{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T14:28:21Z","timestamp":1775140101418,"version":"3.50.1"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3097267","type":"journal-article","created":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T20:45:01Z","timestamp":1626900301000},"page":"100972-100980","source":"Crossref","is-referenced-by-count":12,"title":["LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments"],"prefix":"10.1109","volume":"9","author":[{"given":"Tai-Hoon","family":"Kim","sequence":"first","affiliation":[]},{"given":"Gulshan","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Rahul","family":"Saha","sequence":"additional","affiliation":[]},{"given":"William J.","family":"Buchanan","sequence":"additional","affiliation":[]},{"given":"Tannishtha","family":"Devgun","sequence":"additional","affiliation":[]},{"given":"Reji","family":"Thomas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3041327"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.06.003"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.039"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.12.028"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2018.8326282"},{"key":"ref30","author":"cremers","year":"2006","journal-title":"Semantics and Verification of Security Protocols"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.025"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.004"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107333"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107833"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100264"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-018-0659-8"},{"key":"ref61","article-title":"A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for industrial Internet of Things (IIoT)","volume":"58","author":"hussain","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.03.003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.01.003"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2019.101653"},{"key":"ref27","first-page":"3","article-title":"A lightweight mutual authentication protocol for the IoT","author":"hammi","year":"2017","journal-title":"Proc Int Conf Mobile Wireless Technol"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2017.i1.329-357"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2017.08.020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.06.032"},{"key":"ref67","year":"2020","journal-title":"Light Weight Public Key"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1080\/23742917.2017.1384917","article-title":"Lightweight cryptography methods","volume":"1","author":"buchanan","year":"2017","journal-title":"J Cyber Secur Technol"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100312"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.09.006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.415"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.94"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952860"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.004"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2016.7736451"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.01.006"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3004300"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034219"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101885"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2021.01.024"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.08.014"},{"key":"ref56","first-page":"7","article-title":"A lightweight signcryption scheme based on elliptic curve cryptography","volume":"1","author":"singh","year":"2014","journal-title":"Proc 1st Int Conf Adv Comput Commun Eng (ICACCE)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2016.7507934"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2730580"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2976740"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846299"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2669940"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010048"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI.2018.8553919"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102662"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5120\/16577-6265"},{"key":"ref15","first-page":"165","article-title":"Digital signcryption or how to achieve cost (signature & encryption) $\\ll$\n cost (signature) + cost (encryption)","author":"zheng","year":"1997","journal-title":"Proc Annu Int Cryptol Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.50703"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s100302450"},{"key":"ref18","first-page":"v7-497","article-title":"Scalable pseudo random RFID private mutual authentication","volume":"7","author":"fu","year":"2010","journal-title":"Proc 2nd Int Conf Comput Eng Technol"},{"key":"ref19","first-page":"359","article-title":"A new authentication RFID protocol with ownership transfer","author":"gui","year":"2013","journal-title":"Proc Int Conf ICT Converg (ICTC)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890184"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2277471"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2406877"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.11.016"},{"key":"ref8","author":"henriquez","year":"2020","journal-title":"Security The Top 10 Data Breaches of 2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102761"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2915232"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0091"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.11.010"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.069"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102496"},{"key":"ref47","article-title":"Secure two-factor light-weight authentication protocol using self-certified public-key cryptography for multi-server 5G networks","volume":"161","author":"haq","year":"2020","journal-title":"J Netw Comput Appl"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102053"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026630"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101938"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2020.09.008"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09486884.pdf?arnumber=9486884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:03Z","timestamp":1639771023000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9486884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3097267","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}