{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T19:10:02Z","timestamp":1719947402315},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["PRG-1436-16"],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s10916-015-0307-2","type":"journal-article","created":{"date-parts":[[2015,8,31]],"date-time":"2015-08-31T04:47:49Z","timestamp":1440996469000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System"],"prefix":"10.1007","volume":"39","author":[{"given":"Ruhul","family":"Amin","sequence":"first","affiliation":[]},{"given":"SK Hafizul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mohammad S.","family":"Obaidat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,1]]},"reference":[{"key":"307_CR1","doi-asserted-by":"crossref","unstructured":"Amin, R., and Biswas, G., Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card. Arab. J. Sci. Eng.,1\u201315, 2015. doi: 10.1007\/s13369-015-1743-5 .","DOI":"10.1007\/s13369-015-1743-5"},{"key":"307_CR2","doi-asserted-by":"crossref","unstructured":"Amin, R., and Biswas, G., Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wirel. Pers. Commun., 1\u201324, 2015. doi: 10.1007\/s11277-015-2616-7 .","DOI":"10.1007\/s11277-015-2616-7"},{"key":"307_CR3","doi-asserted-by":"crossref","unstructured":"Amin, R., and Biswas, G., An improved rsa based user authentication and session key agreement protocol usable in tmis. J. Med. Syst. 39(8):79, 2015. doi: 10.1007\/s10916-015-0262-y .","DOI":"10.1007\/s10916-015-0262-y"},{"key":"307_CR4","doi-asserted-by":"crossref","unstructured":"Amin, R., and Biswas, G., A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Networks (0)\u2013(2015). doi: 10.1016\/j.adhoc.2015.05.020 .","DOI":"10.1016\/j.adhoc.2015.05.020"},{"key":"307_CR5","doi-asserted-by":"crossref","unstructured":"Amin, R., and Biswas, G., A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8):78, 2015. doi: 10.1007\/s10916-015-0258-7 .","DOI":"10.1007\/s10916-015-0258-7"},{"key":"307_CR6","doi-asserted-by":"crossref","unstructured":"Amin, R., and Biswas, G.P., A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis. J. Med. Syst. 39(3):33, 2015. doi: 10.1007\/s10916-015-0217-3 .","DOI":"10.1007\/s10916-015-0217-3"},{"key":"307_CR7","doi-asserted-by":"crossref","unstructured":"Amin, R., and Biswas, G.P.: Remote access control mechanism using rabin public key cryptosystem. In: Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 339, pp. 525\u2013533. Springer, India (2015), doi: 10.1007\/978-81-322-2250-7_52","DOI":"10.1007\/978-81-322-2250-7_52"},{"issue":"12","key":"307_CR8","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/s10916-014-0136-8","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12):136, 2014. doi: 10.1007\/s10916-014-0136-8 .","journal-title":"J. Med. Syst."},{"issue":"5","key":"307_CR9","doi-asserted-by":"crossref","first-page":"9964","DOI":"10.1007\/s10916-013-9964-1","volume":"37","author":"A Awasthi","year":"2013","unstructured":"Awasthi, A., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):9964, 2013. doi: 10.1007\/s10916-013-9964-1 .","journal-title":"J. Med. Syst."},{"key":"307_CR10","doi-asserted-by":"crossref","unstructured":"Chang, Y.F., Yu, S.H., Shiao, D.R., A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(2):9902, 2013. doi: 10.1007\/s10916-012-9902-7 .","DOI":"10.1007\/s10916-012-9902-7"},{"key":"307_CR11","doi-asserted-by":"crossref","first-page":"9948","DOI":"10.1007\/s10916-013-9948-1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A.K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9948, 2013. doi: 10.1007\/s10916-013-9948-1 .","journal-title":"J. Med. Syst."},{"issue":"2","key":"307_CR12","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A.C., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"307_CR13","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2014","unstructured":"Giri, D., Maitra, T., Amin, R., Srivastava, P., An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1):145, 2014. doi: 10.1007\/s10916-014-0145-7 .","journal-title":"J. Med. Syst."},{"issue":"6","key":"307_CR14","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Li, B., Lee, S., A variable thresholdvalue authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929\u2013936, 2014.","journal-title":"J. Internet Technol."