{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:12:01Z","timestamp":1764785521307,"version":"3.38.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T00:00:00Z","timestamp":1741996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T00:00:00Z","timestamp":1741996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T00:00:00Z","timestamp":1741996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801004","61972438"],"award-info":[{"award-number":["61801004","61972438"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Anhui Province of China","award":["2108085MF219","2108085MF206"],"award-info":[{"award-number":["2108085MF219","2108085MF206"]}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Projects in Anhui Province","doi-asserted-by":"publisher","award":["202004a05020002","2022a05020049"],"award-info":[{"award-number":["202004a05020002","2022a05020049"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,3,15]]},"DOI":"10.1109\/jiot.2024.3493419","type":"journal-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T19:58:41Z","timestamp":1731009521000},"page":"7225-7239","source":"Crossref","is-referenced-by-count":4,"title":["Many-to-One Lightweight Batch Authentication Key Agreement for Wireless Body Area Networks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6207-3004","authenticated-orcid":false,"given":"Sanqiang","family":"Liu","sequence":"first","affiliation":[{"name":"Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, the Anhui Engineering Research Centers of Medical Big Data Intelligent System, and the School of Computer and Information, Anhui Normal University, Wuhu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9858-3782","authenticated-orcid":false,"given":"Dong","family":"Xie","sequence":"additional","affiliation":[{"name":"Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, the Anhui Engineering Research Centers of Medical Big Data Intelligent System, and the School of Computer and Information, Anhui Normal University, Wuhu, China"}]},{"given":"Zhiyang","family":"Li","sequence":"additional","affiliation":[{"name":"Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, the Anhui Engineering Research Centers of Medical Big Data Intelligent System, and the School of Computer and Information, Anhui Normal University, Wuhu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0557-5084","authenticated-orcid":false,"given":"Fulong","family":"Chen","sequence":"additional","affiliation":[{"name":"Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, the Anhui Engineering Research Centers of Medical Big Data Intelligent System, and the School of Computer and Information, Anhui Normal University, Wuhu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2341-5359","authenticated-orcid":false,"given":"Weixin","family":"Bian","sequence":"additional","affiliation":[{"name":"Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, the Anhui Engineering Research Centers of Medical Big Data Intelligent System, and the School of Computer and Information, Anhui Normal University, Wuhu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4717-9303","authenticated-orcid":false,"given":"Taochun","family":"Wang","sequence":"additional","affiliation":[{"name":"Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, the Anhui Engineering Research Centers of Medical Big Data Intelligent System, and the School of Computer and Information, Anhui Normal University, Wuhu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/s43246-024-00468-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-56357-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-53889-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41528-021-00107-x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3152742"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3138989"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3262498"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-52134-z"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3302620"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2966160"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3191319"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3219233"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3345893"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3310514"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s40998-018-0146-5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0720-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024703"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3097996"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3202968"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3279035"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2737630"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3209868"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2764083"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355850"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3171791"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3270300"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923373"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3974"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2857811"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3309860"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3080461"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8865158"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2400997"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3362589"},{"volume-title":"ProVerif 2.00: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial","year":"2018","author":"Blanchet","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3203991"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0324-9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107333"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.06.010"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07702-7"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-05707-3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.032"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103870"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2780232"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3241882"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10918322\/10747258.pdf?arnumber=10747258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T17:46:05Z","timestamp":1741628765000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10747258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,15]]},"references-count":48,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3493419","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2025,3,15]]}}}