{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T17:13:30Z","timestamp":1773162810807,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research, King Saud University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Vice Deanship of Scientific Research Chairs"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3063490","type":"journal-article","created":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T20:58:10Z","timestamp":1614718690000},"page":"40198-40215","source":"Crossref","is-referenced-by-count":24,"title":["A Novel Efficient Certificateless Signature Scheme for the Prevention of Content Poisoning Attack in Named Data Networking-Based Internet of Things"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1523-1330","authenticated-orcid":false,"given":"Saddam","family":"Hussain","sequence":"first","affiliation":[{"name":"Department of Information Technology, Hazara University, Mansehra, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5406-0389","authenticated-orcid":false,"given":"Syed Sajid","family":"Ullah","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Hazara University, Mansehra, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8512-9687","authenticated-orcid":false,"given":"Abdu","family":"Gumaei","sequence":"additional","affiliation":[{"name":"Research Chair of Pervasive and Mobile Computing, King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5343-8370","authenticated-orcid":false,"given":"Mabrook","family":"Al-Rakhami","sequence":"additional","affiliation":[{"name":"Research Chair of Pervasive and Mobile Computing, King Saud University, Riyadh, Saudi Arabia"}]},{"given":"Ijaz","family":"Ahmad","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5344-5087","authenticated-orcid":false,"given":"Syed Muhammad","family":"Arif","sequence":"additional","affiliation":[{"name":"Department of Physics, Hazara University, Mansehra, Pakistan"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2310"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2388"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406246"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0100"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562065"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810165"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/dac.1330"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995080"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2854928"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2018.8401591"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718824465"},{"key":"ref62","year":"2021","journal-title":"Automated Validation of Internet Security Protocols and Applications"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","article-title":"The AVISPA tool for the automated validation of Internet security protocols and applications","author":"armando","year":"2005","journal-title":"Proc Int Conf Comput Aided Verification"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2021.014413"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677049"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/math7080686"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831386"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref66","first-page":"92","article-title":"Optimal asymmetric encryption","author":"bellare","year":"1994","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14722\/sent.2014.23014"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0094-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3839"},{"key":"ref1","article-title":"ICN communication optimization for Internet of Things","author":"nour","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/1550147718815842"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/8405879"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/sym10080352"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0964-z"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-2048-0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2500098.2500106"},{"key":"ref25","article-title":"A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)","volume":"58","author":"hussain","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/BF02252872"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_33"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr097"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_23"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8857272"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-019-1378-2"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE.2018.8405470"},{"key":"ref53","first-page":"244","article-title":"Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem","author":"ch","year":"2011","journal-title":"Proc 8th Int Conf High-Capacity Opt Netw Emerg Technol"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOM.2017.51"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8911-4_18"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2457"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749508"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701086"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/65.806987"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.053"},{"key":"ref16","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Crypto"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994988"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"3868","DOI":"10.3390\/s18113868","article-title":"A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices","volume":"18","author":"su\u00e1rez-albela","year":"2018","journal-title":"SENSORS"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3005361"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2971009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.05.042"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38516-3_3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2900274"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2016.7543988"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2988818"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647629"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2894108"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2944631"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2018.8546984"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2015.10"},{"key":"ref41","first-page":"1","article-title":"An efficient certificateless signature scheme without bilinear pairings","volume":"74","author":"yeh","year":"2014","journal-title":"Multimedia Tools Appl"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3390\/s17051001"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-0367-6"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09367230.pdf?arnumber=9367230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T17:18:58Z","timestamp":1744305538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9367230\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3063490","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}