{"id":"https://openalex.org/W2538597902","doi":"https://doi.org/10.1109/iccchina.2016.7636868","title":"Device-invisible two-factor authenticated key agreement protocol for BYOD","display_name":"Device-invisible two-factor authenticated key agreement protocol for BYOD","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2538597902","doi":"https://doi.org/10.1109/iccchina.2016.7636868","mag":"2538597902"},"language":"en","primary_location":{"id":"doi:10.1109/iccchina.2016.7636868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccchina.2016.7636868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033931001","display_name":"Jianbing Ni","orcid":"https://orcid.org/0000-0002-5639-0883"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Jianbing Ni","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083787204","display_name":"Xiaodong Lin","orcid":"https://orcid.org/0000-0001-8916-6645"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xiaodong Lin","raw_affiliation_strings":["Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada","institution_ids":["https://openalex.org/I39470171"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100736887","display_name":"Kuan Zhang","orcid":"https://orcid.org/0000-0002-4262-153X"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Kuan Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada","institution_ids":["https://openalex.org/I151746483"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100419998","display_name":"Yong Yu","orcid":"https://orcid.org/0000-0002-0187-2439"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Yu","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100773343","display_name":"Xuemin Shen","orcid":"https://orcid.org/0000-0002-4140-287X"},"institutions":[{"id":"https://openalex.org/I39470171","display_name":"University of Ontario Institute of Technology","ror":"https://ror.org/016zre027","country_code":"CA","type":"education","lineage":["https://openalex.org/I39470171"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xuemin Sherman Shen","raw_affiliation_strings":["Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada","institution_ids":["https://openalex.org/I39470171"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5033931001"],"corresponding_institution_ids":["https://openalex.org/I151746483"],"apc_list":null,"apc_paid":null,"fwci":0.8686,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78100992,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"1807","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5723724365234375},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5643517374992371},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.555800199508667},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46430590748786926},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.4414587616920471},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.18454191088676453},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09794551134109497},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.06807070970535278}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5723724365234375},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5643517374992371},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.555800199508667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46430590748786926},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.4414587616920471},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.18454191088676453},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09794551134109497},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.06807070970535278},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccchina.2016.7636868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccchina.2016.7636868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE/CIC International Conference on Communications in China (ICCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W143625700","https://openalex.org/W1589843374","https://openalex.org/W1982223249","https://openalex.org/W2001163651","https://openalex.org/W2036551294","https://openalex.org/W2041659077","https://openalex.org/W2055126077","https://openalex.org/W2059134215","https://openalex.org/W2093484578","https://openalex.org/W2138157523","https://openalex.org/W2170552299","https://openalex.org/W2210273213","https://openalex.org/W2217570753","https://openalex.org/W2294137680","https://openalex.org/W2299804167","https://openalex.org/W2484489497","https://openalex.org/W6650672680"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W1837027913","https://openalex.org/W4312674866"],"abstract_inverted_index":{"\u201cBring":[0],"Your":[1],"Own":[2],"Device\u201d":[3],"(BYOD)":[4],"allows":[5],"employees":[6],"to":[7,13,19,83,112,151,161,173],"bring":[8],"their":[9,14],"own":[10],"mobile":[11,128,137],"devices":[12,129,138],"workplace":[15],"and":[16,23,35,46,69,76,86,170],"use":[17],"them":[18],"access":[20,113],"corporate":[21,44],"information":[22],"applications.":[24],"However,":[25],"BYOD":[26],"causes":[27],"serious":[28],"security":[29],"issues":[30],"against":[31],"the":[32,43,48,77,97,102,109,114,117,122,134,146,162,168,175],"data":[33,45,78,98,118,147,163],"protection":[34],"device":[36,49,75,108,157],"management":[37,50,139],"obligations":[38],"of":[39,126,130,136,177],"corporations.":[40],"To":[41],"protect":[42],"simplify":[47],"for":[51,91,140],"BYOD,":[52,73],"in":[53],"this":[54,95],"paper,":[55],"we":[56,166],"propose":[57],"a":[58,88,153],"device-invisible":[59],"two-factor":[60],"authenticated":[61],"key":[62,90],"agreement":[63],"protocol":[64],"(Dtaka)":[65],"based":[66],"on":[67],"identity-based":[68],"password-based":[70],"authentications.":[71],"With":[72],"every":[74],"server":[79,99,119,148],"can":[80,100],"mutually":[81],"authenticate":[82],"each":[84],"other":[85],"negotiate":[87],"session":[89],"secure":[92],"communications.":[93],"During":[94],"process,":[96],"learn":[101],"employee's":[103],"identity":[104],"rather":[105],"than":[106],"which":[107],"employee":[110],"uses":[111],"data.":[115],"Thus,":[116],"only":[120],"manages":[121],"employees'":[123],"identities,":[124],"instead":[125],"all":[127],"employees,":[131],"such":[132],"that":[133],"overhead":[135],"corporations":[141],"is":[142,149],"reduced.":[143],"In":[144],"addition,":[145],"able":[150],"trace":[152],"lost":[154],"or":[155],"stolen":[156],"when":[158],"it":[159],"authenticates":[160],"server.":[164],"Finally,":[165],"evaluate":[167],"computational":[169],"communication":[171],"overheads":[172],"demonstrate":[174],"efficiency":[176],"Dtaka.":[178]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
