{"id":"https://openalex.org/W2091299352","doi":"https://doi.org/10.1109/tifs.2015.2414399","title":"Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks","display_name":"Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks","publication_year":2015,"publication_date":"2015-03-18","ids":{"openalex":"https://openalex.org/W2091299352","doi":"https://doi.org/10.1109/tifs.2015.2414399","mag":"2091299352"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2015.2414399","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2414399","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100643589","display_name":"Hu Xiong","orcid":"https://orcid.org/0000-0001-6137-6667"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hu Xiong","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","School of Information and Software Engineering, University of Electronic Science & Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science & Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045032131","display_name":"Zhiguang Qin","orcid":"https://orcid.org/0000-0001-6745-6377"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiguang Qin","raw_affiliation_strings":["School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","School of Information and Software Engineering, University of Electronic Science & Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Information and Software Engineering, University of Electronic Science & Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100643589"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":16.1159,"has_fulltext":false,"cited_by_count":180,"citation_normalized_percentile":{"value":0.99148879,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"10","issue":"7","first_page":"1442","last_page":"1455"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8342828750610352},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.7181568145751953},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6851781010627747},{"id":"https://openalex.org/keywords/revocation","display_name":"Revocation","score":0.6200852394104004},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.6131356358528137},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5747987627983093},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5677156448364258},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5045453310012817},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49037599563598633},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.45336654782295227},{"id":"https://openalex.org/keywords/revocation-list","display_name":"Revocation list","score":0.4357036352157593},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.41823810338974},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41471806168556213},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.36050093173980713},{"id":"https://openalex.org/keywords/public-key-infrastructure","display_name":"Public key infrastructure","score":0.2562748193740845}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8342828750610352},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.7181568145751953},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6851781010627747},{"id":"https://openalex.org/C2775892892","wikidata":"https://www.wikidata.org/wiki/Q6509517","display_name":"Revocation","level":3,"score":0.6200852394104004},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.6131356358528137},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5747987627983093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5677156448364258},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5045453310012817},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49037599563598633},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.45336654782295227},{"id":"https://openalex.org/C147296133","wikidata":"https://www.wikidata.org/wiki/Q196765","display_name":"Revocation list","level":5,"score":0.4357036352157593},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.41823810338974},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41471806168556213},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.36050093173980713},{"id":"https://openalex.org/C72648740","wikidata":"https://www.wikidata.org/wiki/Q658476","display_name":"Public key infrastructure","level":4,"score":0.2562748193740845},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2015.2414399","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2015.2414399","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5193889815","display_name":null,"funder_award_id":"61370026","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G685846593","display_name":null,"funder_award_id":"61202445","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8117633282","display_name":null,"funder_award_id":"ZYGX2013J073","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8325581365","display_name":null,"funder_award_id":"61003230","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8445320079","display_name":null,"funder_award_id":"2014JY0041","funder_id":"https://openalex.org/F4320333337","funder_display_name":"Applied