{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:53:28Z","timestamp":1767725608991,"version":"build-2238731810"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,2,8]],"date-time":"2015-02-08T00:00:00Z","timestamp":1423353600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s11277-015-2344-z","type":"journal-article","created":{"date-parts":[[2015,2,7]],"date-time":"2015-02-07T04:22:36Z","timestamp":1423282956000},"page":"2231-2245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["Enhanced Secure Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Global Mobile Networks"],"prefix":"10.1007","volume":"82","author":[{"given":"Prosanta","family":"Gope","sequence":"first","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,8]]},"reference":[{"issue":"1","key":"2344_CR1","first-page":"230","volume":"50","author":"J Zhu","year":"2004","unstructured":"Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50(1), 230\u2013234.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"5","key":"2344_CR2","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C Lee","year":"2006","unstructured":"Lee, C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environment. IEEE Transactions on Industrial Electronics, 53(5), 1683\u20131687.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"10","key":"2344_CR3","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/LCOMM.2008.080283","volume":"12","author":"C Wu","year":"2008","unstructured":"Wu, C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communication Letters, 12(10), 722\u2013723.","journal-title":"IEEE Communication Letters"},{"key":"2344_CR4","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.comcom.2008.11.032","volume":"32","author":"CC Cheng","year":"2009","unstructured":"Cheng, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhance authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32, 611\u2013618.","journal-title":"Computer Communications"},{"issue":"7","key":"2344_CR5","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/LCOMM.2009.090488","volume":"13","author":"TY Youn","year":"2009","unstructured":"Youn, T. Y., Park, T. H., & Lim, J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobile networks. IEEE Communication Letters, 13(7), 471\u2013473.","journal-title":"IEEE Communication Letters"},{"key":"2344_CR6","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1109\/TWC.2008.060802","volume":"7","author":"C Tang","year":"2008","unstructured":"Tang, C., & Wu, D. O. (2008). Mobile privacy in wireless networks revisited. IEEE Transactions on Wireless Communication, 7, 1035\u20131042.","journal-title":"IEEE Transactions on Wireless Communication"},{"key":"2344_CR7","unstructured":"Lu, J., & Zhou, J. (2010). On the security of an efficient mobile authentication scheme for wireless networks, WICOM2010. 6th International Conference on Wireless Communications Networking and Mobile Computing, (pp. 23\u201325). New York: IEEE Press."},{"key":"2344_CR8","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s11277-010-0033-5","volume":"61","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Chen, C., & Bu, J. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61, 465\u2013476.","journal-title":"Wireless Personal Communications"},{"key":"2344_CR9","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wireless Personal Communications, 68, 1477\u20131491.","journal-title":"Wireless Personal Communications"},{"key":"2344_CR10","doi-asserted-by":"crossref","unstructured":"Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications. doi: 10.1007\/s11277-013-1243-4 .","DOI":"10.1007\/s11277-013-1243-4"},{"key":"2344_CR11","volume-title":"Elementary number theory and its applications","author":"K Rosen","year":"1988","unstructured":"Rosen, K. (1988). Elementary number theory and its applications. Boston: Addision Wesley."},{"key":"2344_CR12","volume-title":"Cryptography and network security principles and practice","author":"W Stalling","year":"2000","unstructured":"Stalling, W. (2000). Cryptography and network security principles and practice. New Jersey: Prentice Hall."},{"key":"2344_CR13","volume-title":"Introduction to cryptography with coding theory","author":"W Trappe","year":"2006","unstructured":"Trappe, W., & Washington, C. (2006). Introduction to cryptography with coding theory. New Jersey: Prentice Hall."},{"issue":"8","key":"2344_CR14","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1016\/j.comcom.2005.01.015","volume":"28","author":"C Chang","year":"2005","unstructured":"Chang, C., Lee, J., & Chang, Y. (2005). Efficient authentication protocols of GSM. Computer Communications, 28(8), 921\u2013928.","journal-title":"Computer Communications"},{"key":"2344_CR15","unstructured":"Lo, C. C., & Chen, Y. J. (1997). Secure communication mechanisms for GSM networks. In Proceedings of the IEEE transactions on Consumer Electronics, 45, 1074\u20131080."},{"issue":"4","key":"2344_CR16","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/s11277-005-6177-z","volume":"35","author":"TF Lee","year":"2005","unstructured":"Lee, T. F., Chang, C. C., & Hwang, T. (2005). Private authentication techniques for the global mobility network. Wireless Personal Communications, 35(4), 329\u2013336.","journal-title":"Wireless Personal Communications"},{"key":"2344_CR17","doi-asserted-by":"crossref","unstructured":"Hwang, T., & Gope, P. (2013). Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time Secrets. Wireless Personal Communications. doi: 10.1007\/s11277-013-1501-5 .","DOI":"10.1007\/s11277-013-1501-5"},{"key":"2344_CR18","unstructured":"TS 33.102: (2001). Security architecture, version 4.2.0, released 4. Third generation partnership project-technical specification group."},{"key":"2344_CR19","unstructured":"TR 33.902: (2000). Formal analysis of the 3G authentication protocol. Third generation partnership project-authentication and key agreement (AKA)."},{"key":"2344_CR20","unstructured":"Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Proc. CRYPTO\u201999, LNCS 1666 (pp. 388\u2013397). Berlin: Springer."}],"updated-by":[{"DOI":"10.1007\/s11277-015-2453-8","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T00:00:00Z","timestamp":1425340800000}}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2344-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2344-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2344-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:16:22Z","timestamp":1559380582000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2344-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,8]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["2344"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2344-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,8]]}}}