{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T08:16:04Z","timestamp":1769501764643,"version":"3.49.0"},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["Y201328392"],"award-info":[{"award-number":["Y201328392"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61301142"],"award-info":[{"award-number":["61301142"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771428"],"award-info":[{"award-number":["61771428"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100001314","name":"SRF","doi-asserted-by":"publisher","award":["2013[1792]"],"award-info":[{"award-number":["2013[1792]"]}],"id":[{"id":"10.13039\/100001314","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SEM"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1016\/j.jnca.2019.01.017","type":"journal-article","created":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T01:51:13Z","timestamp":1547862673000},"page":"66-74","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":97,"special_numbering":"C","title":["Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography"],"prefix":"10.1016","volume":"131","author":[{"given":"Bidi","family":"Ying","sequence":"first","affiliation":[]},{"given":"Amiya","family":"Nayak","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.jnca.2019.01.017_bib1","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1007\/s11277-015-2616-7","article-title":"Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment","volume":"84","author":"Amin","year":"2015","journal-title":"Wireless Pers. Commun."},{"key":"10.1016\/j.jnca.2019.01.017_bib2","series-title":"Proc. 8th Int. Conf. Evolving Internet","first-page":"48","article-title":"Optimization of multi-server video content streaming in 5G environment","author":"Borcoci","year":"2016"},{"key":"10.1016\/j.jnca.2019.01.017_bib3","series-title":"Proc. of ACM Comput. and Commun. Security","first-page":"241","article-title":"Security proofs for an efficient password-based key exchange","author":"Bresson","year":"2003"},{"key":"10.1016\/j.jnca.2019.01.017_bib4","article-title":"Constructing elliptic curves of prime order","volume":"20","author":"Broker","year":"2007","journal-title":"Contemp. Math."},{"issue":"8","key":"10.1016\/j.jnca.2019.01.017_bib5","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/LCOMM.2006.1665116","article-title":"Breaking a remote user authentication scheme for multi-server architecture","volume":"10","author":"Cao","year":"2006","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.jnca.2019.01.017_bib6","series-title":"IEEE Proc. of Int. Conf. Cyberworlds","first-page":"1","article-title":"An efficient and secure multi-server password authentication scheme using smart cards","author":"Chang","year":"2004"},{"issue":"8","key":"10.1016\/j.jnca.2019.01.017_bib7","doi-asserted-by":"crossref","first-page":"1608","DOI":"10.1002\/sec.1109","article-title":"A\u00a0two-factor authentication scheme with anonymity for multi-server environments","volume":"8","author":"Chen","year":"2015","journal-title":"Secur. Commun. Network."},{"key":"10.1016\/j.jnca.2019.01.017_bib8","series-title":"Proc. 10th Ausralasian Conference on Information Security and Privacy","first-page":"494","article-title":"ID-based authenticated key agreement for low-power mobile devices","author":"Choi","year":"2005"},{"issue":"5","key":"10.1016\/j.jnca.2019.01.017_bib9","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1002\/dac.1268","article-title":"Towards generalized ID-based user authentication for mobile multi-server environment","volume":"25","author":"Chuang","year":"2012","journal-title":"Int. J. Commun. Syst."},{"key":"10.1016\/j.jnca.2019.01.017_bib10","first-page":"1","article-title":"Fast authentication in 5G HetNet through SDN enabled weighted secure context-information transfer","author":"Duan","year":"2016","journal-title":"IEEE ICC"},{"key":"10.1016\/j.jnca.2019.01.017_bib11","series-title":"Proc. IEEE Int. Conf. Comm. Tech","first-page":"1","article-title":"Security improvement on a biometrics-based authentication protocol for multi-server environment","author":"Gu","year":"2017"},{"issue":"1","key":"10.1016\/j.jnca.2019.01.017_bib12","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/s11277-015-3040-8","article-title":"Hash based multi-server key exchange protocol using smart cards","volume":"87","author":"Gupta","year":"2016","journal-title":"J.\u00a0Wireles Pers. Commun."},{"issue":"3","key":"10.1016\/j.jnca.2019.01.017_bib13","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","article-title":"Robust biometrics-based authentication scheme for multi-server environment","volume":"9","author":"He","year":"2015","journal-title":"IEEE Syst. J."},{"issue":"12","key":"10.1016\/j.jnca.2019.01.017_bib14","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","article-title":"An efficient identity-based conditional privacy-preserving authentication scheme for vehicular adhoc networks","volume":"10","author":"He","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"10.1016\/j.jnca.2019.01.017_bib15","doi-asserted-by":"crossref","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","article-title":"Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures","volume":"11","author":"He","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"10.1016\/j.jnca.2019.01.017_bib16","doi-asserted-by":"crossref","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","article-title":"Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment","volume":"31","author":"Hsiang","year":"2009","journal-title":"Comput. Stand. Interfac."},{"issue":"1","key":"10.1016\/j.jnca.2019.01.017_bib17","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11227-014-1135-8","article-title":"An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures","volume":"70","author":"Hsieh","year":"2014","journal-title":"J.\u00a0Supercomput."},{"issue":"1","key":"10.1016\/j.jnca.2019.01.017_bib18","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","article-title":"Efficient multi-server password authenticated key agreement using smart cards","volume":"50","author":"Juang","year":"2004","journal-title":"IEEE Trans. Consum. Electron."