{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:27:11Z","timestamp":1740173231703,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"14","license":[{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032005","61872089"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science Foundation of Fujian Provincial Science and Technology Agency","award":["2020J02016","2020J01171"]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council Discovery Project","doi-asserted-by":"publisher","award":["DP160100913"],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Data61 Research Collaborative Project"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,7,15]]},"DOI":"10.1109\/jiot.2021.3138989","type":"journal-article","created":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T21:24:19Z","timestamp":1640726659000},"page":"12563-12572","source":"Crossref","is-referenced-by-count":10,"title":["Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2735-2359","authenticated-orcid":false,"given":"Xu","family":"Yang","sequence":"first","affiliation":[{"name":"Center for Applied Mathematics of Fujian Province, School of Mathematics and Statistics, Fujian Normal University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7351-5724","authenticated-orcid":false,"given":"Xun","family":"Yi","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, Royal Melbourne Institute of Technology University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5512-114X","authenticated-orcid":false,"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, Royal Melbourne Institute of Technology University, Melbourne, VIC, Australia"}]},{"given":"Junwei","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, Royal Melbourne Institute of Technology University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4029-7051","authenticated-orcid":false,"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Cyber Center, Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"Distributed System Security Research Group, CSIRO Data61, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0070-1707","authenticated-orcid":false,"given":"Xinyi","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.121313.00064"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0609"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6616116"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416350"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416354"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1777406.1777410"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185454"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2018.2864796"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.007"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462095"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2422966.2422975"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.145"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2544805"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.09.008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.033"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2018.2870319"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2019.0491"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876133"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2922701"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3097759"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3059856"},{"article-title":"Digitalized signatures and public-key functions as intractable as factorization","year":"1979","author":"Rabin","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056264"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2003.814227"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04773-6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1142\/3254"},{"volume-title":"Seminumerical Algorithms","year":"2007","author":"Knuth","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_14"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9816842\/09663536.pdf?arnumber=9663536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:33:12Z","timestamp":1704846792000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9663536\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,15]]},"references-count":33,"journal-issue":{"issue":"14"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3138989","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2022,7,15]]}}}