{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T19:59:26Z","timestamp":1760385566663},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,5,24]],"date-time":"2017-05-24T00:00:00Z","timestamp":1495584000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11277-017-4452-4","type":"journal-article","created":{"date-parts":[[2017,5,24]],"date-time":"2017-05-24T09:08:16Z","timestamp":1495616896000},"page":"5881-5896","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks"],"prefix":"10.1007","volume":"96","author":[{"given":"Qi","family":"Xie","sequence":"first","affiliation":[]},{"given":"Bin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,24]]},"reference":[{"key":"4452_CR1","doi-asserted-by":"publisher","first-page":"e102747","DOI":"10.1371\/journal.pone.0102747","volume":"7","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Hu, B., Dong, N., & Wong, D. S. (2014). Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems. PLoS ONE, 7, e102747. doi:\n                        10.1371\/journal.pone.0102747\n                        \n                    .","journal-title":"PLoS ONE"},{"key":"4452_CR2","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1016\/j.adhoc.2012.01.002","volume":"10","author":"D He","year":"2012","unstructured":"He, D. (2012). An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings. Ad Hoc Networks, 10, 1009\u20131016.","journal-title":"Ad Hoc Networks"},{"key":"4452_CR3","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s11071-012-0335-0","volume":"69","author":"D He","year":"2012","unstructured":"He, D., Chen, Y., & Chen, J. (2012). Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dynamics, 69, 1149\u20131157.","journal-title":"Nonlinear Dynamics"},{"key":"4452_CR4","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/TWC.2010.01.081219","volume":"9","author":"G Yang","year":"2010","unstructured":"Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications, 9, 168\u2013174.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"4452_CR5","first-page":"230","volume":"50","author":"J Zhu","year":"2004","unstructured":"Zhu, J., & Ma, J. (2004). A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 50, 230\u2013234.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"4452_CR6","first-page":"1683","volume":"53","author":"CC Lee","year":"2006","unstructured":"Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53, 1683\u20131687.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"4452_CR7","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/LCOMM.2008.080283","volume":"12","author":"CC Wu","year":"2008","unstructured":"Wu, C. C., Lee, W. B., & Tsaur, W. J. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12, 722\u2013723.","journal-title":"IEEE Communications Letters"},{"key":"4452_CR8","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.comcom.2008.11.032","volume":"32","author":"CC Chang","year":"2009","unstructured":"Chang, C. C., Lee, C. Y., & Chiu, Y. C. (2009). Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications, 32, 611\u2013618.","journal-title":"Computer Communications"},{"key":"4452_CR9","first-page":"1118","volume":"13","author":"TY Youn","year":"2009","unstructured":"Youn, T. Y., Park, Y. H., & Li, M. J. (2009). Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Communications Letters, 13, 1118\u20131123.","journal-title":"IEEE Communications Letters"},{"key":"4452_CR10","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34, 367\u2013374.","journal-title":"Computer Communications"},{"key":"4452_CR11","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.mcm.2011.01.010","volume":"5","author":"C Li","year":"2012","unstructured":"Li, C., & Lee, C. (2012). A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Mathematical and Computer Modelling, 5, 35\u201344.","journal-title":"Mathematical and Computer Modelling"},{"key":"4452_CR12","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1002\/dac.1158","volume":"24","author":"C Chen","year":"2011","unstructured":"Chen, C., He, D., Chan, S., Bu, J., Gao, Y., & Fan, R. (2011). Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems, 24, 347\u2013362.","journal-title":"International Journal of Communication Systems"},{"key":"4452_CR13","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.comcom.2010.04.041","volume":"34","author":"J Xu","year":"2011","unstructured":"Xu, J., Zhou, W. T., & Feng, D. G. (2011). An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Computer Communications, 34, 319\u2013325.","journal-title":"Computer Communications"},{"key":"4452_CR14","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1016\/j.compeleceng.2011.03.002","volume":"3","author":"EJ Yoon","year":"2011","unstructured":"Yoon, E. J., Yoo, K. Y., & Ha, K. S. (2011). A user friendly authentication scheme with anonymity for wireless communications. Computers & Electrical Engineering, 3, 356\u2013364.","journal-title":"Computers & Electrical Engineering"},{"key":"4452_CR15","doi-asserted-by":"crossref","first-page":"1366","DOI":"10.1002\/wcm.933","volume":"11","author":"YC Chen","year":"2011","unstructured":"Chen, Y. C., Chuang, S. C., Yeh, L. Y., & Huang, J. L. (2011). A practical authentication protocol with anonymity for wireless access networks. Wireless Communications and Mobile Computing, 11, 1366\u20131375.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"4452_CR16","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Li, G., & Yang, L. (2013). An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wireless Personal Communications, 68, 1477\u20131491.","journal-title":"Wireless Personal Communications"},{"key":"4452_CR17","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.mcm.2011.04.036","volume":"55","author":"H Mun","year":"2012","unstructured":"Mun, H., Han, K., Lee, Y. S., Yeun, C. Y., & Choi, H. H. (2012). Enhanced secure anonymous authentication scheme for roaming service in global mobility networks. Mathematical and Computer Modelling, 55, 214\u2013222.","journal-title":"Mathematical and Computer Modelling"},{"key":"4452_CR18","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1002\/wcm.2252","volume":"10","author":"WB Hsieh","year":"2014","unstructured":"Hsieh, W. B., & Leu, J. S. (2014). Anonymous authentication protocol based on elliptic curve Diffie\u2013Hellman for wireless access networks. Wireless Communications and Mobile Computing, 10, 995\u20131006.