{"id":"https://openalex.org/W2497816424","doi":"https://doi.org/10.1109/tdsc.2016.2596286","title":"A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network","display_name":"A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network","publication_year":2016,"publication_date":"2016-07-28","ids":{"openalex":"https://openalex.org/W2497816424","doi":"https://doi.org/10.1109/tdsc.2016.2596286","mag":"2497816424"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2016.2596286","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2596286","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Debiao He","raw_affiliation_strings":["State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100409306","display_name":"Neeraj Kumar","orcid":"https://orcid.org/0000-0002-3020-3947"},"institutions":[{"id":"https://openalex.org/I162030827","display_name":"Thapar Institute of Engineering & Technology","ror":"https://ror.org/00wdq3744","country_code":"IN","type":"education","lineage":["https://openalex.org/I162030827"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeraj Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Thapar University, Patiala, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Thapar University, Patiala, Punjab, India","institution_ids":["https://openalex.org/I162030827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056155495","display_name":"Lina Wang","orcid":"https://orcid.org/0000-0001-8085-1312"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["School of Computer Science, China University of Geosciences, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003670494","display_name":"Alexey Vinel","orcid":"https://orcid.org/0000-0003-4894-4134"},"institutions":[{"id":"https://openalex.org/I746986","display_name":"Halmstad University","ror":"https://ror.org/03h0qfp10","country_code":"SE","type":"education","lineage":["https://openalex.org/I746986"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Alexey Vinel","raw_affiliation_strings":["Halmstad University, Halmstad, Sweden"],"affiliations":[{"raw_affiliation_string":"Halmstad University, Halmstad, Sweden","institution_ids":["https://openalex.org/I746986"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5025668908"],"corresponding_institution_ids":["https://openalex.org/I4210132990"],"apc_list":null,"apc_paid":null,"fwci":18.014,"has_fulltext":false,"cited_by_count":142,"citation_normalized_percentile":{"value":0.99359675,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"15","issue":"4","first_page":"633","last_page":"645"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7890807390213013},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.6489388346672058},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6049154996871948},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.5665022134780884},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5584812760353088},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.5279254913330078},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4990730285644531},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4530853033065796},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4355704188346863},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4063962697982788},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2956886887550354},{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.15660429000854492}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7890807390213013},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.6489388346672058},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6049154996871948},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.5665022134780884},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5584812760353088},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.5279254913330078},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4990730285644531},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4530853033065796},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4355704188346863},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4063962697982788},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2956886887550354},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.15660429000854492}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2016.2596286","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2596286","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4925959090","display_name":null,"funder_award_id":"61501333","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8196122462","display_name":null,"funder_award_id":"61272522","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8895439857","display_name":null,"funder_award_id":"U1536204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8938912181","display_name":null,"funder_award_id":"61572379","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