{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:06Z","timestamp":1762004886183,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T00:00:00Z","timestamp":1495152000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s11277-017-4302-4","type":"journal-article","created":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T09:30:47Z","timestamp":1495186247000},"page":"2351-2387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks"],"prefix":"10.1007","volume":"96","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6903-0361","authenticated-orcid":false,"given":"Vanga","family":"Odelu","sequence":"first","affiliation":[]},{"given":"Soumya","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Samiran","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,19]]},"reference":[{"key":"4302_CR1","unstructured":"Advanced Encryption Standard, U.S. Department of Commerce, November 2001. \n                        http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf\n                        \n                    . Accessed Nov 2010."},{"key":"4302_CR2","unstructured":"AVISPA. Automated Validation of Internet Security Protocols and Applications. \n                        http:\/\/www.avispa-project.org\/\n                        \n                    . Accessed Aug 2015."},{"key":"4302_CR3","unstructured":"AVISPA. AVISPA Web Tool. \n                        http:\/\/www.avispa-project.org\/web-interface\/expert.php\/\n                        \n                    . Accessed Aug 2015."},{"key":"4302_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Boldyreva, A., & Micali, S. (2000). Public-key encryption in a multi-user setting: Security proofs and improvements. In Advances in cryptology\u2014EUROCRYPT 2000 (pp. 259\u2013274). Springer.","DOI":"10.1007\/3-540-45539-6_18"},{"key":"4302_CR5","unstructured":"Bellare, M., Canetti, R., & Krawczyk, H. (1998). A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing (STOC) (pp. 419\u2013428). Dallas: ACM."},{"issue":"1","key":"4302_CR6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"key":"4302_CR7","doi-asserted-by":"crossref","unstructured":"Canetti, R., & Krawczyk, H. (2001). Analysis of key-exchange protocols and their use for building secure channels. In Advances in cryptology\u2014EUROCRYPT 2001 (pp. 453\u2013474). Innsbruck: Springer.","DOI":"10.1007\/3-540-44987-6_28"},{"issue":"4","key":"4302_CR8","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.comcom.2008.11.032","volume":"34","author":"C Chang","year":"2009","unstructured":"Chang, C., Lee, C., & Chiu, Y. (2009). Enhanced authentication scheme with anonymity for roaming service in global networks. Computer Communications, 34(4), 611\u2013618.","journal-title":"Computer Communications"},{"issue":"3","key":"4302_CR9","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A. K. (2011). Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Information Security, 5(3), 145\u2013151.","journal-title":"IET Information Security"},{"issue":"1\u20132","key":"4302_CR10","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s13119-012-0009-8","volume":"2","author":"AK Das","year":"2013","unstructured":"Das, A. K. (2013). A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Networking Science, 2(1\u20132), 12\u201327.","journal-title":"Networking Science"},{"key":"4302_CR11","doi-asserted-by":"crossref","unstructured":"Das, A. K. (2016). A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Networking and Applications, 9(1), 223\u2013244.","DOI":"10.1007\/s12083-014-0324-9"},{"issue":"3","key":"4302_CR12","doi-asserted-by":"crossref","first-page":"9948","DOI":"10.1007\/s10916-013-9948-1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A. K., & Goswami, A. (2013). A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Journal of Medical Systems, 37(3), 9948.","journal-title":"Journal of Medical Systems"},{"key":"4302_CR13","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A. K., Paul, N. R., & Tripathy, L. (2012). Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences, 209, 80\u201392.","journal-title":"Information Sciences"},{"issue":"3","key":"4302_CR14","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1007\/s11277-015-2288-3","volume":"82","author":"AK Das","year":"2015","unstructured":"Das, A. K. (2015). A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Personal Communications, 82(3), 1377\u20131404.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"4302_CR15","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., & Yao, A. C. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29(2), 198\u2013208.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"5","key":"4302_CR16","doi-asserted-by":"crossref","first-page":"2007","DOI":"10.1109\/TIT.2008.920224","volume":"54","author":"R Dutta","year":"2008","unstructured":"Dutta, R., & Barua, R. (2008). Provably secure constant round contributory group key agreement in dynamic setting. IEEE Transactions on Information Theory, 54(5), 2007\u20132025.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"4302_CR17","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1007\/s11277-015-2344-z","volume":"82","author":"P Gope","year":"2015","unstructured":"Gope, P., & Hwang, T. (2015). Enhanced secure mutual authentication, and key agreement scheme preserving user anonymity in global mobile networks. Wireless Personal Communications, 82(4), 2231\u20132245.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"4302_CR18","doi-asserted-by":"crossref","first-page":"1370","DOI":"10.1109\/JSYST.2015.2416396","volume":"10","author":"P Gope","year":"2016","unstructured":"Gope, P., & Hwang, T. (2016). Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks. IEEE Systems Journal, 10(4), 1370\u20131379.","journal-title":"IEEE Systems Journal"},{"issue":"3","key":"4302_CR19","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367\u2013374.","journal-title":"Computer Communications"},{"issue":"2","key":"4302_CR20","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11277-013-1282-x","volume":"74","author":"D He","year":"2014","unstructured":"He, D., Zhang, Y., & Chen, J. (2014). Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications, 74(2), 229\u2013243.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"4302_CR21","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming services in global mobility networks. Wireless Personal Communications, 68(4), 1477\u20131491.","journal-title":"Wireless Personal Communications"},{"key":"4302_CR22","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Advances in cryptology\u2014CRYPTO\u201999 (pp. 388\u2013397). California: Springer.","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"4302_CR23","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C Lee","year":"2006","unstructured":"Lee, C., Hwang, M., & Liao, I. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683\u20131686.