{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:17:00Z","timestamp":1757618220535,"version":"3.44.0"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s11276-025-03973-9","type":"journal-article","created":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T21:10:51Z","timestamp":1748812251000},"page":"3993-3998","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A note on \u201can efficient and provably secure authenticated key agreement scheme for mobile edge computing\u201d"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2014-6093","authenticated-orcid":false,"given":"Zhengjun","family":"Cao","sequence":"first","affiliation":[]},{"given":"Jiahua","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,2]]},"reference":[{"key":"3973_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102648","volume":"55","author":"D Mishra","year":"2020","unstructured":"Mishra, D., Dharminder, D., Yadav, P., Rao, Y., Vijayakumar, P., & Kumar, N. (2020). A provably secure dynamic id-based authenticated key agreement framework for mobile edge computing without a trusted party. Journal of Information Security and Applications, 55, Article 102648.","journal-title":"Journal of Information Security and Applications"},{"issue":"15","key":"3973_CR2","doi-asserted-by":"publisher","first-page":"2427","DOI":"10.1049\/iet-com.2019.1009","volume":"14","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Kumari, S., Obaidat, M., & Wei, F. (2020). Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing. IET Communications, 14(15), 2427\u20132433.","journal-title":"IET Communications"},{"issue":"1","key":"3973_CR3","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/JSYST.2019.2896064","volume":"14","author":"Xiaoying Jia","year":"2020","unstructured":"Jia, Xiaoying, He, Debiao, Kumar, Neeraj, & Choo, Kim-Kwang Raymond. (2020). A provably secure and efficient identity-based anonymous authentication scheme for mobile edge computing. IEEE Systems Journal, 14(1), 560\u2013571. https:\/\/doi.org\/10.1109\/JSYST.2019.2896064","journal-title":"IEEE Systems Journal"},{"issue":"2","key":"3973_CR4","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1007\/s11276-021-02844-3","volume":"28","author":"Y Wang","year":"2022","unstructured":"Wang, Y., Cai, Y., Chen, L., Lin, S., Liu, R., & Tsai, M. (2022). Reducing download delay for cooperative caching in small cell network. Wireless Networks, 28(2), 587\u2013602.","journal-title":"Wireless Networks"},{"key":"3973_CR5","doi-asserted-by":"publisher","DOI":"10.1049\/gtd2.13103","author":"M Faheem","year":"2024","unstructured":"Faheem, M., Kuusniemi, H., Eltahawy, B., Bhutta, M.S., & Raza, B. (2024). A lightweight smart contracts framework for blockchain-based secure communication in smart grid applications. IET Generation, Transmission and Distribution. https:\/\/doi.org\/10.1049\/gtd2.13103","journal-title":"IET Generation, Transmission and Distribution"},{"key":"3973_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2024.110461","volume":"54","author":"M Rakeei","year":"2024","unstructured":"Rakeei, M., & Khasawneh, M. (2024). Multilayer cyberattacks identification and classification using machine learning in internet of blockchain (iobc)-based energy networks. Data in Brief, 54, 110461.","journal-title":"Data in Brief"},{"issue":"7","key":"3973_CR7","doi-asserted-by":"publisher","first-page":"2983","DOI":"10.1007\/s11276-022-03005-w","volume":"28","author":"M Rakeei","year":"2022","unstructured":"Rakeei, M., & Moazami, F. (2022). An efficient and provably secure authenticated key agreement scheme for mobile edge computing. Wireless Networks, 28(7), 2983\u20132999.","journal-title":"Wireless Networks"},{"key":"3973_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09494-6","volume-title":"The Arithmetic of Elliptic Curves","author":"J Silverman","year":"2009","unstructured":"Silverman, J.: The Arithmetic of Elliptic Curves. Springer (2009)."},{"issue":"4","key":"3973_CR9","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s00145-004-0315-8","volume":"17","author":"Victor S. Miller","year":"2004","unstructured":"Miller, Victor S. (2004). The Weil pairing, and its efficient calculation. Journal of Cryptology, 17(4), 235\u2013261. https:\/\/doi.org\/10.1007\/s00145-004-0315-8","journal-title":"Journal of Cryptology"},{"key":"3973_CR10","first-page":"196","volume-title":"Advances in Elliptic Curve Cryptography","author":"S Galbraith","year":"2005","unstructured":"Galbraith, S. (2005). Pairings. In: Blake, I., Seroussi, G., Smart, N. (eds.) Advances in Elliptic Curve Cryptography (pp. 196\u2013197). Cambridge University Press."},{"issue":"1","key":"3973_CR11","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Yevgeniy Dodis","year":"2008","unstructured":"Dodis, Yevgeniy, Ostrovsky, Rafail, Reyzin, Leonid, & Smith, Adam. (2008). Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1), 97\u2013139. https:\/\/doi.org\/10.1137\/060651380","journal-title":"SIAM Journal on Computing"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03973-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-025-03973-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-025-03973-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T16:34:00Z","timestamp":1757176440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-025-03973-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":11,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["3973"],"URL":"https:\/\/doi.org\/10.1007\/s11276-025-03973-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2025,6,2]]},"assertion":[{"value":"29 April 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}