{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:50Z","timestamp":1761611510390,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T00:00:00Z","timestamp":1589846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T00:00:00Z","timestamp":1589846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Research Program of China","award":["2016YFB0800101","2016YFB0800100"],"award-info":[{"award-number":["2016YFB0800101","2016YFB0800100"]}]},{"name":"Innovative Research Groups of the National Natural Science Foundation of China","award":["No. 61521003"],"award-info":[{"award-number":["No. 61521003"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61602512"],"award-info":[{"award-number":["No. 61602512"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11277-020-07492-y","type":"journal-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T16:04:50Z","timestamp":1589904290000},"page":"2613-2627","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications"],"prefix":"10.1007","volume":"114","author":[{"given":"Guangsong","family":"Li","sequence":"first","affiliation":[]},{"given":"Yongbin","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Guang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,19]]},"reference":[{"key":"7492_CR1","doi-asserted-by":"crossref","unstructured":"Mishra, A., Shin, M., & Arbaugh, W. (2003). An empirical analysis of the IEEE 802.11 MAC layer handoff process. ACM.","DOI":"10.1145\/956981.956990"},{"issue":"4","key":"7492_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCOM.2015.7081072","volume":"53","author":"X Duan","year":"2015","unstructured":"Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. Communications Magazine IEEE, 53(4), 28\u201335.","journal-title":"Communications Magazine IEEE"},{"issue":"9","key":"7492_CR3","first-page":"3250","volume":"8","author":"A Fu","year":"2014","unstructured":"Fu, A., Zhang, G., Yu, Y., & Zhu, Z. (2014). A privacy preserving vertical handover authentication scheme for WiMAX-WiFi networks. Ksii Transactions on Internet & Information Systems, 8(9), 3250\u20133265.","journal-title":"Ksii Transactions on Internet & Information Systems"},{"key":"7492_CR4","doi-asserted-by":"crossref","unstructured":"Kumar, A., & Om, H. (2016). A secure seamless handover authentication technique for wireless LAN. In International conference on information technology, 2016 (pp. 43\u201347).","DOI":"10.1109\/ICIT.2015.17"},{"issue":"7","key":"7492_CR5","doi-asserted-by":"publisher","first-page":"11379","DOI":"10.3390\/s140711379","volume":"14","author":"W Wang","year":"2014","unstructured":"Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks. Sensors, 14(7), 11379\u201311394.","journal-title":"Sensors"},{"issue":"1\/2","key":"7492_CR6","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1504\/IJAHUC.2015.067774","volume":"18","author":"D He","year":"2015","unstructured":"He, D., Khan, M. K., & Kumar, N. (2015). A new handover authentication protocol based on bilinear pairing functions for wireless networks. International Journal of Ad Hoc and Ubiquitous Computing, 18(1\/2), 67\u201374.","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"issue":"2","key":"7492_CR7","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TWC.2010.120610.101018","volume":"10","author":"D He","year":"2011","unstructured":"He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications, 10(2), 431\u2013436.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"7492_CR8","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/JCN.2015.000083","volume":"17","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., & Sun, X. (2015). Enhanced secure sensor association and key management in wireless body area networks. Journal of Communications & Networks, 17(5), 453\u2013462.","journal-title":"Journal of Communications & Networks"},{"key":"7492_CR9","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2015.03.070","volume":"321","author":"D Wang","year":"2015","unstructured":"Wang, D., Wang, N., Wang, P., & Qing, S. (2015). Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences, 321, 162\u2013178.","journal-title":"Information Sciences"},{"issue":"5","key":"7492_CR10","doi-asserted-by":"publisher","first-page":"052104","DOI":"10.1007\/s11432-016-0161-2","volume":"60","author":"D He","year":"2017","unstructured":"He, D., Wang, D., Xie, Q., & Chen, K. (2017). Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Science China Information Sciences, 60(5), 052104.","journal-title":"Science China Information Sciences"},{"issue":"3","key":"7492_CR11","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367\u2013374.","journal-title":"Computer Communications"},{"issue":"9","key":"7492_CR12","doi-asserted-by":"publisher","first-page":"3461","DOI":"10.1109\/TWC.2007.06020042","volume":"6","author":"G Yang","year":"2007","unstructured":"Yang, G., Wong, D. S., & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 3461\u20133472.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"7492_CR13","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s11277-010-0033-5","volume":"61","author":"D He","year":"2011","unstructured":"He, D., Chan, S., Chen, C., Bu, J., & Fan, R. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465\u2013476.