{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:11:49Z","timestamp":1758273109980},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,10,30]],"date-time":"2014-10-30T00:00:00Z","timestamp":1414627200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s11277-014-2157-5","type":"journal-article","created":{"date-parts":[[2014,10,29]],"date-time":"2014-10-29T07:34:16Z","timestamp":1414568056000},"page":"779-798","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography"],"prefix":"10.1007","volume":"81","author":[{"given":"Ming","family":"Luo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hong","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,10,30]]},"reference":[{"key":"2157_CR1","unstructured":"Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in cryptology - CRYPTO\u201984 (pp. 47\u201353). Berlin, Germany."},{"key":"2157_CR2","unstructured":"Gentry, C. (1984). Certificate-based encryption and the certificate revocation problem. In Advances in cryptology-EUROCRPYT 2003 (pp. 272\u2013293). Berlin, Germany."},{"key":"2157_CR3","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S. S., & Paterson, K.G. (2003). Certificateless public key cryptography. In Advances in cryptography-ASIACRYPT 2003 (pp. 452\u2013473). Berlin, Germany.","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"2157_CR4","doi-asserted-by":"crossref","unstructured":"Choi, K. Y., Park, J. H., Hwang, J. Y., & Lee, D. H. (2007). Efficient certificateless signature schemes. In advances in ACNS 2007 (pp. 443\u2013458). Berlin, Germany.","DOI":"10.1007\/978-3-540-72738-5_29"},{"key":"2157_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, G., & Wang, S. (2008). A certificateless signature and group signature schemes against malicious PKG. In Proceedings of 22nd international conference on advanced information networking and applications (AINA 2008), GinoWan, Okinawa, Japan.","DOI":"10.1109\/AINA.2008.84"},{"key":"2157_CR6","unstructured":"Xu, Z., Liu, X., Zhang, G. Q., & He, W. B. (2008). A certificateless signature scheme for mobilewireless cyber-physical systems. In Proceedings of the 28th international conference on distributed computing systems workshops (ICDCS\u201908), Beijing, China."},{"key":"2157_CR7","unstructured":"Mandt, T. K., & Tan, C. H. (2006). Certificateless authenticated two-party key agreement protocols. In advances in the 11th Asian computing science conference (pp. 37\u201344), Tokyo, Japan."},{"key":"2157_CR8","doi-asserted-by":"crossref","unstructured":"Luo, M., Wen, Y. Y., & Zhao, H. (2008). An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In Proceedings of the 9th international conference for young computer scientists (ICYCS\u201908), Zhang Jia Jie, Hunan, China.","DOI":"10.1109\/ICYCS.2008.311"},{"key":"2157_CR9","doi-asserted-by":"crossref","unstructured":"Lee, E. J., Lee S. E., & Yoo, K. Y. (2008). A certificateless authenticated group key agreement protocol providing forward secrecy. In Proceedings of ubiquitous multimedia computing, 2008 (UMC\u201908), Wrestpoint Hotel, Hobart, Australia.","DOI":"10.1109\/UMC.2008.32"},{"key":"2157_CR10","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn B., & Shacham, H. (2001). Short signatures from the weil pairing. In Advances in cryptology-Asiacrypt 2001 (pp. 514\u2013532). Berlin, Germany.","DOI":"10.1007\/3-540-45682-1_30"},{"key":"2157_CR11","unstructured":"Du H. Z., & Wen, Q. Y. (2007). Efficient and provably-secure certificateless short signature scheme from Bilinear Pairings. Cryptology ePrint archive, Retrieved from: http:\/\/eprint.iacr.org\/2007\/250.pdf"},{"key":"2157_CR12","doi-asserted-by":"crossref","unstructured":"Tso, R., Yi, X., & Huang, X. Y. (2008). Efficient and short certificateless signature. In Proceedings of the 7th international conference on cryptology and network security (CANS 2008), Hong-Kong, China.","DOI":"10.1007\/978-3-540-89641-8_5"},{"issue":"3","key":"2157_CR13","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.cose.2005.09.002","volume":"25","author":"ML Das","year":"2006","unstructured":"Das, M. L., Saxena, A., Gulati, V. P., & Phatak, D. B. (2006). A novel remote user authentication scheme using bilinear pairings. Computers and Security, 25(3), 184\u2013189.","journal-title":"Computers and Security"},{"key":"2157_CR14","unstructured":"Goriparthi, T., Das, M. L., Negi, A., & Saxena, A. (2006). Cryptanalysis of recently proposed remote user authentication schemes. Cryptology ePrint archive, Retrieved from: http:\/\/eprint.iacr.org\/2006\/028.pdf"},{"key":"2157_CR15","unstructured":"Giri, D., & Srivastava, P. D. (2006). An