},{"issue":"3","key":"307_CR15","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"D He","year":"2012","unstructured":"He, D., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"3-4","key":"307_CR16","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1504\/IJESDF.2013.058650","volume":"5","author":"D He","year":"2013","unstructured":"He, D., and Khan, M.K., Cryptanalysis of a key agreement protocol based on chaotic hash. Int. J. Electron. Secur. Digit. Forensics 5(3-4):172\u2013177, 2013. doi: 10.1504\/IJESDF.2013.058650 .","journal-title":"Int. J. Electron. Secur. Digit. Forensics"},{"issue":"1-2","key":"307_CR17","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1504\/IJAHUC.2015.067774","volume":"18","author":"D He","year":"2015","unstructured":"He, D., Khan, M.K., Kumar, N., A new handover authentication protocol based on bilinear pairing functions for wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 18(1-2):67\u201374, 2015. doi: 10.1504\/IJAHUC.2015.067774 .","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"issue":"10","key":"307_CR18","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/s10916-014-0116-z","volume":"38","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Chilamkurti, N., Lee, J.H., Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J. Med. Syst. 38(10):116, 2014. doi: 10.1007\/s10916-014-0116-z .","journal-title":"J. Med. Syst."},{"issue":"4","key":"307_CR19","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/TCE.2013.6689693","volume":"59","author":"D He","year":"2013","unstructured":"He, D., Kumar, N., Khan, M., Lee, J.H., Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans. Consum. Electron. 59(4):811\u2013817, 2013. doi: 10.1109\/TCE.2013.6689693 .","journal-title":"IEEE Trans. Consum. Electron."},{"key":"307_CR20","doi-asserted-by":"crossref","unstructured":"Huang, B., Khan, M., Wu, L., Muhaya, F., He, D., An efficient remote user authentication with key agreement scheme using elliptic curve cryptography. Wirel. Pers. Commun., 1\u201316, 2015. doi: 10.1007\/s11277-015-2735-1 .","DOI":"10.1007\/s11277-015-2735-1"},{"key":"307_CR21","doi-asserted-by":"crossref","unstructured":"Islam, S.H., Design and analysis of an improved smartcard based remote user password authentication scheme. Int. J. Commun. Syst., 2014. doi: 10.1002\/dac.2793 .","DOI":"10.1002\/dac.2793"},{"issue":"3","key":"307_CR22","doi-asserted-by":"crossref","first-page":"2261","DOI":"10.1007\/s11071-014-1584-x","volume":"78","author":"SH Islam","year":"2014","unstructured":"Islam, S.H., rovably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn. 78(3):2261\u20132276, 2014. doi: 10.1007\/s11071-014-1584-x .","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"307_CR23","doi-asserted-by":"crossref","first-page":"1975","DOI":"10.1007\/s11277-014-1968-8","volume":"79","author":"SH Islam","year":"2014","unstructured":"Islam, S.H., A provably secure id-based mutual authentication and key agreement scheme for mobile multi-server environment without esl attack. Wirel. Pers. Commun. 79(3):1975\u20131991, 2014. doi: 10.1007\/s11277-014-1968-8 .","journal-title":"Wirel. Pers. Commun."},{"issue":"0","key":"307_CR24","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.ins.2015.03.050","volume":"312","author":"SH Islam","year":"2015","unstructured":"Islam, S.H., Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inform. Sci. 312(0):104\u2013130, 2015. doi: 10.1016\/j.ins.2015.03.050 .","journal-title":"Inform. Sci."},{"issue":"1","key":"307_CR25","doi-asserted-by":"crossref","first-page":"35","DOI":"10.12785\/isl\/030105","volume":"3","author":"SH Islam","year":"2014","unstructured":"Islam, S.H., and Biswas Gosta Pada, C.K.K.R., Cryptanalysis of an improved smartcard-based remote password authentication scheme. Inform. Sci. Lett. 3(1):35\u201340, 2014.","journal-title":"Inform. Sci. Lett."},{"issue":"11","key":"307_CR26","doi-asserted-by":"crossref","first-page":"1892","DOI":"10.1016\/j.jss.2011.06.061","volume":"84","author":"SH Islam","year":"2011","unstructured":"Islam, S.H., and Biswas, G.P., A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892\u20131898, 2011.","journal-title":"J. Syst. Softw."},{"issue":"4","key":"307_CR27","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2478\/v10179-012-0018-z","volume":"24","author":"SH Islam","year":"2012","unstructured":"Islam, S.H., and Biswas, G.P., An improved id-based client authentication with key agreement scheme on ecc for mobile client-server environments. Theor. Appl.Inform. 24(4):293\u2013312, 2012.","journal-title":"Theor. Appl.Inform."