{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T11:17:53Z","timestamp":1720523873831},"reference-count":42,"publisher":"Hindawi Limited","issue":"12","license":[{"start":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T00:00:00Z","timestamp":1624320000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T00:00:00Z","timestamp":1624320000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J of Intelligent Sys"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1002\/int.22544","type":"journal-article","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T05:41:24Z","timestamp":1624426884000},"page":"10442-10461","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Group key agreement protocol among terminals of the intelligent information system for mobile edge computing"],"prefix":"10.1155","volume":"37","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6117-5686","authenticated-orcid":false,"given":"Qikun","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8617-4121","authenticated-orcid":false,"given":"Liang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0399-8115","authenticated-orcid":false,"given":"Ruifang","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5593-8264","authenticated-orcid":false,"given":"Jianyong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6734-9256","authenticated-orcid":false,"given":"Junling","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6334-0411","authenticated-orcid":false,"given":"Tiancai","family":"Liang","sequence":"additional","affiliation":[{"name":"GRG Banking Equipment Co. Ltd. Guangzhou China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5270-5809","authenticated-orcid":false,"given":"Jun","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security Beijing Institute of Technology Beijing China"}]}],"member":"98","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3633"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.067"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2931932"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2019.0177"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.11.002"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RAIT.2018.8388999"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2725953"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2447933"},{"issue":"1","key":"e_1_2_8_10_1","first-page":"90","article-title":"Authenticated group key agreement protocols for ad hoc wireless networks","volume":"4","author":"Abdel\u2010Hafez A","year":"2007","journal-title":"Int\u00a0J\u00a0Network Secur"},{"key":"e_1_2_8_11_1","first-page":"876","article-title":"An authenticated group key agreement scheme for wireless sensor networks based on bilinear pairings","volume":"846","author":"Chen LQ","year":"2014","journal-title":"Adv\u00a0Mater\u00a0Res\u00a0Trans\u00a0Technol\u00a0Publ\u00a0Ltd"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107388"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.024"},{"issue":"8","key":"e_1_2_8_14_1","first-page":"2042","article-title":"A hierarchical route key tree based group key management for wireless sensor networks","volume":"7","author":"Jiang R","year":"2013","journal-title":"KSII Trans\u00a0Internet Inf\u00a0Syst"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.023"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2018.00014"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.002"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2018.00-38"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.11.013"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2008-3"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22330"},{"issue":"1","key":"e_1_2_8_22_1","first-page":"93","article-title":"On the security of authenticated group key agreement protocols","volume":"20","author":"Bala S","year":"2019","journal-title":"Scalable Comput"},{"issue":"4","key":"e_1_2_8_23_1","first-page":"31","article-title":"Towards detecting and classifying malicious URLs using deep learning","volume":"11","author":"Johnson C","year":"2020","journal-title":"Depend\u00a0Appl"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.08.013"},{"key":"e_1_2_8_25_1","first-page":"49","article-title":"Detection and classification of radio frequency jamming attacks using machine learning","volume":"11","author":"Kasturi GS","year":"2020","journal-title":"Depend Appl"},{"key":"e_1_2_8_26_1","first-page":"330","article-title":"Practical supersingular isogeny group key agreement","volume":"2019","author":"Azarderakhsh R","year":"2019","journal-title":"IACR Cryptol\u00a0ePrint Arch"},{"issue":"2","key":"e_1_2_8_27_1","first-page":"3","article-title":"Why would we get attacked? An analysis of attackeras aims behind DDoS attacker's","volume":"11","author":"Abhishta A","year":"2020","journal-title":"Depend Appl"},{"issue":"4","key":"e_1_2_8_28_1","first-page":"582","article-title":"A dynamic ID based authenticated group key agreement protocol from pairing","volume":"21","author":"Nathani S","year":"2019","journal-title":"Int J Network Secur"},{"issue":"2","key":"e_1_2_8_29_1","first-page":"1","article-title":"Identification of attacks against wireless sensor networks based on behaviour analysis","volume":"10","author":"Korzhuk V","year":"2019","journal-title":"Depend Appl"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2016.7919666"},{"issue":"2","key":"e_1_2_8_31_1","first-page":"1","article-title":"5G core network security issues and attack classification from network protocol perspective","volume":"10","author":"Kim H","year":"2020","journal-title":"J\u00a0Internet Serv\u00a0Inf\u00a0Secur"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799007"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/mma.3802"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896387.2900322"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926404"},{"issue":"4","key":"e_1_2_8_36_1","first-page":"1","article-title":"Towards detecting and classifying network intrusion traffic using deep learning frameworks","volume":"9","author":"Basnet RB","year":"2019","journal-title":"J\u00a0Internet Serv\u00a0Inf\u00a0Secur"},{"issue":"5","key":"e_1_2_8_37_1","first-page":"225","article-title":"An improved random key predistribution scheme for wireless sensor networks using deployment knowledge","volume":"10","author":"Zhu LN","year":"2016","journal-title":"Int\u00a0J\u00a0Secur\u00a0Appl"},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2761700"},{"issue":"1","key":"e_1_2_8_39_1","first-page":"48","article-title":"Efficient android malware detection using API rank and machine learning","volume":"9","author":"Jung J","year":"2019","journal-title":"J\u00a0Internet Serv\u00a0Inf\u00a0Secur"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717741570"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2018.05.010"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1759-3"},{"key":"e_1_2_8_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2019.8925248"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22544","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/int.22544","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.22544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:33:05Z","timestamp":1675956785000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.22544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,22]]},"references-count":42,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["10.1002\/int.22544"],"URL":"https:\/\/doi.org\/10.1002\/int.22544","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,22]]},"assertion":[{"value":"2021-02-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-31","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}