{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T12:25:40Z","timestamp":1763727940166},"reference-count":26,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2022,3,4]]},"DOI":"10.1080\/19393555.2020.1871534","type":"journal-article","created":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T12:21:10Z","timestamp":1616761270000},"page":"144-156","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["An enhanced mutual authentication and security protocol for IoT and cloud server"],"prefix":"10.1080","volume":"31","author":[{"given":"Prabhat Kumar","family":"Panda","sequence":"first","affiliation":[{"name":"School of Electronics & Communication Engineering,REVA University Bangalore"}]},{"given":"Sudipta","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Department of Electronics & Telecommunication Engineering,Jadavpur University"}]}],"member":"301","published-online":{"date-parts":[[2021,3,26]]},"reference":[{"issue":"3","key":"cit0001","first-page":"84","volume":"3","author":"Afreen R.","year":"2011","journal-title":"J Comput Sci Inf Technol"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.05.007"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.02.005"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106554"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2365-y"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07330-1"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"issue":"15","key":"cit0008","first-page":"1571","volume":"119","author":"Bhubaneswari S.","year":"2018","journal-title":"Int J Pure Appl Math"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2676119"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102554"},{"key":"cit0012","volume-title":"Guide to Elliptic Curve Cryptography","author":"Hankerson D.","year":"2004"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.08.001"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2015.226"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2048-0"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.02.004"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.08.002"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.415"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01248-8"},{"key":"cit0020","author":"Peeters R.","year":"2013","journal-title":"Cryptology ePrint Archive"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.059"},{"key":"cit0022","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1016\/j.sysarc.2008.04.003","volume":"54","author":"Sascha M.","year":"2008","journal-title":"J. Syst. Archit."},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-019-00079-w"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102539"},{"key":"cit0025","first-page":"349","volume":"1122","author":"Sureshkumar V.","year":"2019","journal-title":"Commun Comput Inf Sci"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.11.052"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2020.1871534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T11:33:41Z","timestamp":1649244821000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2020.1871534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,26]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3,4]]}},"alternative-id":["10.1080\/19393555.2020.1871534"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2020.1871534","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,26]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-03-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}