{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:57:09Z","timestamp":1726055829218},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811507571"},{"type":"electronic","value":"9789811507588"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-15-0758-8_8","type":"book-chapter","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T13:47:53Z","timestamp":1571838473000},"page":"95-109","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things"],"prefix":"10.1007","author":[{"given":"Chenyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ding","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haowei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guoai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,24]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Alhakbani, N., Hassan, M.M., Hossain, M.A., Alnuem, M.: A framework of adaptive interaction support in cloud-based internet of things (IoT) environment. In: Proceedings of the IDCS (Internet and Distributed Computing System), pp. 136\u2013146 (2014)","DOI":"10.1007\/978-3-319-11692-1_12"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1016\/j.future.2016.12.028","volume":"78","author":"R Amin","year":"2018","unstructured":"Amin, R., Kumar, N., Biswas, G., Iqbal, R., Chang, V.: A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Future Gener. Comput. Sys. 78, 1005\u20131019 (2018)","journal-title":"Future Gener. Comput. Sys."},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1016\/j.future.2015.09.021","volume":"56","author":"A Botta","year":"2016","unstructured":"Botta, A., De Donato, W., Persico, V., Pescap\u00e9, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Sys. 56, 684\u2013700 (2016)","journal-title":"Future Gener. Comput. Sys."},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M.L.: Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1086\u20131090 (2009)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"16","key":"8_CR5","doi-asserted-by":"publisher","first-page":"e3323","DOI":"10.1002\/dac.3323","volume":"30","author":"PK Dhillon","year":"2017","unstructured":"Dhillon, P.K., Kalra, S.: Secure multifactor remote user authentication scheme for Internet of Things environments. Int. J. Commun Syst 30(16), e3323 (2017)","journal-title":"Int. J. Commun Syst"},{"issue":"7","key":"8_CR6","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1631\/jzus.C1000377","volume":"12","author":"R Fan","year":"2011","unstructured":"Fan, R., He, D., Pan, X., Ping, L.: An efficient and dos-resistant user authentication scheme for two-tiered wireless sensor networks. J. Zhejinag Univ. Sci. C 12(7), 550\u2013560 (2011)","journal-title":"J. Zhejinag Univ. Sci. C"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","volume":"36","author":"MS Farash","year":"2016","unstructured":"Farash, M.S., Turkanovi\u0107, M., Kumari, S., H\u00f6lbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Netw. 36, 152\u2013176 (2016)","journal-title":"Ad Hoc Netw."},{"issue":"7","key":"8_CR8","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Sys. 29(7), 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Sys."},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.comnet.2016.01.009","volume":"101","author":"MS Hossain","year":"2016","unstructured":"Hossain, M.S., Muhammad, G.: Cloud-assisted Industrial Internet of Things (IIoT)-enabled framework for health monitoring. Comput. Netw. 101, 192\u2013202 (2016)","journal-title":"Comput. Netw."},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"3376","DOI":"10.1109\/ACCESS.2017.2673239","volume":"5","author":"Q Jiang","year":"2017","unstructured":"Jiang, Q., Zeadally, S., Ma, J., He, D.: Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5, 3376\u20133392 (2017)","journal-title":"IEEE Access"},{"issue":"3","key":"8_CR11","doi-asserted-by":"publisher","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"M Khan","year":"2010","unstructured":"Khan, M., Alghathbar, K.: Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10(3), 2450\u20132459 (2010)","journal-title":"Sensors"},{"issue":"5","key":"8_CR12","doi-asserted-by":"publisher","first-page":"889","DOI":"10.4218\/etrij.13.0113.0103","volume":"35","author":"P Kumar","year":"2013","unstructured":"Kumar, P., Gurtov, A., Ylianttila, M., Lee, S., Lee, H.: A strong authentication scheme with user privacy for wireless sensor networks. ETRI J. 35(5), 889\u2013899 (2013)","journal-title":"ETRI J."},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jnca.2017.07.001","volume":"103","author":"X Li","year":"2018","unstructured":"Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.R.: A three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments. J. Netw. Comput. Appl. 103, 194\u2013204 (2018)","journal-title":"J. Netw. Comput. Appl."