},{"key":"10.1016\/j.jnca.2019.01.017_bib19","series-title":"Proc. Int. Conf. Inf. Secur. Practice Exper","first-page":"260","article-title":"An efficient and practical fingerprint-based remote user authentication scheme with smart cards","author":"Khan","year":"2006"},{"issue":"11","key":"10.1016\/j.jnca.2019.01.017_bib20","first-page":"13863","article-title":"A\u00a0secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards","volume":"38","author":"Lee","year":"2011","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"10.1016\/j.jnca.2019.01.017_bib21","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1049\/iet-ifs.2012.0206","article-title":"Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards","volume":"8","author":"Leu","year":"2014","journal-title":"IET Inf. Secur."},{"issue":"6","key":"10.1016\/j.jnca.2019.01.017_bib22","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1109\/72.963786","article-title":"A\u00a0remote password authentication scheme for multi-server architecture using neural networks","volume":"12","author":"Li","year":"2001","journal-title":"IEEE Trans. Neural Network."},{"issue":"1","key":"10.1016\/j.jnca.2019.01.017_bib23","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","article-title":"A\u00a0novel smart card and dynamic ID based remote user authentication scheme for multi-server environments","volume":"58","author":"Li","year":"2013","journal-title":"Math. Comput. Model."},{"issue":"3","key":"10.1016\/j.jnca.2019.01.017_bib24","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1016\/j.future.2012.03.017","article-title":"A\u00a0novel multi-server remote user authentication scheme using self-certified public keys for mobile clients","volume":"29","author":"Liao","year":"2013","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"10.1016\/j.jnca.2019.01.017_bib25","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","article-title":"Secure dynamic ID based remote user authentication scheme for multi-server environment","volume":"31","author":"Liao","year":"2009","journal-title":"Comput. Stand. Interfac."},{"issue":"1","key":"10.1016\/j.jnca.2019.01.017_bib26","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","article-title":"A\u00a0new remote user authentication scheme for multi-server architecture","volume":"19","author":"Lin","year":"2003","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jnca.2019.01.017_bib27","series-title":"2020: beyond 4G Radio Evolution for the Gigabit Experience","year":"2011"},{"issue":"9","key":"10.1016\/j.jnca.2019.01.017_bib28","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","article-title":"A\u00a0secure biometrics-based multiserver authentication protocol using smart cards","volume":"10","author":"Odelu","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.jnca.2019.01.017_bib29","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s001450010003","article-title":"Security arguments for digital signatures and blind signatures","volume":"13","author":"Pointcheval","year":"2000","journal-title":"J.\u00a0Cryptol."},{"issue":"5","key":"10.1016\/j.jnca.2019.01.017_bib30","doi-asserted-by":"crossref","first-page":"e0154308","DOI":"10.1371\/journal.pone.0154308","article-title":"An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography","volume":"11","author":"Reddy","year":"2016","journal-title":"PLoS One"},{"key":"10.1016\/j.jnca.2019.01.017_bib31","doi-asserted-by":"crossref","DOI":"10.1155\/2018\/2104162","article-title":"Probabilistic caching placement in the presence of multiple eavesdroppers","author":"Shi","year":"2018","journal-title":"Wireless Commun. Mobile Comput."},{"issue":"2","key":"10.1016\/j.jnca.2019.01.017_bib32","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.jnca.2010.11.011","article-title":"A\u00a0secure dynamic identity based authentication protocol for multi-server architecture","volume":"34","author":"Sood","year":"2011","journal-title":"J.\u00a0Netw. Comput. Appl."},{"issue":"4","key":"10.1016\/j.jnca.2019.01.017_bib33","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.cose.2008.04.001","article-title":"Efficient multi-server authentication scheme based on one-way hash function without verification table","volume":"27","author":"Tsai","year":"2008","journal-title":"Comput. Secur."},{"issue":"2","key":"10.1016\/j.jnca.2019.01.017_bib34","doi-asserted-by":"crossref","first-page":"e0149173","DOI":"10.1371\/journal.pone.0149173","article-title":"Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme","volume":"11","author":"Wang","year":"2016","journal-title":"PLoS One"},{"issue":"6","key":"10.1016\/j.jnca.2019.01.017_bib35","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TIFS.2017.2659640","article-title":"Provably secure dynamic ID-based anonymous two-factor authenticated key exchange protocol with extended security model","volume":"12","author":"Xie","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10.1016\/j.jnca.2019.01.017_bib36","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","article-title":"A\u00a0lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture","volume":"80","author":"Xue","year":"2014","journal-title":"J.\u00a0Comput. Syst. Sci."},{"key":"10.1016\/j.jnca.2019.01.017_bib37","doi-asserted-by":"crossref","first-page":"3622","DOI":"10.1109\/ACCESS.2017.2666258","article-title":"Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment","volume":"5","author":"Yoon","year":"2017","journal-title":"IEEE Access"}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1084804519300256?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1084804519300256?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T16:28:39Z","timestamp":1761064119000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S1084804519300256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":37,"alternative-id":["S1084804519300256"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.jnca.2019.01.017","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography","name":"articletitle","label":"Article Title"},{"value":"Journal of Network and Computer Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.jnca.2019.01.017","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}