{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:38:56Z","timestamp":1761676736880,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,8]]},"DOI":"10.1145\/3297156.3297220","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:07:04Z","timestamp":1551359224000},"page":"487-494","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function"],"prefix":"10.1145","author":[{"given":"Bahaa Hussein","family":"Taher","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Wuhan, China and Mathematical Science Dept., Science College, Basra University, Basra, Iraq"}]},{"given":"Lu Hong","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Wuhan, China"}]},{"given":"Ali A.","family":"Yassin","sequence":"additional","affiliation":[{"name":"Computer Science Dept., Education College for Pure Science, Basra University, Basra, Iraq"}]}],"member":"320","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.5555\/2035646.2035648"},{"key":"e_1_3_2_1_2_1","volume-title":"IoT System Security Issues and Solution Approaches","author":"Shinsuke Tanaka","year":"2016","unstructured":"Shinsuke Tanaka et. al. , ( 2016 ) IoT System Security Issues and Solution Approaches . Shinsuke Tanaka et. al., (2016) IoT System Security Issues and Solution Approaches."},{"doi-asserted-by":"crossref","unstructured":"T.S. Chou Security threats on cloud computing vulnerabilities International Journal of Computer Science & 582 Information Technology. 5(3) (2013) 79--88.  T.S. Chou Security threats on cloud computing vulnerabilities International Journal of Computer Science & 582 Information Technology. 5(3) (2013) 79--88.","key":"e_1_3_2_1_3_1","DOI":"10.5121\/ijcsit.2013.5306"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.5121\/ijcsit.2013.5306"},{"key":"e_1_3_2_1_5_1","first-page":"1371","volume-title":"Proceedings","author":"Lee CC","year":"2010","unstructured":"Lee CC , Li CT , Chen CL , Chang RX. On security of a more efficient and secure dynamic ID-base remote user authentication scheme . In Proceedings . IEEE CS : Cairo, Egypt , pp.: 1371 -- 1375 , 2010 . Lee CC, Li CT, Chen CL, Chang RX. On security of a more efficient and secure dynamic ID-base remote user authentication scheme. In Proceedings. IEEE CS: Cairo, Egypt, pp.: 1371--1375, 2010."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/j.comcom.2008.11.008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/j.jss.2011.06.061"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/j.cose.2008.11.008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1016\/j.inffus.2011.01.001"},{"key":"e_1_3_2_1_10_1","first-page":"530","volume-title":"IFIP Networking Conference","author":"Granjal E.","year":"2013","unstructured":"J. Granjal , E. Monteiro , J. Silva, End to end transport layer security for Internet integrated sensing applications with ECC public-key authentication , in: IFIP Networking Conference , 2013 , pp. 530 -- 535 . J. Granjal, E. Monteiro, J. Silva, End to end transport layer security for Internet integrated sensing applications with ECC public-key authentication, in: IFIP Networking Conference, 2013, pp. 530--535."},{"key":"e_1_3_2_1_11_1","volume-title":"International Journal of Distributed Sensor Networks.","author":"Jiang C.","year":"2013","unstructured":"R. Jiang , C. Lai , J. Luo , X. Wang , H. Wang , EAP based group authentication and key agreement protocol for machine type communication , International Journal of Distributed Sensor Networks. ( 2013 ). R. Jiang, C. Lai, J. Luo, X. Wang, H. Wang, EAP based group authentication and key agreement protocol for machine type communication, International Journal of Distributed Sensor Networks. (2013)."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the World Congress on Engineering, vol 1.","author":"Ray S","year":"2012","unstructured":"Ray S , Biswas GP ( 2012 ) Establishment of ECC-based initial secrecy usable for IKE implementation . In: Proceedings of the World Congress on Engineering, vol 1. Ray S, Biswas GP (2012) Establishment of ECC-based initial secrecy usable for IKE implementation. In: Proceedings of the World Congress on Engineering, vol 1."},{"key":"e_1_3_2_1_13_1","first-page":"1752","article-title":"Research on data security technology in internet of things","volume":"433","author":"Yanling","year":"2013","unstructured":"Z. Yanling , \" Research on data security technology in internet of things ,\" Applied Mechanics and Materials , Vol 433 , pp. 1752 -- 1755 , 2013 . Z. Yanling, \"Research on data security technology in internet of things,\" Applied Mechanics and Materials, Vol 433, pp. 1752--1755, 2013.","journal-title":"Applied Mechanics and Materials"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"e_1_3_2_1_15_1","volume-title":"Kwei-Shan","author":"Lee","year":"2014","unstructured":"Lee , Jun-Ya, lightweight authentication protocol for internet of things,\" in International Symposium on Next- Generation Electronics , Kwei-Shan , 2014 . Lee, Jun-Ya, et al. \"A lightweight authentication protocol for internet of things,\" in International Symposium on Next- Generation Electronics, Kwei-Shan, 2014."