},{"issue":"8","key":"8_CR14","doi-asserted-by":"publisher","first-page":"3599","DOI":"10.1109\/TII.2017.2773666","volume":"14","author":"X Li","year":"2018","unstructured":"Li, X., Niu, J., Bhuiyan, M.Z.A., Wu, F., Karuppiah, M., Kumari, S.: A robust ecc-based provable secure authentication protocol with privacy preserving for industrial internet of things. IEEE Trans. Ind. Inform. 14(8), 3599\u20133609 (2018)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"10","key":"8_CR15","first-page":"2215","volume":"27","author":"C Mal","year":"2012","unstructured":"Mal, C., Wang, D., Zhao, S.: Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun Syst 27(10), 2215\u20132227 (2012)","journal-title":"Int. J. Commun Syst"},{"issue":"6","key":"8_CR16","first-page":"50","volume":"53","author":"P Mell","year":"2009","unstructured":"Mell, P., Grance, T., et al.: The nist definition of cloud computing. NatI. Inst. Stand. Technol 53(6), 50 (2009)","journal-title":"NatI. Inst. Stand. Technol"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"4394","DOI":"10.1109\/ACCESS.2016.2596292","volume":"4","author":"AG Reddy","year":"2016","unstructured":"Reddy, A.G., Das, A.K., Yoon, E.J., Yoo, K.Y.: A secure anonymous authentication protocol for mobile services on elliptic curve cryptography. IEEE Access 4, 4394\u20134407 (2016)","journal-title":"IEEE Access"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.jnca.2018.01.003","volume":"106","author":"J Shen","year":"2018","unstructured":"Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y.: Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106, 117\u2013123 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Srinivas, J., Das, A.K., Wazid, M., Kumar, N.: Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of Things (2018). \n https:\/\/doi.org\/10.1109\/TDSC.2018.2857811","DOI":"10.1109\/TDSC.2018.2857811"},{"issue":"5","key":"8_CR20","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1007\/s00779-012-0540-3","volume":"17","author":"D Sun","year":"2013","unstructured":"Sun, D., Li, J., Feng, Z., Cao, Z., Xu, G.: On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Pers. Ubiquitous Comput. 17(5), 895\u2013905 (2013)","journal-title":"Pers. Ubiquitous Comput."},{"issue":"12","key":"8_CR21","doi-asserted-by":"publisher","first-page":"2946","DOI":"10.3390\/s17122946","volume":"17","author":"C Wang","year":"2017","unstructured":"Wang, C., Xu, G., Sun, J.: An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12), 2946 (2017)","journal-title":"Sensors"},{"issue":"C","key":"8_CR22","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","volume":"73","author":"D Wang","year":"2014","unstructured":"Wang, D., Wang, P.: On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73(C), 41\u201357 (2014)","journal-title":"Comput. Netw."},{"issue":"4","key":"8_CR23","first-page":"708","volume":"15","author":"D Wang","year":"2018","unstructured":"Wang, D., Wang, P.: Two birds with one stone: two-factor authentication with security beyond conventional bound. IEEE Trans. Depend. Secur. Comput. 15(4), 708\u2013722 (2018)","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"issue":"9","key":"8_CR24","doi-asserted-by":"publisher","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","volume":"14","author":"D Wang","year":"2018","unstructured":"Wang, D., Li, W., Wang, P.: Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Ind. Inform. 14(9), 4081\u20134092 (2018)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"1","key":"8_CR25","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2017.2780232","volume":"5","author":"M Wazid","year":"2018","unstructured":"Wazid, M., Das, A.K., Khan, M.K., Al-Ghaiheb, A.D., Kumar, N., Vasilakos, A.: Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet of Things J. 5(1), 269\u2013282 (2018)","journal-title":"IEEE Internet of Things J."},{"key":"8_CR26","doi-asserted-by":"publisher","unstructured":"Wazid, M., Das, A.K., Odelu, V., Kumar, N., Susilo, W.: Secure remote user authenticated key establishment protocol for smart home environment (2017). \n https:\/\/doi.org\/10.1109\/TDSC.2017.2764083","DOI":"10.1109\/TDSC.2017.2764083"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.jnca.2016.12.008","volume":"89","author":"F Wu","year":"2017","unstructured":"Wu, F., et al.: An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89, 72\u201385 (2017)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0758-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T21:08:18Z","timestamp":1571864898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0758-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811507571","9789811507588"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0758-8_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/socialsec2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"76","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"http:\/\/nsclab.org\/socialsec2019\/","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}