume":"97","author":"R Chen","year":"2017","unstructured":"Chen, R., & Peng, D. (2017). An anonymous authentication scheme with the enhanced security for wireless communications. Wireless Personal Communications, 97, 2665\u20132682.","journal-title":"Wireless Personal Communications"},{"issue":"10","key":"2820_CR31","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1002\/sec.601","volume":"7","author":"J Niu","year":"2012","unstructured":"Niu, J., & Li, X. (2012). A novel user authentication scheme with anonymity for wireless communications. Security & Communication Networks, 7(10), 1467\u20131476.","journal-title":"Security & Communication Networks"},{"key":"2820_CR32","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.jisa.2017.12.002","volume":"38","author":"R Madhusudhan","year":"2018","unstructured":"Madhusudhan, R., & Shashidhara. (2018). A secure and lightweight authentication scheme for roaming service in global mobile networks. Journal of Information Security & Applications, 38, 96\u2013110.","journal-title":"Journal of Information Security & Applications"},{"key":"2820_CR33","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.compeleceng.2018.03.030","volume":"68","author":"F Wu","year":"2018","unstructured":"Wu, F., Li, X., Xu, L., Kumari, S., & Sangaiah, A. K. (2018). A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Computers & Electrical Engineering, 68, 107\u2013118.","journal-title":"Computers & Electrical Engineering"},{"key":"2820_CR34","doi-asserted-by":"publisher","first-page":"39689","DOI":"10.1109\/ACCESS.2020.2976161","volume":"8","author":"J Li","year":"2020","unstructured":"Li, J., Zhang, Z., Hui, L., & Zhou, Z. (2020). A novel message authentication scheme with absolute privacy for the internet of things networks. IEEE Access, 8, 39689\u201339699.","journal-title":"IEEE Access"},{"issue":"10","key":"2820_CR35","doi-asserted-by":"publisher","first-page":"10277","DOI":"10.1109\/JIOT.2020.3004300","volume":"7","author":"Y Aydin","year":"2020","unstructured":"Aydin, Y., Kurt, G. K., Ozdemir, E., & Yanikomeroglu, H. (2020). A flexible and lightweight group authentication scheme. IEEE Internet of Things Journal, 7(10), 10277\u201310287.","journal-title":"IEEE Internet of Things Journal"},{"key":"2820_CR36","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.comcom.2020.01.077","volume":"153","author":"MR Kumar","year":"2020","unstructured":"Kumar, M. R., & Parthasarathy, V. (2020). A secure fuzzy extractor based biometric key authentication scheme for body sensor network in internet of medical things. Computer Communications, 153, 545\u2013552.","journal-title":"Computer Communications"},{"issue":"2","key":"2820_CR37","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1109\/JSAC.2020.3020599","volume":"39","author":"BD Deebak","year":"2020","unstructured":"Deebak, B. D., & Al-Turjman, F. (2020). Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things. IEEE Journal on Selected Areas in Communications, 39(2), 346\u2013360.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"2820_CR38","first-page":"1","volume":"40","author":"Z Ying","year":"2016","unstructured":"Ying, Z., Chiou, S. Y., & Liu, J. (2016). Improvement of a privacy authentication scheme based on cloud for medical environment. Journal of Medical Systems, 40(4), 1\u201315.","journal-title":"Journal of Medical Systems"},{"issue":"9","key":"2820_CR39","first-page":"7727","volume":"8","author":"S Jangirala","year":"2020","unstructured":"Jangirala, S., Das, A. K., Wazid, M., & Vasilakos, A. V. (2020). Designing secure user authentication protocol for big data collection in IoT-based intelligent transportation system. IEEE Internet of Things Journal, 8(9), 7727\u20137744.","journal-title":"IEEE Internet of Things Journal"},{"issue":"7","key":"2820_CR40","doi-asserted-by":"publisher","first-page":"7234","DOI":"10.1109\/TVT.2020.2976960","volume":"69","author":"G Bansal","year":"2020","unstructured":"Bansal, G., Chamola, V., Kumar, N., Guizani, M., & Sikdar, B. (2020). Lightweight mutual authentication protocol for v2g using physical unclonable function. IEEE Transactions on Vehicular Technology, 69(7), 7234\u20137246.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"12","key":"2820_CR41","doi-asserted-by":"publisher","first-page":"15068","DOI":"10.1109\/TVT.2020.3033060","volume":"69","author":"Tejasvi Alladi","year":"2020","unstructured":"Alladi, Tejasvi, Naren, Gaurang Bansal, Chamola, Vinay, & Guizani, Mohsen. (2020). Secauthuav: A novel authentication scheme for UAV-ground station and UAV-UAV communication. IEEE Transactions on Vehicular Technology, 69(12), 15068\u201315077.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2820_CR42","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.comcom.2020.05.025","volume":"160","author":"T Alladi","year":"2020","unstructured":"Alladi, T., Chamola, V., Naren, & Kumar, N. (2020). Parth: A two-stage lightweight mutual authentication protocol for UAV surveillance networks. Computer Communications, 160, 81\u201390.","journal-title":"Computer Communications"},{"issue":"2","key":"2820_CR43","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/JSAC.2020.3020605","volume":"39","author":"T Alladi","year":"2020","unstructured":"Alladi, T., Naren, N., & Chamola, V. (2020). Harci: A two-way authentication protocol for three entity healthcare IoT networks. IEEE Journal on Selected Areas in Communications, 39(2), 361\u2013369.