{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:55:00Z","timestamp":1775040900630,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,6,25]],"date-time":"2014-06-25T00:00:00Z","timestamp":1403654400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s12083-014-0299-6","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T04:18:32Z","timestamp":1403583512000},"page":"1059-1069","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system"],"prefix":"10.1007","volume":"8","author":[{"given":"Haomiao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Hyunsung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kambombo","family":"Mtonga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,25]]},"reference":[{"issue":"3","key":"299_CR1","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/TITB.2010.2087414","volume":"15","author":"T Massey","year":"2011","unstructured":"Massey T, Marfia G, Stoelting A, Tomasi R, Spirito MA, Sarrafzadeh M, Pau G (2011) Leveraging social system networks in ubiquitous high-data-rate health systems. IEEE Trans Inf Technol Biomed 15(3):491\u2013498","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"4","key":"299_CR2","doi-asserted-by":"crossref","first-page":"2288","DOI":"10.1109\/TCE.2010.5681102","volume":"56","author":"H Yan","year":"2010","unstructured":"Yan H, Huo H, Xu Y, Gidlund M (2010) Wireless sensor network based E-health system implementation and experimental results. IEEE Trans Consum Electron 56(4):2288\u20132295","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"299_CR3","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MWC.2010.5416354","volume":"17","author":"M Patel","year":"2010","unstructured":"Patel M, Wang J (2010) Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel Commun 17(1):80\u201388","journal-title":"IEEE Wirel Commun"},{"issue":"2","key":"299_CR4","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TCE.2013.6531115","volume":"59","author":"F Almenares","year":"2013","unstructured":"Almenares F, Arias P, Marin A, Diaz-Sanchez D, Sanchez R (2013) Overhead of using secure wireless communications in mobile computing. IEEE Trans Consum Electron 59(2):335\u2013342","journal-title":"IEEE Trans Consum Electron"},{"key":"299_CR5","doi-asserted-by":"crossref","unstructured":"Lim S, Tae H, Choi Y, Lakshman T (2010) Security issues on wireless body area network for remote healthcare monitoring. Proc. IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Newport Beach, USA, pp. 327\u2013332, June 2010","DOI":"10.1109\/SUTC.2010.61"},{"issue":"1","key":"299_CR6","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/s10916-010-9449-4","volume":"36","author":"M Al Ameen","year":"2012","unstructured":"Al Ameen M, Liu J, Kwak K (2012) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst 36(1):93\u2013101","journal-title":"J Med Syst"},{"issue":"9","key":"299_CR7","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.1093\/eurheartj\/ehr419","volume":"33","author":"P Mabo","year":"2012","unstructured":"Mabo P, Victor F, Bazin P, Ahres S, Babuty D, Da Costa A, Daubert JC (2012) A randomized trial of long-term remote monitoring of pacemaker recipients. Eur Heart J 33(9):1105\u20131111","journal-title":"Eur Heart J"},{"key":"299_CR8","doi-asserted-by":"crossref","unstructured":"Venkatasubramanian KK, Banerjee A, Gupta SKS (2008) EKG-based key agreement in Body Sensor Networks. Proc. IEEE INFOCOM Workshop, Phoenix, USA, pp. 13\u201318, April 2008","DOI":"10.1109\/INFOCOM.2008.4544608"},{"key":"299_CR9","doi-asserted-by":"crossref","unstructured":"Li M, Yu S, Lou W, Ren K (2010) Group device pairing based secure sensor association and key management for body area networks. Proc. IEEE INFOCOM Workshop, San Diego, USA, pp. 1\u20139, March 2010","DOI":"10.1109\/INFCOM.2010.5462095"},{"issue":"3","key":"299_CR10","doi-asserted-by":"crossref","first-page":"2019","DOI":"10.1109\/TCE.2010.5606360","volume":"56","author":"J Shen","year":"2010","unstructured":"Shen J, Moh S, Chung IY (2010) Comment: \u201cEenhanced novel access control protocol over wireless sensor networks\u201d. IEEE Trans Consum Electron 56(3):2019\u20132021","journal-title":"IEEE Trans Consum Electron"},{"issue":"6","key":"299_CR11","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1109\/TITB.2009.2033055","volume":"13","author":"C Tan","year":"2009","unstructured":"Tan C, Wang H, Zhong S, Li Q (2009) IBE-lite: A lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6):926\u2013932","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"2","key":"299_CR12","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/JCN.2011.6157409","volume":"13","author":"X Liang","year":"2011","unstructured":"Liang X, Lu R, Chen L, Lin X, Shen X (2011) PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. J Commun Netw 13(2):102\u2013112","journal-title":"J Commun Netw"},{"issue":"6","key":"299_CR13","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1109\/TITB.2012.2199996","volume":"16","author":"D