},{"issue":"1112","key":"307_CR28","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1016\/j.mcm.2011.07.001","volume":"57","author":"SH Islam","year":"2013","unstructured":"Islam, S.H., and Biswas, G.P., Design of improved password authentication and update scheme based on elliptic curve cryptography. Information System Security and Performance Modeling and Simulation for Future Mobile Networks. Math. Comput. Model. 57(1112):2703\u20132717, 2013. doi: 10.1016\/j.mcm.2011.07.001 .","journal-title":"Math. Comput. Model."},{"issue":"3-4","key":"307_CR29","doi-asserted-by":"crossref","first-page":"425","DOI":"10.14317\/jami.2013.425","volume":"31","author":"SH Islam","year":"2013","unstructured":"Islam, S.H., and Biswas, G.P., An efficient and secure strong designated verifier signature scheme without bilinear pairings. J. Appl. Math.Inform. 31(3-4):425\u2013441, 2013.","journal-title":"J. Appl. Math.Inform."},{"issue":"5","key":"307_CR30","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1007\/s11767-014-4002-0","volume":"31","author":"SH Islam","year":"2014","unstructured":"Islam, S.H., and Biswas, G.P., Dynamic id-based remote user mutual authentication scheme with smartcard using elliptic curve cryptography. J. Electron.(China) 31(5):473\u2013488, 2014. doi: 10.1007\/s11767-014-4002-0 .","journal-title":"J. Electron.(China)"},{"issue":"1","key":"307_CR31","first-page":"55","volume":"26","author":"SH Islam","year":"2014","unstructured":"Islam, S.H., and Biswas, G.P., A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings. J. King Saud Univer. Comput. Inform. Sci. 26(1):55\u201367, 2014. doi: 10.1016\/j.jksuci.2013.03.004 .","journal-title":"J. King Saud Univer. Comput. Inform. Sci."},{"issue":"2","key":"307_CR32","first-page":"211","volume":"27","author":"SH Islam","year":"2015","unstructured":"Islam, S.H., and Biswas, G.P., Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system. J. King Saud Univer. Comput. Inform. Sci. 27(2):211\u2013221, 2015. doi: 10.1016\/j.jksuci.2014.03.018 .","journal-title":"J. King Saud Univer. Comput. Inform. Sci."},{"issue":"10","key":"307_CR33","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s10916-014-0135-9","volume":"38","author":"SH Islam","year":"2014","unstructured":"Islam, S.H., and Khan, M.K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014. doi: 10.1007\/s10916-014-0135-9 .","journal-title":"J. Med. Syst."},{"key":"307_CR34","doi-asserted-by":"crossref","unstructured":"Islam, S.H., Khan, M.K., Obaidat, M.S., Muhaya, F.T.B., Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps. Wirel. Pers. Commun.,1\u201322, 2015. doi: 10.1007\/s11277-015-2542-8 .","DOI":"10.1007\/s11277-015-2542-8"},{"key":"307_CR35","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):9897, 2013. doi: 10.1007\/s10916-012-9897-0 .","DOI":"10.1007\/s10916-012-9897-0"},{"issue":"11","key":"307_CR36","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jina","year":"2004","unstructured":"Jina, A.T.B., Ling, D.N.C., Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11):2245\u20132255, 2004.","journal-title":"Pattern Recogn."},{"key":"307_CR37","doi-asserted-by":"crossref","unstructured":"Khan, M., and He, D.: Weaknesses of a security analysis and enhancement for three-party password-based authenticated key exchange protocol. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (Eds.) Data and Knowledge Engineering, Lecture Notes in Computer Science, vol 7696, pp. 243\u2013249. Springer, Berlin (2012)","DOI":"10.1007\/978-3-642-34679-8_22"},{"issue":"4","key":"307_CR38","doi-asserted-by":"crossref","first-page":"9954","DOI":"10.1007\/s10916-013-9954-3","volume":"37","author":"M Khan","year":"2013","unstructured":"Khan, M., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):9954, 2013. doi: 10.1007\/s10916-013-9954-3 .","journal-title":"J. Med. Syst."},{"issue":"2","key":"307_CR39","first-page":"857872","volume":"12","author":"MK Khan","year":"2015","unstructured":"Khan, M.K., Chaturvedi, A., Mishra, D., Kumari, S., On the security enhancement of integrated electronic patient records information systems. Comput. Sci. Inform. Syst. 12(2):857872, 2015.","journal-title":"Comput. Sci. Inform. Syst."},{"issue":"11","key":"307_CR40","doi-asserted-by":"crossref","first-page":"1260","DOI":"10.1002\/sec.573","volume":"5","author":"MK Khan","year":"2012","unstructured":"Khan, M.K., and He, D., A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Sec. Commun. Netw. 5(11):1260\u20131266, 2012. doi: 10.1002\/sec.573 .","journal-title":"Sec. Commun. Netw."