{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:56:39Z","timestamp":1773381399025,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2017YFB0802700"],"award-info":[{"award-number":["2017YFB0802700"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772404"],"award-info":[{"award-number":["61772404"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836203"],"award-info":[{"award-number":["U1836203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Shaanxi","award":["2020ZDLGY08-08"],"award-info":[{"award-number":["2020ZDLGY08-08"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1109\/tdsc.2020.2989784","type":"journal-article","created":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T20:05:09Z","timestamp":1587672309000},"page":"370-387","source":"Crossref","is-referenced-by-count":43,"title":["EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet"],"prefix":"10.1109","volume":"19","author":[{"given":"Yunqing","family":"Sun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1372-7252","authenticated-orcid":false,"given":"Jin","family":"Cao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1438-7018","authenticated-orcid":false,"given":"Maode","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-3272","authenticated-orcid":false,"given":"Yinghui","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8310-7169","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2898-7495","authenticated-orcid":false,"given":"Ben","family":"Niu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685499"},{"issue":"6","key":"ref2","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1109\/JSAC.2014.2328098","article-title":"What will 5G be?","volume":"32","author":"Andrews","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref3","article-title":""},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600290"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2649687"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2951818"},{"key":"ref7","article-title":""},{"key":"ref8","article-title":""},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2848262"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.7840\/kics.2015.40.8.1521"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6807948"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036830"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2016.7461477"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2416002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07782-6_25"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0870-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2756567"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2778090"},{"issue":"4","key":"ref19","first-page":"1007","article-title":"An attribute-based trust negotiation protocol for D2D communication in smart city balancing trust and privacy","volume":"33","author":"Guo","year":"2017","journal-title":"J. Inf. Sci. Eng."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2631950"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2789121"},{"key":"ref22","article-title":""},{"key":"ref23","article-title":""},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_4"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_16"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23483-7_58"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/b94617"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASIAJCIS.2013.9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2738-3_19"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2845464"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2459709"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2406877"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref34","article-title":"The Scyther tool, University of Oxford, Department of Computer Science","author":"Cremers"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243846"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23313"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00006"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23442"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"ref41","article-title":"National Institute of Standards and Technology, Special Publication 800\u201356A: Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography(Revision 2)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440630"},{"key":"ref43","article-title":"Tab 2: discharging screen. 2020. [Online]"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1247660.1247681"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9625881\/09076811.pdf?arnumber=9076811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:33:39Z","timestamp":1704839619000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9076811\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":43,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2020.2989784","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}