He","year":"2012","unstructured":"He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) A distributed trust evaluation model and its application scenarios to medical sensor networks. IEEE Trans Inf Technol Biomed 16(6):1164\u20131175","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"3","key":"299_CR14","doi-asserted-by":"crossref","first-page":"664","DOI":"10.1109\/JBHI.2012.2235180","volume":"17","author":"D He","year":"2013","unstructured":"He D, Chen C, Chan S, Bu J, Zhang P (2013) Secure and lightweight network admission and transmission protocol for body sensor networks. IEEE J Biomed Health Inform 17(3):664\u2013674","journal-title":"IEEE J Biomed Health Inform"},{"key":"299_CR15","doi-asserted-by":"crossref","unstructured":"Shi L, Li M, Yu S, Yuan J (2012) Bana: body area network authentication exploiting channel characteristics. Proc. ACM conference on Security and Privacy in Wireless and Mobile Networks, Tucson, USA, pp. 27\u201338, April 2012","DOI":"10.1145\/2185448.2185454"},{"issue":"1","key":"299_CR16","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MWC.2010.5416350","volume":"17","author":"M Li","year":"2010","unstructured":"Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun 17(1):51\u201358","journal-title":"IEEE Wirel Commun"},{"key":"299_CR17","doi-asserted-by":"crossref","unstructured":"Ali ST, Sivaraman V, Ostry D (2012) Authentication of lossy data in body-sensor networks for healthcare monitoring. Proc. IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Seoul, Korea, pp. 470\u2013478, June 2012","DOI":"10.1109\/SECON.2012.6275814"},{"key":"299_CR18","doi-asserted-by":"crossref","unstructured":"Li H, Lu R, Zhou L, Yang B, Shen X (2014) An efficient merkle tree based authentication scheme for smart grid. IEEE Syst J 8(2):655\u2013663","DOI":"10.1109\/JSYST.2013.2271537"},{"key":"299_CR19","unstructured":"Boneh D, Franklin M (2011) Identity-based encryption from the Weil pairing. Proc. CRYPTO 2001, Santa Barbara, USA, pp. 213\u2013229, January 2011"},{"issue":"13","key":"299_CR20","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1049\/el:20020387","volume":"38","author":"NP Smart","year":"2002","unstructured":"Smart NP (2002) Identity-based authenticated key agreement protocol based on Weil pairing. Electron Lett 38(13):630\u2013632","journal-title":"Electron Lett"},{"key":"299_CR21","doi-asserted-by":"crossref","unstructured":"Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. Proc. EUROCRYPT 2002, Amsterdam, Netherlands, pp. 65\u201382, April 2002","DOI":"10.1007\/3-540-46035-7_5"},{"key":"299_CR22","doi-asserted-by":"crossref","unstructured":"Canetti R, Halevi S, Katz J (2003) A forward-secure public-key encryption scheme. Proc. EUROCRYPT 2003, Warsaw, Poland, pp. 255\u2013271, May 2003","DOI":"10.1007\/3-540-39200-9_16"},{"key":"299_CR23","unstructured":"Li H, Liang X, Lu R, Lin X, Shen X (2012) EDR: An efficient demand response scheme for achieving forward secrecy in smart grid, 2012 I.E. Global Telecommunications Conference (IEEE GLOBECOM 2012) 929\u2013934"},{"key":"299_CR24","doi-asserted-by":"crossref","unstructured":"Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2013) EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst doi: 10.1109\/TPDS.2013.124","DOI":"10.1109\/TPDS.2013.124"},{"issue":"4","key":"299_CR25","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L Chen","year":"2007","unstructured":"Chen L, Cheng Z, Smart NP (2007) Identity-based key agreement protocols from pairings. Int J Inf Secur 6(4):213\u2013241","journal-title":"Int J Inf Secur"},{"issue":"4","key":"299_CR26","doi-asserted-by":"crossref","first-page":"1793","DOI":"10.1109\/TIT.2009.2013048","volume":"55","author":"E Lee","year":"2009","unstructured":"Lee E, Lee HS, Park CM (2009) Efficient and generalized pairing computation on abelian varieties. IEEE Trans Inf Theory 55(4):1793\u20131803","journal-title":"IEEE Trans Inf Theory"},{"key":"299_CR27","doi-asserted-by":"crossref","unstructured":"Yang Y, Li H, Wen M, Luo H, Lu R (2014) Achieving ranked range query in smart grid auction market. Proceedings of ICC, Sydney, Australia, 2014, to appear","DOI":"10.1109\/ICC.2014.6883442"},{"key":"299_CR28","doi-asserted-by":"crossref","unstructured":"Liu D, Li H, Yang Y, Yang H (2014) Achieving multi-authority access control with efficient attribute revocation in smart grid. Proceedings of ICC, Sydney, Australia, 2014, to appear","DOI":"10.1109\/ICC.2014.6883390"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0299-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-014-0299-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0299-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T03:44:52Z","timestamp":1559447092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-014-0299-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,25]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["299"],"URL":"https:\/\/doi.org\/10.1007\/s12083-014-0299-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,25]]}}}