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"7492_CR14","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TWC.2004.842941","volume":"4","author":"M Zhang","year":"2005","unstructured":"Zhang, M., & Fang, Y. (2005). Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications, 4(2), 734\u2013742.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"7492_CR15","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"CC Lee","year":"2006","unstructured":"Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683\u20131687.","journal-title":"IEEE Transactions on Industrial Electronics"},{"issue":"1","key":"7492_CR16","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TWC.2011.110811.111240","volume":"11","author":"D He","year":"2012","unstructured":"He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48\u201353.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"7492_CR17","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/s11277-014-2029-z","volume":"80","author":"G Li","year":"2014","unstructured":"Li, G., Jiang, Q., Wei, F., & Ma, C. (2014). A new privacy-aware handover authentication scheme for wireless networks. Wireless Personal Communications, 80(2), 581\u2013589.","journal-title":"Wireless Personal Communications"},{"key":"7492_CR18","unstructured":"Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011) A privacy preserving handover authentication scheme for EAP-based wireless networks. In Global telecommunications conference, 2011 (pp. 1\u20136)."},{"issue":"8","key":"7492_CR19","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1109\/LCOMM.2012.061912.120941","volume":"16","author":"D He","year":"2012","unstructured":"He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270\u20131273.","journal-title":"IEEE Communications Letters"},{"issue":"8","key":"7492_CR20","doi-asserted-by":"publisher","first-page":"1521","DOI":"10.1109\/LCOMM.2013.052013.130642","volume":"17","author":"SL Yeo","year":"2013","unstructured":"Yeo, S. L., Yap, W. S., Liu, J. K., & Henricksen, M. (2013). Comments on \u201cAnalysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions\u201d. IEEE Communications Letters, 17(8), 1521\u20131523.","journal-title":"IEEE Communications Letters"},{"issue":"7","key":"7492_CR21","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/TMC.2013.134","volume":"13","author":"HJ Jo","year":"2014","unstructured":"Jo, H. J., Paik, J. H., & Dong, H. L. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469\u20131481.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"7492_CR22","doi-asserted-by":"crossref","unstructured":"Sultan, N. H., & Sarma, N. (2014). PAPAR: Pairing based authentication protocol with anonymous roaming for wireless mesh networks. In International conference on information technology, 2014 (pp. 155\u2013160).","DOI":"10.1109\/ICIT.2014.36"},{"key":"7492_CR23","first-page":"1","volume":"2016","author":"H Kwon","year":"2016","unstructured":"Kwon, H., Kim, D., Hahn, C., & Hur, J. (2016). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools & Applications, 2016, 1\u201315.","journal-title":"Multimedia Tools & Applications"},{"key":"7492_CR24","doi-asserted-by":"crossref","unstructured":"Alp\u00e1r, G., Batina, L., Batten, L., Moonsamy, V., Krasnova, A., et al. (2016) New directions in IoT privacy using attribute-based authentication. In ACM international conference on computing frontiers, 2016 (pp. 461\u2013466).","DOI":"10.1145\/2903150.2911710"},{"key":"7492_CR25","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., & Goh, E.-J. (2005). Hierarchical identity based encryption with constant size ciphertext. In Annual international conference on the theory and applications of cryptographic techniques, 2005 (pp. 440\u2013456). Springer.","DOI":"10.1007\/11426639_26"},{"key":"7492_CR26","doi-asserted-by":"crossref","unstructured":"Sahai, A., & Waters, B. (2005) Fuzzy identity-based encryption. In International conference on theory and applications of cryptographic techniques, 2005 (pp. 457\u2013473).","DOI":"10.1007\/11426639_27"},{"key":"7492_CR27","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006) Attribute-based encryption for fine-grained access control of encrypted data. In ACM conference on computer and communications security, 2006 (pp. 89\u201398).","DOI":"10.1145\/1180405.1180418"},{"key":"7492_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24316-5_8","volume-title":"Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost","author":"C Chen","year":"2011","unstructured":"Chen, C., Zhang, Z., & Feng, D. (2011). Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. Berlin: Springer Berlin Heidelberg."},{"key":"7492_CR29","unstructured":"Ansi, X. (1999). Public Key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ECDSA)."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07492-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07492-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07492-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T23:30:19Z","timestamp":1621380619000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07492-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,19]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["7492"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07492-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,5,19]]},"assertion":[{"value":"19 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}