{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:12:23Z","timestamp":1754482343478,"version":"3.37.3"},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11277-021-09338-7","type":"journal-article","created":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T10:03:25Z","timestamp":1636970605000},"page":"283-292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing"],"prefix":"10.1007","volume":"124","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8984-3199","authenticated-orcid":false,"given":"Salman","family":"Shamshad","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Minahil","family":"Rana","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5046-7766","authenticated-orcid":false,"given":"Khalid","family":"Mahmood","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6636-0533","authenticated-orcid":false,"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1569-9657","authenticated-orcid":false,"given":"Mohammad S.","family":"Obaidat","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"9338_CR1","doi-asserted-by":"publisher","first-page":"197017","DOI":"10.1109\/ACCESS.2020.3034136","volume":"8","author":"A Filali","year":"2020","unstructured":"Filali, A., Abouaomar, A., Cherkaoui, S., Kobbane, A., & Guizani, M. (2020). Multi-access edge computing: A survey. IEEE Access, 8, 197017\u2013197046. https:\/\/doi.org\/10.1109\/ACCESS.2020.3034136","journal-title":"IEEE Access"},{"issue":"6","key":"9338_CR2","doi-asserted-by":"publisher","first-page":"4004","DOI":"10.1109\/JIOT.2020.3015432","volume":"8","author":"A Alwarafy","year":"2020","unstructured":"Alwarafy, A., Al-Thelaya, K. A., Abdallah, M., Schneider, J., & Hamdi, M. (2020). A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Internet of Things Journal, 8(6), 4004\u20134022. https:\/\/doi.org\/10.1109\/JIOT.2020.3015432","journal-title":"IEEE Internet of Things Journal"},{"key":"9338_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2979006","author":"Y Li","year":"2021","unstructured":"Li, Y., Cheng, Q., Liu, X., & Li, X. (2021). A secure anonymous identity-based scheme in new authentication architecture for mobile edge computing. IEEE Systems Journal. https:\/\/doi.org\/10.1109\/JSYST.2020.2979006.","journal-title":"IEEE Systems Journal"},{"issue":"12","key":"9338_CR4","doi-asserted-by":"publisher","first-page":"5529","DOI":"10.3837\/tiis.2016.12.021","volume":"10","author":"A Irshad","year":"2016","unstructured":"Irshad, A., Sher, M., Ahmad, H. F., Alzahrani, B. A., Chaudhry, S. A., & Kumar, R. (2016). An improved multi-server authentication scheme for distributed mobile cloud computing services. TIIS, 10(12), 5529\u20135552. https:\/\/doi.org\/10.3837\/tiis.2016.12.021.","journal-title":"TIIS"},{"issue":"4","key":"9338_CR5","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.1007\/s11227-016-1688-9","volume":"72","author":"A Irshad","year":"2016","unstructured":"Irshad, A., Sher, M., Chaudhary, S. A., Naqvi, H., & Farash, M. S. (2016). An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging registration centre. The Journal of Supercomputing, 72(4), 1623\u20131644. https:\/\/doi.org\/10.1007\/s11227-016-1688-9","journal-title":"The Journal of Supercomputing"},{"issue":"6","key":"9338_CR6","doi-asserted-by":"publisher","first-page":"10936","DOI":"10.1109\/JIOT.2019.2934947","volume":"6","author":"S Hussain","year":"2019","unstructured":"Hussain, S., & Chaudhry, S. A. (2019). Comments on \u2018biometrics-based privacy-preserving user authentication scheme for cloud-based industrial internet of things deployment\u2019\u2019. IEEE Internet of Things Journal, 6(6), 10936\u201310940. https:\/\/doi.org\/10.1109\/JIOT.2019.2934947.","journal-title":"IEEE Internet of Things Journal"},{"key":"9338_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2986377","author":"S Shamshad","year":"2021","unstructured":"Shamshad, S., Mahmood, K., Kumari, S., & Khan, M. K. (2021). Comments on \u201cinsider attack protection: Lightweight password-based authentication techniques using ecc.\u201d IEEE Systems Journal. https:\/\/doi.org\/10.1109\/JSYST.2020.2986377.","journal-title":"IEEE Systems Journal"},{"issue":"5","key":"9338_CR8","doi-asserted-by":"publisher","first-page":"1056","DOI":"10.1109\/TIFS.2016.2639446","volume":"12","author":"Q Yang","year":"2016","unstructured":"Yang, Q., Gasti, P., Zhou, G., Farajidavar, A., & Balagani, K. S. (2016). On inferring browsing activity on smartphones via USB power analysis side-channel. IEEE Transactions on Information Forensics and Security, 12(5), 1056\u20131066. https:\/\/doi.org\/10.1109\/TIFS.2016.2639446.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"9338_CR9","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/JIOT.2018.2846299","volume":"6","author":"P Gope","year":"2018","unstructured":"Gope, P., & Sikdar, B. (2018). Lightweight and privacy-preserving two-factor authentication scheme for IOT devices. IEEE Internet of Things Journal, 6(1), 580\u2013589. https:\/\/doi.org\/10.1109\/JIOT.2018.2846299.","journal-title":"IEEE Internet of Things Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09338-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09338-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09338-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T09:51:17Z","timestamp":1650880277000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09338-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["9338"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09338-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"4 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}},{"value":"Not Applicabel.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code Availability"}}]}}