{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:33:46Z","timestamp":1761676426399,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T00:00:00Z","timestamp":1471996800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402095"],"award-info":[{"award-number":["61402095"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Fundamental Research Funds for the Central Universities","award":["N120404010"],"award-info":[{"award-number":["N120404010"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300196"],"award-info":[{"award-number":["61300196"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Fundamental Research Funds for the Central Universities","award":["N130817002"],"award-info":[{"award-number":["N130817002"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0685-2","type":"journal-article","created":{"date-parts":[[2016,8,23]],"date-time":"2016-08-23T21:17:08Z","timestamp":1471987028000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network"],"prefix":"10.1186","volume":"2016","author":[{"given":"Tianhan","family":"Gao","sequence":"first","affiliation":[]},{"given":"Fangting","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,24]]},"reference":[{"key":"685_CR1","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-25243-3_26","volume":"7043","author":"Z Wang","year":"2011","unstructured":"Z Wang, Ma Maode, W Liu, X Wei, A unified security framework for multi-domain wireless mesh networks [J]. Lect. Notes Comput. Sci. 7043:, 319\u2013329 (2011).","journal-title":"Lect. Notes Comput. Sci"},{"issue":"10","key":"685_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.06.003","volume":"51","author":"R Di Pietro","year":"2014","unstructured":"R Di Pietro, S Guarino, NV Verdeb, J Domingo-Ferrerc, Security in wireless ad-hoc networks - A survey [J]. Int. J. Comput. Commun. 51(10), 1\u201320 (2014).","journal-title":"Int. J. Comput. Commun"},{"issue":"3","key":"685_CR3","doi-asserted-by":"publisher","first-page":"975","DOI":"10.2298\/CSIS130917060G","volume":"11","author":"T Gao","year":"2014","unstructured":"T Gao, N Guo, K Yim, Q Wang, PPS: A Privacy-Preserving Security Scheme for Multi-operator Wireless Mesh Networks with Enhanced User Experience [J]. Sci. Inf. Syst. 11(3), 975\u2013999 (2014).","journal-title":"Sci. Inf. Syst"},{"key":"685_CR4","first-page":"1","volume":"46","author":"Z Wang","year":"2009","unstructured":"Z Wang, WJ Liu, A Wireless mesh network authentication method based on identity based signature [C]. International Conference on Wireless Communications, NETWORKING and Mobile Computing. 46:, 1\u20134 (2009).","journal-title":"International Conference on Wireless Communications, NETWORKING and Mobile Computing"},{"key":"685_CR5","first-page":"416","volume":"2","author":"R Li","year":"2009","unstructured":"R Li, L Pang, Q Pei, Anonymous communication in wireless mesh network[C]. Comput. Intell. Secur. Int. Conf. IEEE. 2:, 416\u2013420 (2009).","journal-title":"Comput. Intell. Secur. Int. Conf. IEEE"},{"key":"685_CR6","unstructured":"J Sen, Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks [M]. Applied Cryptography and Network Security, ISBN: 978-953-51-0218-2, InTech, 3\u201334 (2012)."},{"key":"685_CR7","first-page":"47","volume-title":"Proceedings of CRYPTO \u201984","author":"A Shamir","year":"1985","unstructured":"A Shamir, in Proceedings of CRYPTO \u201984. Identity-based cryptosystems and signature schemes[C]. Advances in Cryptology (SpringerBerlin Heidelberg, 1985), pp. 47\u201353."},{"key":"685_CR8","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology Proceedings of CRYPTO\u201985","author":"VS Miller","year":"1986","unstructured":"VS Miller, in Advances in Cryptology Proceedings of CRYPTO\u201985. Use of elliptic curves in cryptography[C] (SpringerBerlin Heidelberg, 1986), pp. 417\u2013426."},{"key":"685_CR9","first-page":"1369","volume":"3","author":"KL Wu","year":"2008","unstructured":"KL Wu, J Zou, XH Wei, et al., Proxy group signature: a new anonymous proxy signature scheme[C]. International Conference on Machine Learning and Cybernetics. 