},{"key":"e_1_3_2_1_16_1","first-page":"198","volume-title":"International Conference on Ambient Systems, Network and Technologies, 32","author":"Moosavi E.","year":"2014","unstructured":".R. Moosavi , E. Nigussie , S. Virtanen , J. Isoaha, An elliptic curve-based mutual authentication scheme for 629 RFID implant system , in: International Conference on Ambient Systems, Network and Technologies, 32 , 630- 2014 pp. 198 -- 206 . .R. Moosavi, E. Nigussie, S. Virtanen, J. Isoaha, An elliptic curve-based mutual authentication scheme for 629 RFID implant system, in: International Conference on Ambient Systems, Network and Technologies, 32, 630-2014 pp. 198--206."},{"key":"e_1_3_2_1_17_1","volume-title":"An OAuth based Authentication Mechanism for IoT Networks,\" in Information and Communication Technology Convergence ICTC","author":"Emerson","year":"2015","unstructured":"Emerson , Shamini, \" An OAuth based Authentication Mechanism for IoT Networks,\" in Information and Communication Technology Convergence ICTC , 2015 . Emerson, Shamini, et al. \"An OAuth based Authentication Mechanism for IoT Networks,\" in Information and Communication Technology Convergence ICTC, 2015."},{"key":"e_1_3_2_1_18_1","first-page":"21","article-title":"The Extended Authentication Protocol using Email Authentication infromation","author":"Cheol-Joo C.","year":"2015","unstructured":"Cheol-Joo , C. , \" The Extended Authentication Protocol using Email Authentication infromation \", Journal of Internet Computing and Services (JICS) , pp. 21 -- 28 , 2015 . Cheol-Joo, C., et al. \"The Extended Authentication Protocol using Email Authentication infromation\", Journal of Internet Computing and Services (JICS), pp. 21--28, 2015.","journal-title":"Journal of Internet Computing and Services (JICS)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1016\/j.pmcj.2015.08.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/TVT.2015.2405853"},{"doi-asserted-by":"crossref","unstructured":"C.-H. Liu and Y.-F. Chung \"Secure user authentication scheme forwireless healthcare sensor networks \" Computers&Electrical Engineering 2016C.-H. Liu and Y.-F. Chung \" Secure user authentication scheme forwireless healthcare sensor networks \" Computers&Electrical Engineering 2016.  C.-H. Liu and Y.-F. Chung \"Secure user authentication scheme forwireless healthcare sensor networks \" Computers&Electrical Engineering 2016C.-H. Liu and Y.-F. Chung \" Secure user authentication scheme forwireless healthcare sensor networks \" Computers&Electrical Engineering 2016.","key":"e_1_3_2_1_21_1","DOI":"10.1016\/j.compeleceng.2016.01.002"},{"volume-title":"Authentication Protocols for Internet of Things: A Comprehensive Survey, Security and Communication Networks","author":"Mohamed Amine Ferrag A.","unstructured":"Mohamed Amine Ferrag , Leandros A. Maglaras , Helge Janicke, Jianmin Jiang , Lei Shu , Authentication Protocols for Internet of Things: A Comprehensive Survey, Security and Communication Networks , Volume 2017 , Article ID 6562953. Mohamed Amine Ferrag, Leandros A. Maglaras, Helge Janicke, Jianmin Jiang, Lei Shu, Authentication Protocols for Internet of Things: A Comprehensive Survey, Security and Communication Networks, Volume 2017, Article ID 6562953.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1016\/j.compeleceng.2016.02.017"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1016\/j.adhoc.2016.11.002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1007\/s11227-017-2048-0"}],"event":{"sponsor":["Shenzhen University Shenzhen University"],"acronym":"CSAI '18","name":"CSAI '18: 2018 2nd International Conference on Computer Science and Artificial Intelligence","location":"Shenzhen China"},"container-title":["Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297220","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297156.3297220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:13Z","timestamp":1750208533000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297220"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":25,"alternative-id":["10.1145\/3297156.3297220","10.1145\/3297156"],"URL":"https:\/\/doi.org\/10.1145\/3297156.3297220","relation":{},"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"2018-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}