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"2820_CR44","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1007\/s11276-020-02524-8","volume":"27","author":"D Adu-Gyamfi","year":"2021","unstructured":"Adu-Gyamfi, D., Zhang, F., & Takyi, A. (2021). Anonymising group data sharing in opportunistic mobile social networks. Wireless Networks, 27(3), 1477\u20131490.","journal-title":"Wireless Networks"},{"issue":"C","key":"2820_CR45","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","volume":"73","author":"D Wang","year":"2014","unstructured":"Wang, D., & Wang, P. (2014). On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Computer Networks, 73(C), 41\u201357.","journal-title":"Computer Networks"},{"issue":"12","key":"2820_CR46","first-page":"1","volume":"21","author":"L Xiong","year":"2017","unstructured":"Xiong, L., Sangaiah, A. K., Kumari, S., Fan, W., & Khan, M. K. (2017). An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city. Personal & Ubiquitous Computing, 21(12), 1\u201315.","journal-title":"Personal & Ubiquitous Computing"},{"issue":"28","key":"2820_CR47","first-page":"131","volume":"347","author":"L Hwang","year":"2019","unstructured":"Hwang, L., & Xie, Q. (2019). Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city. Neurocomputing, 347(28), 131\u2013138.","journal-title":"Neurocomputing"},{"issue":"2","key":"2820_CR48","doi-asserted-by":"publisher","first-page":"e3461","DOI":"10.1002\/dac.3461","volume":"31","author":"P Gope","year":"2017","unstructured":"Gope, P., Islam, S. H., Obaidat, M. S., Amin, R., & Vijayakumar, P. (2017). Anonymous and expeditious mobile user authentication scheme for glomonet environments. International Journal of Communication Systems, 31(2), e3461.","journal-title":"International Journal of Communication Systems"},{"key":"2820_CR49","doi-asserted-by":"crossref","unstructured":"Gope, P. (2016). Energy efficient mutual authentication and key agreement scheme with strong anonymity support for secure ubiquitious roaming services. In 11th International conference on availability, reliability and security (ARES) (pp.247\u2013252).","DOI":"10.1109\/ARES.2016.52"},{"issue":"18","key":"2820_CR50","doi-asserted-by":"publisher","first-page":"e3361","DOI":"10.1002\/dac.3361","volume":"30","author":"H Arshad","year":"2017","unstructured":"Arshad, H., & Rasoolzadegan, A. (2017). A secure authentication and key agreement scheme for roaming service with user anonymity. International Journal of Communication Systems, 30(18), e3361.","journal-title":"International Journal of Communication Systems"},{"issue":"1","key":"2820_CR51","first-page":"155","volume":"41","author":"B Hu","year":"2014","unstructured":"Hu, B., Xie, Q., Bao, M., & Dong, N. (2014). Improvement of user authentication protocol with anonymity for wireless communications. Kuwait Journal of Science, 41(1), 155\u2013169.","journal-title":"Kuwait Journal of Science"},{"issue":"8","key":"2820_CR52","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1002\/dac.1387","volume":"26","author":"D He","year":"2013","unstructured":"He, D., Chen, C., Chan, S., & Bu, J. (2013). Strong roaming authentication technique for wireless and mobile networks. International Journal of Communication Systems, 26(8), 1028\u20131037.","journal-title":"International Journal of Communication Systems"},{"key":"2820_CR53","unstructured":"Juels, A., & Brainard, J. (1999). Client puzzles: a cryptographic countermeasure against connection depletion attacks. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 1999 (pp. 151\u2013165). San Diego, California, USA."},{"issue":"1","key":"2820_CR54","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"key":"2820_CR55","doi-asserted-by":"crossref","unstructured":"Abadi, M., Blanchet, B., & Comon-Lundh, H. (2009). Models and proofs of protocol security: A progress report. In: Computer Aided Verification, 21st International Conference, CAV 2009 (pp. 35\u201349), Grenoble, France.","DOI":"10.1007\/978-3-642-02658-4_5"},{"issue":"2","key":"2820_CR56","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","volume":"16","author":"HH Kilinc","year":"2014","unstructured":"Kilinc, H. H., & Yanik, T. (2014). A survey of sip authentication and key agreement schemes. IEEE Communications Surveys & Tutorials, 16(2), 1005\u20131023.","journal-title":"IEEE Communications Surveys & Tutorials"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02820-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02820-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02820-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T09:20:03Z","timestamp":1700126403000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02820-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,27]]},"references-count":56,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["2820"],"URL":"https:\/\/doi.org\/10.1007\/s11276-021-02820-x","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2022,1,27]]},"assertion":[{"value":"8 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}