W992610958","https://openalex.org/W1511771844","https://openalex.org/W1569738112","https://openalex.org/W1601035209","https://openalex.org/W1667889362","https://openalex.org/W1768862631","https://openalex.org/W1968546160","https://openalex.org/W1973678227","https://openalex.org/W1984971831","https://openalex.org/W2004627384","https://openalex.org/W2019628618","https://openalex.org/W2021267336","https://openalex.org/W2025341587","https://openalex.org/W2025678318","https://openalex.org/W2039268893","https://openalex.org/W2049939281","https://openalex.org/W2056207325","https://openalex.org/W2077231121","https://openalex.org/W2090097330","https://openalex.org/W2102091280","https://openalex.org/W2112624137","https://openalex.org/W2122550224","https://openalex.org/W2134200858","https://openalex.org/W2136757778","https://openalex.org/W2137578140","https://openalex.org/W2138941041","https://openalex.org/W2139910984","https://openalex.org/W2158875209","https://openalex.org/W2169194339","https://openalex.org/W2242231635","https://openalex.org/W2262017117","https://openalex.org/W2337833343","https://openalex.org/W2524195644","https://openalex.org/W6634074769","https://openalex.org/W6635831302","https://openalex.org/W6675799949","https://openalex.org/W6692757041","https://openalex.org/W6703447790","https://openalex.org/W6727100321"],"related_works":["https://openalex.org/W2140125353","https://openalex.org/W2559950795","https://openalex.org/W2167743049","https://openalex.org/W3041975980","https://openalex.org/W211083189","https://openalex.org/W1542859216","https://openalex.org/W2016145875","https://openalex.org/W1966132871","https://openalex.org/W2970982858","https://openalex.org/W2283566633"],"abstract_inverted_index":{"With":[0],"rapid":[1],"developments":[2],"of":[3,21,42,56,88,186,220,227,243],"sensor,":[4],"wireless":[5,92],"and":[6,51,58,63,80,111,172,189,202,213,245,251],"mobile":[7,32],"communication":[8,22,106,204,252],"technologies,":[9],"Mobile":[10],"Healthcare":[11],"Social":[12],"Networks":[13],"(MHSNs)":[14],"have":[15],"emerged":[16],"as":[17,117],"a":[18,48,91,124,174,190,218,241],"popular":[19],"means":[20],"in":[23,107,131,217,248,254],"healthcare":[24,166],"services.":[25],"Within":[26],"MHSNs,":[27,75,132],"patients":[28,162],"can":[29,103,168],"use":[30],"their":[31,37,40],"devices":[33],"to":[34,85,224,256],"securely":[35],"share":[36],"experiences,":[38],"broaden":[39],"understanding":[41],"the":[43,71,86,128,157,184,187,195,209,228,232,236],"illness":[44],"or":[45],"symptoms,":[46],"form":[47],"supportive":[49],"network,":[50],"transmit":[52],"information":[53],"(e.g.,":[54,67,83,109],"state":[55],"health":[57],"new":[59,125],"symptoms)":[60],"between":[61,114],"users":[62],"other":[64,258],"stake":[65],"holders":[66],"medical":[68],"center).":[69],"Despite":[70],"benefits":[72],"afforded":[73],"by":[74],"there":[76],"are":[77],"underlying":[78],"security":[79,185],"privacy":[81],"issues":[82],"due":[84],"transmission":[87],"messages":[89],"via":[90],"channel).":[93],"The":[94],"handshake":[95,129,260],"scheme":[96,130,148,198,212,239],"is":[97,134],"an":[98,143],"important":[99],"cryptographic":[100],"mechanism,":[101],"which":[102,133],"provide":[104],"secure":[105,179],"MHSNs":[108],"anonymity":[110],"mutual":[112,170],"authentication":[113,171],"users,":[115],"such":[116],"patients).":[118],"In":[119],"this":[120],"paper,":[121],"we":[122],"present":[123],"framework":[126],"for":[127,177],"based":[135],"on":[136],"hierarchical":[137],"identity-based":[138],"cryptography.":[139],"We":[140,181,206],"then":[141,182],"construct":[142],"efficient":[144],"Cross-Domain":[145],"HandShake":[146],"(CDHS)":[147],"that":[149,194,235],"allows":[150],"symptoms-matching":[151],"within":[152],"MHSNs.":[153],"For":[154],"example,":[155],"using":[156],"proposed":[158,196,210,237],"CDHS":[159,197,211,238],"scheme,":[160,188],"two":[161],"registered":[163],"with":[164],"different":[165],"centers":[167],"achieve":[169],"generate":[173],"session":[175],"key":[176],"future":[178],"communications.":[180],"prove":[183],"comparative":[191],"summary":[192],"demonstrates":[193],"requires":[199],"fewer":[200],"computation":[201,249],"lower":[203],"costs.":[205],"also":[207],"implement":[208],"three":[214,257],"related":[215,259],"schemes":[216],"proof":[219],"concept":[221],"Android":[222],"app":[223],"demonstrate":[225,234],"utility":[226],"scheme.":[229],"Findings":[230],"from":[231],"evaluations":[233],"achieves":[240],"reduction":[242],"18.14":[244],"5.41":[246],"percent":[247],"cost":[250],"cost,":[253],"comparison":[255],"schemes.":[261]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":20},{"year":2019,"cited_by_count":19},{"year":2018,"cited_by_count":18},{"year":2017,"cited_by_count":14},{"year":2016,"cited_by_count":10}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