},{"issue":"2","key":"307_CR41","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1002\/sec.791","volume":"7","author":"MK Khan","year":"2014","unstructured":"Khan, M.K., and Kumari, S., Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Sec. Commun. Netw. 7(2):399\u2013408, 2014. doi: 10.1002\/sec.791 .","journal-title":"Sec. Commun. Netw."},{"key":"307_CR42","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology CRYPTO 99, Lecture Notes in Computer Science, vol 1666, pp. 388\u2013397 (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"307_CR43","doi-asserted-by":"crossref","first-page":"2039","DOI":"10.1002\/sec.916","volume":"7","author":"S Kumari","year":"2013","unstructured":"Kumari, S., and Khan, M.K., More secure smart card based remote user password authentication scheme with user anonymity. Sec.Commun. Netw. 7:2039\u20132053, 2013. doi: 10.1002\/sec.916 .","journal-title":"Sec.Commun. Netw."},{"key":"307_CR44","doi-asserted-by":"crossref","first-page":"3939","DOI":"10.1002\/dac.2590","volume":"27","author":"S Kumari","year":"2014","unstructured":"Kumari, S., and Khan, M.K., Cryptanalysis and improvement of \u2019a robust smart-card-based remote user password authentication scheme. Int. J. Commun. Syst. 27 :3939\u20133955, 2014. doi: 10.1002\/dac.2590. .","journal-title":"Int. J. Commun. Syst."},{"issue":"6","key":"307_CR45","doi-asserted-by":"crossref","first-page":"1997","DOI":"10.1016\/j.compeleceng.2014.05.007","volume":"40","author":"S Kumari","year":"2014","unstructured":"Kumari, S., Khan, M.K., Li, X., An improved remote user authentication scheme with key agreement. Comput. Electr. Eng. 40(6):1997\u20132012, 2014. doi: 10.1016\/j.compeleceng.2014.05.007 .","journal-title":"Comput. Electr. Eng."},{"issue":"10","key":"307_CR46","first-page":"609","volume":"27","author":"S Kumari","year":"2014","unstructured":"Kumari, S., Khan, M.K., Li, X., Wu, F., Design of a user anonymous password authentication scheme without smart card. Int. J. Commun. Syst. 27(10):609\u2013618, 2014. 10.1002\/dac.2853.","journal-title":"Int. J. Commun. Syst."},{"issue":"3","key":"307_CR47","doi-asserted-by":"crossref","first-page":"9933","DOI":"10.1007\/s10916-013-9933-8","volume":"37","author":"TF Lee","year":"2013","unstructured":"Lee, T.F., and Liu, C.M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):9933, 2013. doi: 10.1007\/s10916-013-9933-8 .","journal-title":"J. Med. Syst."},{"issue":"1","key":"307_CR48","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J.W., Ma, J., Wang, W.D., Liu, C.L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1):73\u201379, 2011.","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"307_CR49","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/s10916-015-0221-7","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Peng, H., Yang, Y., An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3):32, 2015. doi: 10.1007\/s10916-015-0221-7 .","journal-title":"J. Med. Syst."},{"issue":"3","key":"307_CR50","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 40(3):1057\u20131065, 2007.","journal-title":"Pattern Recogn."},{"issue":"5","key":"307_CR51","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput"},{"issue":"1","key":"307_CR52","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/s10916-014-0154-6","volume":"39","author":"D Mishra","year":"2014","unstructured":"Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1):154, 2014. doi: 10.1007\/s10916-014-0154-6 .","journal-title":"J. Med. Syst."},{"issue":"3","key":"307_CR53","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10916-015-0193-7","volume":"39","author":"D Mishra","year":"2015","unstructured":"Mishra, D., Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems. J. Med. Syst. 39(3):19, 2015. doi: 10.1007\/s10916-015-0193-7 .","journal-title":"J. Med. Syst."},{"issue":"1\/2","key":"307_CR54","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1504\/IJAHUC.2015.067794","volume":"18","author":"D Mishra","year":"2015","unstructured":"Mishra, D., Chaturvedi, A., Mukhopadhyay, S., An improved biometric-based remote user authentication scheme for connected healthcare. Int. J. Ad Hoc Ubiquitous Comput. 18 (1\/2): 75\u201384, 2015. doi: 10.1504\/IJAHUC.2015.067794 .","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"issue":"6","key":"307_CR55","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M.K., Cryptanalysis and improvement of yan et al.\u2019s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):24, 2014. doi: 10.1007\/s10916-014-0024-2 .","journal-title":"J. Med. Syst."