{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:18:42Z","timestamp":1740158322763,"version":"3.37.3"},"reference-count":16,"publisher":"Wiley","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Basic Research Program","award":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"],"award-info":[{"award-number":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"],"award-info":[{"award-number":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"],"award-info":[{"award-number":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"],"award-info":[{"award-number":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"],"award-info":[{"award-number":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"],"award-info":[{"award-number":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"],"award-info":[{"award-number":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"],"award-info":[{"award-number":["2012CB315905","61370190","61272501","61173154","61402029","61003214","4132056","4122041"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2016]]},"abstract":"<jats:p>Wireless Health Monitoring Systems (WHMS) have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients\u2019 information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim\u2019s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim\u2019s previous scheme while inheriting its qualities of one-round communication and security properties.<\/jats:p>","DOI":"10.1155\/2016\/1905872","type":"journal-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T17:02:05Z","timestamp":1464886925000},"page":"1-14","source":"Crossref","is-referenced-by-count":0,"title":["Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS"],"prefix":"10.1155","volume":"2016","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3044-3593","authenticated-orcid":true,"given":"Kefei","family":"Mao","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing 100191, China"}]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing 100191, China"}]},{"given":"Jie","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing 100191, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.3390\/s121013907"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-013-9949-0"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20070361"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0274-2"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1198"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2009.090502"},{"key":"7","first-page":"53","volume":"4","year":"2011","journal-title":"International Journal of Computer Network and Information Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.3390\/s141223742"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0240-4"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1058"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2005.03.024"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.009"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.10.003"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_21"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1137\/s0097539701398521"},{"first-page":"397","volume-title":"Elliptic curve discrete logarithm problem","year":"2011","key":"17"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2016\/1905872.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2016\/1905872.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2016\/1905872.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T09:21:28Z","timestamp":1469524888000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/jece\/2016\/1905872\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":16,"alternative-id":["1905872","1905872"],"URL":"https:\/\/doi.org\/10.1155\/2016\/1905872","relation":{},"ISSN":["2090-0147","2090-0155"],"issn-type":[{"type":"print","value":"2090-0147"},{"type":"electronic","value":"2090-0155"}],"subject":[],"published":{"date-parts":[[2016]]}}}