{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:22:25Z","timestamp":1761402145206,"version":"3.37.3"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"NSERC CRDPJ","award":["476659-14","Y201328392"],"award-info":[{"award-number":["476659-14","Y201328392"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61301142","61771428"],"award-info":[{"award-number":["61301142","61771428"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SRF","award":["2013[1792]"],"award-info":[{"award-number":["2013[1792]"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Comput. Soc."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/ojcs.2021.3055365","type":"journal-article","created":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T20:43:51Z","timestamp":1611953031000},"page":"130-138","source":"Crossref","is-referenced-by-count":14,"title":["Efficient Authentication Protocol for Continuous Monitoring in Medical Sensor Networks"],"prefix":"10.1109","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4538-4426","authenticated-orcid":false,"given":"Bidi","family":"Ying","sequence":"first","affiliation":[]},{"given":"Nada Radwan","family":"Mohsen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4605-0500","authenticated-orcid":false,"given":"Amiya","family":"Nayak","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2933"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/info8040136"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s18124481"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-016-0485-9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/8572410"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s17050940"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s17030644"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2017.2739683"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-1047-x"},{"year":"0","key":"ref28","article-title":"Automated validation of internet security protocols and applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s151229767"},{"key":"ref27","first-page":"311","article-title":"An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments","volume":"29","author":"hafizul islam","year":"2017","journal-title":"J King Saud Univ &#x2013;Comp Inf Sci"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s17122919"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.080128"},{"journal-title":"Inf Soc Technol Programme","article-title":"The HLPSL tutorial - A beginner's guide to modeling and analyzing internet security protocols","year":"2006","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2006.206151"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s140406443"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/sec.517"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s120201625"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s16122123"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s17122946"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s18010179"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICAPR.2015.7050673"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2994374.2994393"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/s18041104"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2707460"}],"container-title":["IEEE Open Journal of the Computer Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782664\/9349230\/09340285.pdf?arnumber=9340285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T20:33:50Z","timestamp":1641587630000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9340285\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ojcs.2021.3055365","relation":{},"ISSN":["2644-1268"],"issn-type":[{"type":"electronic","value":"2644-1268"}],"subject":[],"published":{"date-parts":[[2021]]}}}