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"4452_CR19","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1002\/sec.858","volume":"8","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Tan, X., Wong, D. S., Wang, G., Bao, M., & Dong, N. (2014). A practical anonymous authentication protocol for wireless roaming. Security and Communication Networks, 8, 1264\u20131273.","journal-title":"Security and Communication Networks"},{"key":"4452_CR20","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11277-013-1282-x","volume":"74","author":"D He","year":"2014","unstructured":"He, D., Zhang, Y., & Chen, J. (2014). Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications, 74, 229\u2013243.","journal-title":"Wireless Personal Communications"},{"key":"4452_CR21","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1007\/s11277-013-1309-3","volume":"74","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Hu, B., Tan, X., Bao, M., & Yu, X. (2014). Robust anonymous two-factor authentication scheme for roaming service in global mobility network. Wireless Personal Communications, 74, 601\u2013614.","journal-title":"Wireless Personal Communications"},{"key":"4452_CR22","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L. (2008). Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons & Fractals, 37, 669\u2013674.","journal-title":"Chaos, Solitons & Fractals"},{"key":"4452_CR23","doi-asserted-by":"crossref","first-page":"4069","DOI":"10.1016\/j.ins.2010.06.013","volume":"180","author":"X Guo","year":"2010","unstructured":"Guo, X., & Zhang, J. (2010). Secure group key agreement protocol based on chaotic Hash. Information Sciences, 180, 4069\u20134074.","journal-title":"Information Sciences"},{"key":"4452_CR24","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s11071-014-1304-6","volume":"77","author":"MS Farash","year":"2014","unstructured":"Farash, M. S., & Attari, M. A. (2014). An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dynamics, 77, 399\u2013411.","journal-title":"Nonlinear Dynamics"},{"key":"4452_CR25","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s11071-012-0715-5","volume":"72","author":"Z Tan","year":"2013","unstructured":"Tan, Z. (2013). A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dynamics, 72, 311\u2013320.","journal-title":"Nonlinear Dynamics"},{"key":"4452_CR26","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1016\/j.cnsns.2012.09.032","volume":"18","author":"C Guo","year":"2013","unstructured":"Guo, C., & Chang, C. C. (2013). Chaotic maps-based password-authenticated key agreement using smart cards. Communications in Nonlinear Science and Numerical Simulation, 18, 1433\u20131440.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"4452_CR27","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1007\/s11071-013-1020-7","volume":"74","author":"Q Xie","year":"2013","unstructured":"Xie, Q., Zhao, J., & Yu, X. (2013). Chaotic maps-based three-party password-authenticated key agreement scheme. Nonlinear Dynamics, 74, 1021\u20131027.","journal-title":"Nonlinear Dynamics"},{"key":"4452_CR28","doi-asserted-by":"crossref","unstructured":"Blanchet, B. (2001). An efficient cryptographic protocol verifier based on prolog rules. In Proceedings of the 14th IEEE workshop on computer security foundations 2001 (pp. 82\u201396). Cape Breton: IEEE Computer Society.","DOI":"10.1109\/CSFW.2001.930138"},{"key":"4452_CR29","doi-asserted-by":"crossref","unstructured":"Abadi, M., & Fournet, C. (2001). Mobile values, new names, and secure communication. In Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages 2001 (pp. 104\u2013115). ACM.","DOI":"10.1145\/360204.360213"},{"key":"4452_CR30","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., & Yao, A. (1983). On the security of public key protocols. IEEE Transactions on Information Theory, 29, 198\u2013208.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4452_CR31","doi-asserted-by":"crossref","first-page":"2969","DOI":"10.1016\/j.cnsns.2011.11.025","volume":"17","author":"K Xue","year":"2012","unstructured":"Xue, K., & Hong, P. (2012). Security improvement on an anonymous key agreement protocol based on chaotic maps. Communications in Nonlinear Science and Numerical Simulation, 17, 2969\u20132977.","journal-title":"Communications in Nonlinear Science and Numerical Simulation"},{"key":"4452_CR32","doi-asserted-by":"crossref","first-page":"1377","DOI":"10.1016\/j.jnca.2006.10.003","volume":"30","author":"J Lee","year":"2007","unstructured":"Lee, J., & Chang, C. (2007). Secure communications for cluster-based ad hoc networks using node identities. Journal of Network and Computer Applications, 30, 1377\u20131396.","journal-title":"Journal of Network and Computer Applications"},{"key":"4452_CR33","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.comcom.2011.09.003","volume":"35","author":"WM Li","year":"2012","unstructured":"Li, W. M., Wen, Q. Y., Su, Q., & Jin, Z. P. (2012). An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Computer Communications, 35, 188\u2013195.","journal-title":"Computer Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4452-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4452-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4452-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T18:01:03Z","timestamp":1506362463000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4452-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,24]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["4452"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4452-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,24]]}}}