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"1\u20132","key":"4302_CR24","first-page":"35","volume":"55","author":"CT Li","year":"2012","unstructured":"Li, C. T., & Lee, C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 55(1\u20132), 35\u201344.","journal-title":"Mathematical and Computer Modelling"},{"key":"4302_CR25","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J.-W., Ma, J., Wang, W.-D., & Liu, C.-L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34, 73\u201379.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"4302_CR26","doi-asserted-by":"crossref","first-page":"1487","DOI":"10.1007\/s11277-015-2699-1","volume":"84","author":"I Memon","year":"2015","unstructured":"Memon, I., Hussain, I., Akhtar, R., & Chen, G. (2015). Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme. Wireless Personal Communications, 84(2), 1487\u20131508.","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"4302_CR27","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., & Sloan, R. H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers, 51(5), 541\u2013552.","journal-title":"IEEE Transactions on Computers"},{"key":"4302_CR28","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.mcm.2011.04.036","volume":"55","author":"H Mun","year":"2012","unstructured":"Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55, 214\u2013222.","journal-title":"Mathematical and Computer Modelling"},{"issue":"480","key":"4302_CR29","doi-asserted-by":"crossref","first-page":"354","DOI":"10.2307\/3619777","volume":"77","author":"RWD Nickalls","year":"1993","unstructured":"Nickalls, R. W. D. (1993). A new approach to solving the cubic: Cardan\u2019s solution revealed. The Mathematical Gazette, 77(480), 354\u2013359.","journal-title":"The Mathematical Gazette"},{"key":"4302_CR30","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.ins.2013.10.022","volume":"269","author":"V Odelu","year":"2014","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2014). A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Information Sciences, 269, 270\u2013285.","journal-title":"Information Sciences"},{"issue":"9","key":"4302_CR31","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953\u20131966.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"4302_CR32","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/s11277-015-2604-y","volume":"84","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2015). DMAMA: Dynamic migration access control mechanism for mobile agents in distributed networks. Wireless Personal Communications, 84(1), 207\u2013230.","journal-title":"Wireless Personal Communications"},{"key":"4302_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2721-7","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2015). An effective and robust secure remote user authenticated key agreement scheme using smart cards in wireless communication systems. Wireless Personal Communications,. doi:\n                        10.1007\/s11277-015-2721-7\n                        \n                    .","journal-title":"Wireless Personal Communications"},{"key":"4302_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2866-4","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2015). A secure and scalable group access control scheme for wireless sensor networks. Wireless Personal Communications,. doi:\n                        10.1007\/s11277-015-2866-4\n                        \n                    .","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"4302_CR35","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/1880022.1880027","volume":"13","author":"P Sarkar","year":"2010","unstructured":"Sarkar, P. (2010). A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security, 13(4), 33.","journal-title":"ACM Transactions on Information and System Security"},{"key":"4302_CR36","unstructured":"Stallings, W. (2006). Cryptography and network security: Principles and practices (3rd ed.). Pearson Education India."},{"key":"4302_CR37","unstructured":"von Oheimb, D. (2005). The high-level protocol specification language HLPSL developed in the EU project AVISPA. In Proceedings of APPSEM 2005 Workshop."},{"issue":"4","key":"4302_CR38","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang, D., He, D., Wang, P., & Chu, C. (2015). Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Transactions on Dependable and Secure Computing, 12(4), 428\u2013442.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"4302_CR39","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1007\/s11277-013-1243-4","volume":"73","author":"F Wen","year":"2013","unstructured":"Wen, F., Susilo, W., & Yang, G. (2013). A secure and effective user authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 73(3), 993\u20131004.","journal-title":"Wireless Personal Communications"},{"issue":"10","key":"4302_CR40","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/LCOMM.2008.080283","volume":"12","author":"C Wu","year":"2008","unstructured":"Wu, C., Lee, W., & Tsaur, W. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722\u2013723.","journal-title":"IEEE Communications Letters"},{"issue":"4","key":"4302_CR41","doi-asserted-by":"crossref","first-page":"2325","DOI":"10.1007\/s10916-011-9700-7","volume":"36","author":"S Wu","year":"2012","unstructured":"Wu, S., & Chen, K. (2012). An efficient key-management scheme for hierarchical access control in e-medicine system. Journal of Medical Systems, 36(4), 2325\u20132337.","journal-title":"Journal of Medical Systems"},{"issue":"1","key":"4302_CR42","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11277-014-1750-y","volume":"78","author":"D Zhao","year":"2014","unstructured":"Zhao, D., Peng, H., Li, L., & Yang, Y. (2014). A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Personal Communications, 78(1), 247\u2013269.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"4302_CR43","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.comnet.2010.08.008","volume":"55","author":"T Zhou","year":"2011","unstructured":"Zhou, T., & Xu, J. (2011). Provable secure authentication protocol with anonymity for roaming service in global mobility networks. Computer Networks, 55(1), 205\u2013213.","journal-title":"Computer Networks"},{"issue":"1","key":"4302_CR44","first-page":"230","volume":"55","author":"J Zhu","year":"2004","unstructured":"Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 55(1), 230\u2013234.","journal-title":"IEEE Transactions on Consumer Electronics"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4302-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4302-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4302-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,29]],"date-time":"2017-08-29T05:57:06Z","timestamp":1503986226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4302-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,19]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["4302"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4302-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,5,19]]}}}