{"id":"https://openalex.org/W4409723585","doi":"https://doi.org/10.1109/tnsm.2025.3563637","title":"A Security-Enhanced Certificateless Anonymous Authentication Scheme With High Computational Efficiency for Mobile Edge Computing","display_name":"A Security-Enhanced Certificateless Anonymous Authentication Scheme With High Computational Efficiency for Mobile Edge Computing","publication_year":2025,"publication_date":"2025-04-23","ids":{"openalex":"https://openalex.org/W4409723585","doi":"https://doi.org/10.1109/tnsm.2025.3563637"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2025.3563637","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3563637","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027249698","display_name":"Junfeng Tian","orcid":"https://orcid.org/0000-0001-6508-6050"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junfeng Tian","raw_affiliation_strings":["Key Laboratory on High Trusted Information System, School of Cyberspace Security and Computer, Hebei University, Baoding, China","Key Laboratory on High Trusted Information System, Hebei University School of Cyberspace Security and Computer, Baoding, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory on High Trusted Information System, School of Cyberspace Security and Computer, Hebei University, Baoding, China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"Key Laboratory on High Trusted Information System, Hebei University School of Cyberspace Security and Computer, Baoding, China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102836542","display_name":"Yiting Wang","orcid":"https://orcid.org/0009-0001-1085-1621"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiting Wang","raw_affiliation_strings":["Key Laboratory on High Trusted Information System, School of Cyberspace Security and Computer, Hebei University, Baoding, China","Key Laboratory on High Trusted Information System, Hebei University School of Cyberspace Security and Computer, Baoding, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory on High Trusted Information System, School of Cyberspace Security and Computer, Hebei University, Baoding, China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"Key Laboratory on High Trusted Information System, Hebei University School of Cyberspace Security and Computer, Baoding, China","institution_ids":["https://openalex.org/I43337087"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055294540","display_name":"Yue Shen","orcid":"https://orcid.org/0009-0006-9827-1870"},"institutions":[{"id":"https://openalex.org/I43337087","display_name":"Hebei University","ror":"https://ror.org/01p884a79","country_code":"CN","type":"education","lineage":["https://openalex.org/I43337087"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Shen","raw_affiliation_strings":["Key Laboratory on High Trusted Information System, School of Cyberspace Security and Computer, Hebei University, Baoding, China","Key Laboratory on High Trusted Information System, Hebei University School of Cyberspace Security and Computer, Baoding, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory on High Trusted Information System, School of Cyberspace Security and Computer, Hebei University, Baoding, China","institution_ids":["https://openalex.org/I43337087"]},{"raw_affiliation_string":"Key Laboratory on High Trusted Information System, Hebei University School of Cyberspace Security and Computer, Baoding, China","institution_ids":["https://openalex.org/I43337087"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027249698"],"corresponding_institution_ids":["https://openalex.org/I43337087"],"apc_list":null,"apc_paid":null,"fwci":2.8392,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.90374712,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"22","issue":"4","first_page":"3555","last_page":"3572"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8255618810653687},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6054577827453613},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6028164625167847},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5469390153884888},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.5422786474227905},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.477277934551239},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.46630966663360596},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14979398250579834},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.13633868098258972}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8255618810653687},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6054577827453613},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6028164625167847},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5469390153884888},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.5422786474227905},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.477277934551239},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.46630966663360596},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14979398250579834},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.13633868098258972},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3563637","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3563637","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7278664799","display_name":null,"funder_award_id":"F2021201058","funder_id":"https://openalex.org/F4320322163","funder_display_name":"Natural