improved remote user authentication scheme with smart cards using bilinear pairings. Cryptology ePrint archive, Retrieved from: http:\/\/eprint.iacr.org\/2006\/274.pdf"},{"key":"2157_CR16","doi-asserted-by":"crossref","unstructured":"Tseng, Y. M., Wu, T. Y., & Wu, J. D. (2007). A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. In Proceedings of the 31st annual international computer software and applications conference (COMPSAC 2007), Beijing, China.","DOI":"10.1109\/COMPSAC.2007.32"},{"issue":"2","key":"2157_CR17","doi-asserted-by":"crossref","first-page":"285","DOI":"10.15388\/Informatica.2008.214","volume":"19","author":"YM Tseng","year":"2008","unstructured":"Tseng, Y. M., Wu, T. Y., & Wu, J. D. (2008). A pairing-based user authentication scheme for wireless clients with smart cards. Informatica, 19(2), 285\u2013302.","journal-title":"Informatica"},{"key":"2157_CR18","doi-asserted-by":"crossref","unstructured":"Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptology-CRYPTO 2001 (pp. 213\u2013229). Berlin, Germany.","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"3","key":"2157_CR19","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh, D., & Franklin, M. (2003). Identity based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 586\u2013615.","journal-title":"SIAM Journal on Computing"},{"key":"2157_CR20","doi-asserted-by":"crossref","unstructured":"Bellare, M., & Rogaway, P. (1993). Random oracles are practical: a paradigm for designing efficient protocols. In Proceedings of the 1st annual ACM conference on computer and communications security (ACM CCS\u201993), Fairfax, Virginia, USA.","DOI":"10.1145\/168588.168596"},{"key":"2157_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Wong, D. S., Xu, J., & Feng, D. (2006). Certificateless public-key signature: security model and efficiet construction. In advances in ACNS 2006 (pp. 293\u2013308). Berlin, Germany.","DOI":"10.1007\/11767480_20"},{"issue":"2","key":"2157_CR22","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., & Rivest, R. L. (1988). A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2), 281\u2013308.","journal-title":"SIAM Journal on Computing"},{"key":"2157_CR23","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Johnson, D., & Menezes, A. (1997). Key agreement protocols and their security analysis. In advances in the sixth IMA international conference on cryptography and coding (pp. 30\u201345). Berlin, Germany.","DOI":"10.1007\/BFb0024447"},{"key":"2157_CR24","unstructured":"Cheng, Z., Nistazakis, M., Vasiu, L. (2005). On the indistinguishability-based security model of key agreement protocols\u2014simple cases. Cryptology ePrint archive, Retrieved from: http:\/\/eprint.iacr.org\/2005\/129.pdf"},{"issue":"5","key":"2157_CR25","first-page":"2165","volume":"E88\u2013B","author":"WC Ku","year":"2005","unstructured":"Ku, W. C., & Chang, S. T. (2005). Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions on Communications, E88\u2013B(5), 2165\u20132167.","journal-title":"IEICE Transactions on Communications"},{"key":"2157_CR26","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.mcm.2006.01.015","volume":"44","author":"HT Liaw","year":"2006","unstructured":"Liaw, H. T., Lin, J. F., & Wu, W. C. (2006). An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling, 44, 223\u2013228.","journal-title":"Mathematical and Computer Modelling"},{"key":"2157_CR27","doi-asserted-by":"crossref","unstructured":"Lauther, K., & Mityagin, A. (2006). Security analysis of KEA authenticated key exchange protocol. In Advances in PKC 2006 (pp. 378\u2013394). Berlin, Germany.","DOI":"10.1007\/11745853_25"},{"key":"2157_CR28","doi-asserted-by":"crossref","unstructured":"Luo, M., Yan, Q. J., Jiang, G. Q., & Xu, J. F. (2012). An authentication and key agreement mechanism for multi-domain wireless networks using bilinear pairings. In Advances in IWIEE 2012 (pp. 2649\u20132654). Harbin, China.","DOI":"10.1016\/j.proeng.2012.01.366"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-2157-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-014-2157-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-014-2157-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T06:14:27Z","timestamp":1598422467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-014-2157-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,30]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["2157"],"URL":"https:\/\/doi.org\/10.1007\/s11277-014-2157-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,30]]}}}