},{"issue":"5","key":"307_CR56","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10916-014-0041-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M., Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5):41, 2014 . doi: 10.1007\/s10916-014-0041-1 .","journal-title":"J. Med. Syst."},{"issue":"10","key":"307_CR57","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10): 120, 2014. doi: 10.1007\/s10916-014-0120-3 .","journal-title":"J. Med. Syst."},{"key":"307_CR58","author":"J Qu","year":"2014","unstructured":"Qu, J., and Tan, X.L., Two-factor user authentication with key agreement scheme based on elliptic curve cryptosystem. J. Electr. Comput. Eng., 2014. doi: 10.1155\/2014\/423930 .","journal-title":"J. Electr. Comput. Eng."},{"issue":"3","key":"307_CR59","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/s10916-014-0016-2","volume":"38","author":"Z Tan","year":"2014","unstructured":"Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 38(3):16, 2014. doi: 10.1007\/s10916-014-0016-2 .","journal-title":"J. Med. Syst."},{"key":"307_CR60","unstructured":"Tool, A.W.: http:\/\/www.avispa-project.org\/web-interface\/ (2015)"},{"issue":"6","key":"307_CR61","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"5","key":"307_CR62","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/s10916-014-0026-0","volume":"38","author":"F Wen","year":"2014","unstructured":"Wen, F., and Guo, D., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 38(5):26, 2014. doi: 10.1007\/s10916-014-0026-0 .","journal-title":"J. Med. Syst."},{"issue":"4","key":"307_CR63","first-page":"1","volume":"37","author":"F Wu","year":"2012","unstructured":"Wu, F., and Xu, L., Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J. Med. Syst 37(4):1\u20139, 2012. doi: 10.1007\/s10916-013-9958-z .","journal-title":"J. Med. Syst"},{"issue":"3","key":"307_CR64","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"99","key":"307_CR65","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TPDS.2015.2473174","volume":"PP","author":"Z Xia","year":"2015","unstructured":"Xia, Z., Wang, X., Sun, X., Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. PP(99):1\u20131, 2015. doi: 10.1109\/TPDS.2015.2401003 .","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"307_CR66","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/s10916-014-0179-x","volume":"39","author":"L Xu","year":"2015","unstructured":"Xu, L., and Wu, F., Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J. Med. Syst. 39(2):10, 2015. doi: 10.1007\/s10916-014-0179-x .","journal-title":"J. Med. Syst."},{"issue":"1","key":"307_CR67","doi-asserted-by":"crossref","first-page":"9994","DOI":"10.1007\/s10916-013-9994-8","volume":"38","author":"X Xu","year":"2013","unstructured":"Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):9994, 2013. doi: 10.1007\/s10916-013-9994-8 .","journal-title":"J. Med. Syst."},{"issue":"34","key":"307_CR68","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"JH Yang","year":"2009","unstructured":"Yang, J.H., and Chang, C.C., An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(34):138\u2013143, 2009. doi: 10.1016\/j.cose.2008.11.008 .","journal-title":"Comput. Secur."},{"issue":"2","key":"307_CR69","first-page":"317","volume":"16","author":"JWJHSL Yongjun Ren Jian Shen","year":"2014","unstructured":"Yongjun Ren Jian Shen, J.W.J.H.S.L., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2):317\u2013323, 2014.","journal-title":"J. Internet Technol."},{"issue":"5","key":"307_CR70","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10916-015-0233-3","volume":"39","author":"L Zhang","year":"2015","unstructured":"Zhang, L., and Zhu, S., Robust ecc-based authenticated key agreement scheme with privacy protection for telecare medicine information systems. J. Med. Syst. 39(5):49, 2015. doi: 10.1007\/s10916-015-0233-3 .","journal-title":"J. Med. Syst."},{"issue":"6","key":"307_CR71","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833\u20133838, 2012. doi: 10.1007\/s10916-012-9856-9 .","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0307-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0307-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0307-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T19:51:30Z","timestamp":1599508290000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0307-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,1]]},"references-count":71,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["307"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0307-2","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,1]]},"article-number":"137"}}