Basic Research Program of Sichuan Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320333337","display_name":"Applied Basic Research Program of Sichuan Province","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W175905600","https://openalex.org/W1481735483","https://openalex.org/W1484437324","https://openalex.org/W1525576396","https://openalex.org/W1563430617","https://openalex.org/W1569083856","https://openalex.org/W1591524234","https://openalex.org/W1637905077","https://openalex.org/W1643928249","https://openalex.org/W1966132871","https://openalex.org/W1973102675","https://openalex.org/W1973675857","https://openalex.org/W1986771771","https://openalex.org/W1996912680","https://openalex.org/W2001199719","https://openalex.org/W2002489790","https://openalex.org/W2010588602","https://openalex.org/W2038418650","https://openalex.org/W2039432955","https://openalex.org/W2046058680","https://openalex.org/W2046793054","https://openalex.org/W2048887528","https://openalex.org/W2052267638","https://openalex.org/W2054938238","https://openalex.org/W2055335386","https://openalex.org/W2056442302","https://openalex.org/W2065043957","https://openalex.org/W2083102442","https://openalex.org/W2089437326","https://openalex.org/W2091291608","https://openalex.org/W2097422349","https://openalex.org/W2101018255","https://openalex.org/W2106116277","https://openalex.org/W2113446256","https://openalex.org/W2114024372","https://openalex.org/W2122729527","https://openalex.org/W2137093189","https://openalex.org/W2141375261","https://openalex.org/W2152458943","https://openalex.org/W2152924492","https://openalex.org/W2159456336","https://openalex.org/W2159470470","https://openalex.org/W2168286615","https://openalex.org/W2168571148","https://openalex.org/W2168678668","https://openalex.org/W2170577408","https://openalex.org/W2184323066","https://openalex.org/W6609405457","https://openalex.org/W6628622430","https://openalex.org/W6631601739","https://openalex.org/W6636742533","https://openalex.org/W6636882991","https://openalex.org/W6664366478","https://openalex.org/W6671828919","https://openalex.org/W6684593253","https://openalex.org/W6686064534"],"related_works":["https://openalex.org/W2106031811","https://openalex.org/W791333163","https://openalex.org/W2520171581","https://openalex.org/W284682584","https://openalex.org/W2924208536","https://openalex.org/W2526146985","https://openalex.org/W1563487782","https://openalex.org/W4283656462","https://openalex.org/W3143142693","https://openalex.org/W4287330711"],"abstract_inverted_index":{"To":[0],"ensure":[1],"the":[2,7,12,23,27,33,37,42,73,113,131,135,138,142,150,161,165,173,183,191],"security":[3],"and":[4,36,67,82,117,178,195],"privacy":[5],"of":[6,98,144,152,168],"patient's":[8],"health":[9],"status":[10],"in":[11,72,134,149,190],"wireless":[13],"body":[14],"area":[15],"networks":[16],"(WBANs),":[17],"it":[18],"is":[19,109,123,127,160,187],"critical":[20],"to":[21],"secure":[22,189],"extra-body":[24,70],"communication":[25,71],"between":[26],"smart":[28],"portable":[29],"device":[30],"held":[31],"by":[32,111],"WBAN":[34],"client":[35,62],"application":[38],"providers,":[39],"such":[40],"as":[41,156],"hospital,":[43],"physician":[44],"or":[45],"medical":[46],"staff.":[47],"Based":[48],"on":[49,141],"certificateless":[50,79,84,103],"cryptography,":[51],"this":[52,159],"paper":[53],"proposes":[54],"a":[55,78,83,102],"remote":[56,105,170],"authentication":[57,106,171,185],"protocol":[58,186],"featured":[59],"with":[60,87,107],"nonrepudiation,":[61],"anonymity,":[63],"key":[64,92],"escrow":[65],"resistance,":[66],"revocability":[68],"for":[69,130,172],"WBANs.":[74,174],"First,":[75],"we":[76,95,157],"present":[77],"encryption":[80,115],"scheme":[81,86,116],"signature":[85,118],"efficient":[88],"revocation":[89,108,121,166],"against":[90],"short-term":[91],"exposure,":[93],"which":[94,126],"believe":[96],"are":[97],"independent":[99],"interest.":[100],"Then,":[101],"anonymous":[104,169],"constructed":[110],"incorporating":[112],"proposed":[114,184],"scheme.":[119],"Our":[120],"mechanism":[122],"highly":[124,196],"scalable,":[125],"especially":[128],"suitable":[129],"large-scale":[132],"WBANs,":[133],"sense":[136],"that":[137,182],"key-update":[139],"overhead":[140],"side":[143],"trusted":[145],"party":[146],"increased":[147],"logarithmically":[148],"number":[151],"users.":[153],"As":[154],"far":[155],"know,":[158],"first":[162],"time":[163],"considering":[164],"functionality":[167],"Both":[175],"theoretic":[176],"analysis":[177],"experimental":[179],"simulations":[180],"show":[181],"provably":[188],"random":[192],"oracle":[193],"model":[194],"practical.":[197]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":20},{"year":2021,"cited_by_count":25},{"year":2020,"cited_by_count":22},{"year":2019,"cited_by_count":34},{"year":2018,"cited_by_count":17},{"year":2017,"cited_by_count":14},{"year":2016,"cited_by_count":14},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-07T14:57:38.498316","created_date":"2025-10-10T00:00:00"}