Science Foundation of Hebei Province"},{"id":"https://openalex.org/G7383572105","display_name":null,"funder_award_id":"F2021201049","funder_id":"https://openalex.org/F4320322163","funder_display_name":"Natural Science Foundation of Hebei Province"}],"funders":[{"id":"https://openalex.org/F4320322163","display_name":"Natural Science Foundation of Hebei Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1500958697","https://openalex.org/W2121247918","https://openalex.org/W2137469879","https://openalex.org/W2146813141","https://openalex.org/W2195615353","https://openalex.org/W2254700249","https://openalex.org/W2547727199","https://openalex.org/W2558368374","https://openalex.org/W2602552110","https://openalex.org/W2604733939","https://openalex.org/W2788485469","https://openalex.org/W2885413771","https://openalex.org/W2897645146","https://openalex.org/W2915600598","https://openalex.org/W2999802385","https://openalex.org/W3007971370","https://openalex.org/W3011493986","https://openalex.org/W3034713986","https://openalex.org/W3087984272","https://openalex.org/W3096991318","https://openalex.org/W3201227193","https://openalex.org/W3205877508","https://openalex.org/W4205383771","https://openalex.org/W4206518722","https://openalex.org/W4285183609","https://openalex.org/W4294691494","https://openalex.org/W4383503554"],"related_works":["https://openalex.org/W1975289146","https://openalex.org/W2105887828","https://openalex.org/W2122599759","https://openalex.org/W4236520801","https://openalex.org/W2111375262","https://openalex.org/W1537234410","https://openalex.org/W2317728013","https://openalex.org/W4252076617","https://openalex.org/W1991205173","https://openalex.org/W2242172122"],"abstract_inverted_index":{"Mobile":[0],"Edge":[1],"Computing":[2],"(MEC),":[3],"as":[4,32,69,204,206,213],"a":[5,49,99,126],"new":[6],"computing":[7],"paradigm,":[8],"provides":[9],"high-quality":[10],"and":[11,17,37,54,76,85,109,117,138,151,162,183,200],"low-latency":[12],"services":[13],"for":[14,59,94,104,144],"mobile":[15],"users":[16],"also":[18,132],"reduces":[19],"the":[20,134,148,156,168,174,180,187,193,196],"load":[21],"on":[22],"cloud":[23],"servers.":[24],"However,":[25,62],"MEC":[26,60,105],"faces":[27],"some":[28,66,164],"security":[29,108,150,181],"threats,":[30,44],"such":[31,68],"data":[33],"leakage,":[34,36],"privacy":[35],"unauthorized":[38],"access.":[39],"To":[40,92],"cope":[41],"with":[42,106],"these":[43,63,95],"many":[45],"researchers":[46],"have":[47,65],"designed":[48],"series":[50],"of":[51,74,80,186,211],"identity-based":[52],"authentication":[53,102],"key":[55,70,90,135,142,149],"negotiation":[56],"(ID-AKA)":[57],"schemes":[58,64],"environments.":[61],"drawbacks,":[67,96],"escrow":[71,136],"issues,":[72],"lack":[73],"unlinkability":[75,116],"full":[77,118],"anonymity,":[78],"use":[79],"time-consuming":[81,165],"bilinear":[82,159],"pairing":[83,160],"operations":[84,161,166],"insufficiently":[86],"secure":[87],"static":[88],"public-private":[89,141],"pairs.":[91],"compensate":[93],"we":[97,178],"propose":[98],"certificateless":[100],"anonymous":[101],"scheme":[103,114,131,157,194],"enhanced":[107],"high":[110],"computational":[111,175,198],"efficiency.":[112,176],"The":[113,130,189],"achieves":[115],"anonymity":[119],"by":[120,125],"using":[121],"one-time":[122,140],"pseudonyms":[123],"generated":[124],"tamper-proof":[127],"device":[128],"(TPD).":[129],"solves":[133],"problem":[137],"uses":[139],"pairs":[143],"authentication,":[145],"thus":[146,172],"enhancing":[147],"communication":[152,202],"security.":[153],"In":[154],"addition,":[155],"eliminates":[158],"precomputes":[163],"in":[167,209],"TPD":[169],"each":[170],"time,":[171],"optimizing":[173],"Finally,":[177],"perform":[179],"analysis":[182],"performance":[184],"evaluation":[185],"scheme.":[188],"results":[190],"show":[191],"that":[192],"has":[195],"optimal":[197],"efficiency":[199],"moderate":[201],"costs,":[203],"well":[205],"significant":[207],"advantages":[208],"terms":[210],"security,":[212],"compared":[214],"to":[215],"other":[216],"competing":[217],"schemes.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
