{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:44:30Z","timestamp":1762875870930,"version":"3.41.0"},"reference-count":25,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300220"],"award-info":[{"award-number":["61300220"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001501","name":"University Grants Commission","doi-asserted-by":"publisher","award":["3(A)(60)31"],"award-info":[{"award-number":["3(A)(60)31"]}],"id":[{"id":"10.13039\/501100001501","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Electrical Engineering"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1016\/j.compeleceng.2017.04.012","type":"journal-article","created":{"date-parts":[[2017,4,25]],"date-time":"2017-04-25T13:00:48Z","timestamp":1493125248000},"page":"168-181","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":59,"special_numbering":"C","title":["A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server"],"prefix":"10.1016","volume":"63","author":[{"given":"Fan","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Marimuthu","family":"Karuppiah","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2017.04.012_bib0001","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.comnet.2016.01.006","article-title":"Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks","volume":"101","author":"Amin","year":"2016","journal-title":"Comput Netw"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0002","article-title":"A lightweight and anonymous rfid tag authentication protocol with cloud assistance for e-healthcare applications","author":"Wu","year":"2017","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0003","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MMM.2015.2394021","article-title":"Wearable wireless health monitoring: current developments, challenges, and future trends","volume":"16","author":"Soh","year":"2015","journal-title":"IEEE Microw Mag"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0004","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","article-title":"Authentication protocol for an ambient assisted living system","volume":"53","author":"He","year":"2015","journal-title":"IEEE Commun Mag"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0005","doi-asserted-by":"crossref","first-page":"9954","DOI":"10.1007\/s10916-013-9954-3","article-title":"An authentication scheme for secure access to healthcare services","volume":"37","author":"Khan","year":"2013","journal-title":"J Med Syst"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0006","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","article-title":"A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data","volume":"27","author":"Xia","year":"2016","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0007","doi-asserted-by":"crossref","first-page":"546","DOI":"10.1109\/TDSC.2014.2366471","article-title":"New publicly verifiable databases with efficient updates","volume":"12","author":"Chen","year":"2015","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0008","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/CC.2016.7559076","article-title":"Fingerprint liveness detection based on multi-scale lpq and pca","volume":"13","author":"Yuan","year":"2016","journal-title":"China Commun"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0009","doi-asserted-by":"crossref","first-page":"3184","DOI":"10.1109\/TC.2015.2512870","article-title":"Verifiable computation over large database with incremental updates","volume":"65","author":"Chen","year":"2016","journal-title":"IEEE Trans Comput"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0010","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","article-title":"Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement","volume":"11","author":"Fu","year":"2016","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0011","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","article-title":"A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing","volume":"11","author":"Xia","year":"2016","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0012","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","article-title":"Enabling personalized search over encrypted outsourced data with efficiency improvement","volume":"27","author":"Fu","year":"2016","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0013","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2017.03.013","article-title":"Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks","author":"Li","year":"2017","journal-title":"Comput Netw"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0014","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","article-title":"Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing","volume":"98","author":"Fu","year":"2015","journal-title":"IEICE Trans Commun"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0015","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MWC.2015.7054717","article-title":"Toward self-authenticable wearable devices","volume":"22","author":"Diez","year":"2015","journal-title":"IEEE Wireless Commun"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0016","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MCOM.2016.7452265","article-title":"Cloud-centric multi-level authentication as a service for secure public safety device networks","volume":"54","author":"Butun","year":"2016","journal-title":"IEEE Commun Mag"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0017","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.jnca.2015.10.001","article-title":"A novel asymmetric three-party based authentication scheme in wearable devices environment","volume":"60","author":"Liu","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0018","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s00779-016-0926-8","article-title":"The yoking-proof-based authentication protocol for cloud-assisted wearable devices","volume":"20","author":"Liu","year":"2016","journal-title":"Pers Ubiquitous Comput"},{"year":"2004","series-title":"Extensible authentication protocol (EAP)","author":"Aboba","key":"10.1016\/j.compeleceng.2017.04.012_bib0019"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0020","doi-asserted-by":"crossref","unstructured":"Juels A. \u201cYoking-proofs\u201d for rfid tags. in: Pervasive computing and communications workshops, 2004. Proceedings of the second IEEE annual conference on, IEEE, pp. 138\u2013143.","DOI":"10.1109\/PERCOMW.2004.1276920"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0021","unstructured":"Westry T. Wearable cloud could be less expensive, more powerful form of mobile computing. http:\/\/phys.org\/news\/2016-08-wearable-cloud-expensive-powerful-mobile.html; 2016. [Online:accessed 17-Sep-2016]."},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0022","unstructured":"Malladi S., Blanchet B.. Proverif. http:\/\/proverif.rocq.inria.fr\/; 2001. Online: Accessed Nov-15-2016."},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0023","unstructured":"Garg G. Qr code minimum size: calculate ideal size for your use case. https:\/\/scanova.io\/blog\/blog\/2015\/02\/20\/qr-code-minimum-size\/; 2015. [Online:accessed 17-Sep-2016]."},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0024","series-title":"Trusted computing for embedded systems","first-page":"115","article-title":"Physically unclonable function: principle, design and characterization of the loop puf","author":"Cherif","year":"2015"},{"key":"10.1016\/j.compeleceng.2017.04.012_bib0025","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1007\/s00779-012-0563-9","article-title":"Sn-sec: a secure wireless sensor platform with hardware cryptographic primitives","volume":"17","author":"Moh\u2019d","year":"2013","journal-title":"Pers Ubiquitous Comput"}],"container-title":["Computers &amp; Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790617308984?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790617308984?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:13:23Z","timestamp":1750205603000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790617308984"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":25,"alternative-id":["S0045790617308984"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2017.04.012","relation":{},"ISSN":["0045-7906"],"issn-type":[{"type":"print","value":"0045-7906"}],"subject":[],"published":{"date-parts":[[2017,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server","name":"articletitle","label":"Article Title"},{"value":"Computers & Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2017.04.012","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}