{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T04:48:04Z","timestamp":1777697284311,"version":"3.51.4"},"reference-count":19,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDT"],"published-print":{"date-parts":[[2019,5,17]]},"DOI":"10.3233\/idt-170182","type":"journal-article","created":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T16:43:23Z","timestamp":1553618603000},"page":"211-218","source":"Crossref","is-referenced-by-count":1,"title":["Enhanced secure transmission of data in WBAN with predictive model for health care applications"],"prefix":"10.1177","volume":"13","author":[{"given":"Sumit","family":"Kumar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anurag\u00a0Singh","family":"Tomar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sandip\u00a0K.","family":"Chaurasiya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","reference":[{"issue":"2","key":"10.3233\/IDT-170182_ref1","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.eij.2016.11.001","article-title":"Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications","volume":"18","author":"Al-Janabi","year":"2017","journal-title":"Egypt. Inf. J"},{"key":"10.3233\/IDT-170182_ref2","doi-asserted-by":"crossref","unstructured":"Sangari S, Manickam JML. Public key cryptosystem based security in wireless body area network. in: International Conference on Circuits, Power and Computing Technologie. 2014; 1609-1612.","DOI":"10.1109\/ICCPCT.2014.7054788"},{"key":"10.3233\/IDT-170182_ref3","doi-asserted-by":"crossref","first-page":"1464","DOI":"10.1109\/25.875284","article-title":"Digital multisignature schemes for authenticating delegates in mobile code systems","volume":"49","author":"Shieh","year":"2000","journal-title":"IEEE Trans. Veh. Technol"},{"key":"10.3233\/IDT-170182_ref4","unstructured":"Chang CC, Lu EH, Pon SF, Lee JY. Applying Harn-Kiesler multisignature scheme to electronic document systems. in: Proceedings of National Information Security Conferenc. 1995; 35-38."},{"issue":"4","key":"10.3233\/IDT-170182_ref5","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1109\/LCOMM.2005.1413633","article-title":"Cryptanalysis of Chang et al\u2019s. signature scheme with message recovery","volume":"9","author":"Zhang","year":"2005","journal-title":"IEEE Commun. Lett"},{"issue":"5","key":"10.3233\/IDT-170182_ref6","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1109\/LCOMM.2006.1633310","article-title":"Forgery attacks on digital signature schemes without sing one-way hash and message redundancy","volume":"10","author":"Chien","year":"2006","journal-title":"IEEE Commun. Lett"},{"issue":"8","key":"10.3233\/IDT-170182_ref7","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/LCOMM.2004.832732","article-title":"Signing a digital signature without using one-way hash functions and message redundancy schemes","volume":"8","author":"Chang","year":"2004","journal-title":"IEEE Commun. Lett"},{"issue":"5","key":"10.3233\/IDT-170182_ref8","first-page":"18","article-title":"Digital signature scheme without hash functions and message redundancy","volume":"27","author":"Kang","year":"2006","journal-title":"J. Commun"},{"key":"10.3233\/IDT-170182_ref9","unstructured":"Wong CK, Lam SS. Digital signatures for flows and multicasts. in: Proceedings of the Sixth International Conference on Network Protocols. (ICN 1998); 198-209."},{"issue":"11","key":"10.3233\/IDT-170182_ref10","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.1109\/TMC.2012.119","article-title":"A comment on \u201cMABS: multicast authentication based on batch signature\u201d","volume":"11","author":"Zhu","year":"2012","journal-title":"IEEE Trans. Mob. Comput"},{"key":"10.3233\/IDT-170182_ref11","unstructured":"Park JM, Chong EKP, Siegel HJ. Efficient multicast packet authentication using signature amortization. in: Proceedings of IEEE Symposium on Security and Privacy. 2002; 227-240."},{"key":"10.3233\/IDT-170182_ref12","first-page":"236","article-title":"Fast batch verification for modular exponentiation and digital signatures","volume":"1403","author":"Bellare","year":"1998","journal-title":"EUROCRYPT Springer"},{"issue":"4","key":"10.3233\/IDT-170182_ref13","doi-asserted-by":"crossref","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","article-title":"Anonymous authentication for wireless body area networks with provable security","volume":"11","author":"He","year":"2017","journal-title":"IEEE Syst. J"},{"key":"10.3233\/IDT-170182_ref14","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.comnet.2017.03.013","article-title":"Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks","volume":"129","author":"Li","year":"2017","journal-title":"Comput. Netw"},{"key":"10.3233\/IDT-170182_ref15","unstructured":"Goodman RMF, McAuley AJ. New trapdoor-knapsack public-key cryptosystem. IEE Proc. E \u2013 Comput. Digit. Tech. 1985; 132(6): 289-292."},{"key":"10.3233\/IDT-170182_ref16","doi-asserted-by":"crossref","unstructured":"Kanchan BD, Kishor MM. Study of machine learning algorithms for special disease prediction using principal of component analysis. International Conference on Global Trends in Signal Processing, Information Computing and Communication, Jalgao. 2016; 5-10.","DOI":"10.1109\/ICGTSPICC.2016.7955260"},{"key":"10.3233\/IDT-170182_ref17","doi-asserted-by":"crossref","first-page":"8869","DOI":"10.1109\/ACCESS.2017.2694446","article-title":"Disease prediction by machine learning over big data from healthcare communities","volume":"5","author":"Chen","year":"2017","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-170182_ref18","unstructured":"Kumar S, Tomar AS, Chaurasiya SK. Enhanced secure transmission of data in wireless body area network for health care applications. 3rd International Conference on Next Generation Computing Technologies (NGCT 2017), Springer. 2017; 828: 138-145."},{"key":"10.3233\/IDT-170182_ref19","doi-asserted-by":"crossref","unstructured":"Tomar AS, Singh M, Sharma G, Arya KV. Traffic management using logistic regression with fuzzy logic. International Conference on Computational Intelligence and Data Scienc. 2018; 132: 451-460.","DOI":"10.1016\/j.procs.2018.05.159"}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDT-170182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:22:32Z","timestamp":1777454552000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDT-170182"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,17]]},"references-count":19,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/idt-170182","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"value":"1872-4981","type":"print"},{"value":"1875-8843","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,17]]}}}