3:, 1369\u20131373 (2008).","journal-title":"International Conference on Machine Learning and Cybernetics"},{"issue":"11","key":"685_CR10","first-page":"69","volume":"32","author":"D Liang","year":"2005","unstructured":"D Liang, X Guo-Zhen, An ID-based group signature scheme [J]. Comput. Sci. 32(11), 69\u201371 (2005).","journal-title":"Comput. Sci"},{"key":"685_CR11","volume-title":"A certificate-based signature scheme [M]. Topics in Cryptology","author":"BG Kang","year":"2004","unstructured":"BG Kang, JH Park, SG Hahn, A certificate-based signature scheme [M]. Topics in Cryptology (Springer, Berlin Heidelberg, 2004)."},{"issue":"9","key":"685_CR12","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.3724\/SP.J.1001.2012.04188","volume":"23","author":"T GAO","year":"2012","unstructured":"T GAO, N GUO, ZL ZHU, Access authentication for HMIPv6 with node certificate and identity-based hybrid scheme[J]. J. Softw. 23(9), 2465\u20132480 (2012).","journal-title":"J. Softw"},{"key":"685_CR13","volume-title":"Identity-based encryption from the Weil pairing[C]. Advances in Cryptology","author":"D Boneh","year":"2001","unstructured":"D Boneh, M Franklin, Identity-based encryption from the Weil pairing[C]. Advances in Cryptology (Springer, Berlin Heidelberg, 2001)."},{"key":"685_CR14","first-page":"25","volume":"3","author":"A Ortega","year":"2015","unstructured":"A Ortega, et al., Proposal DNP3 protocol simulation on NS-2 in IEEE 802.11g wireless network ad hoc over TCP\/IP in smart grid applications [C]. Innovative Smart Grid Technologies. 3:, 25\u201331 (2015).","journal-title":"Innovative Smart Grid Technologies"},{"key":"685_CR15","unstructured":"B LI, G-g ZHANG, J-j ZHAO, Research and simulation of wireless mesh network model [J]. Comput. Simul. (4), 270\u2013273 (2013)."},{"issue":"04","key":"685_CR16","first-page":"9","volume":"33","author":"S ZHENG","year":"2012","unstructured":"S ZHENG, W-q WU, Q-y ZHANG, N-t ZHANG, Routing protocol based on energy aware in ad hoc network[J]. J. Commun. 33(04), 9\u201316 (2012).","journal-title":"J. Commun"},{"key":"685_CR17","first-page":"638","volume":"1","author":"S Xu","year":"2011","unstructured":"S Xu, Y Yang, Protocols simulation and performance analysis in wireless network based on NS2 [C]. International Conference on Multimedia Technology. 1:, 638\u2013641 (2011).","journal-title":"International Conference on Multimedia Technology"},{"issue":"2","key":"685_CR18","first-page":"78","volume":"6","author":"A Skovoroda","year":"2015","unstructured":"A Skovoroda, D Gamayunov, Securing mobile devices: malware mitigation methods [J]. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA).6(2), 78\u201397 (2015).","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA)."},{"issue":"2","key":"685_CR19","first-page":"98","volume":"6","author":"L Nkenyereye","year":"2015","unstructured":"L Nkenyereye, BA Tama, Y Park, KH Rhee, A fine-grained privacy preserving protocol over attribute based access control for VANETs [J]. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA).6(2), 98\u2013112 (2015).","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA)."},{"issue":"4","key":"685_CR20","first-page":"120","volume":"5","author":"K Sun","year":"2014","unstructured":"K Sun, Y Kim, Flow mobility management in PMIPv6-based DMM (Distributed Mobility Management) Networks[J]. J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA). 5(4), 120\u2013127 (2014).","journal-title":"J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA)"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0685-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0685-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0685-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0685-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,30]],"date-time":"2017-04-30T20:49:01Z","timestamp":1493585341000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0685-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,24]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["685"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0685-2","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,8,24]]},"article-number":"193"}}