{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:15:42Z","timestamp":1743084942008,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694702"},{"type":"electronic","value":"9783319694719"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69471-9_40","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T10:03:44Z","timestamp":1508493824000},"page":"513-522","source":"Crossref","is-referenced-by-count":0,"title":["An Improved Authentication Scheme for the Integrated EPR Information System"],"prefix":"10.1007","author":[{"given":"Pei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Hua","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yuanfei","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"issue":"2","key":"40_CR1","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/s10916-010-9527-7","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Chung, Y., Lai, F., et al.: A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2), 631\u2013638 (2012)","journal-title":"J. Med. Syst."},{"issue":"3","key":"40_CR2","doi-asserted-by":"crossref","first-page":"9941","DOI":"10.1007\/s10916-013-9941-8","volume":"37","author":"TF Lee","year":"2013","unstructured":"Lee, T.F., Chang, I.P., Lin, T.H., et al.: A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3), 9941 (2013)","journal-title":"J. Med. Syst."},{"issue":"5","key":"40_CR3","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/s10916-014-0042-0","volume":"38","author":"F Wen","year":"2014","unstructured":"Wen, F.: A more secure anonymous user authentication scheme for the integrated EPR information system. J. Med. Syst. 38(5), 42 (2014)","journal-title":"J. Med. Syst."},{"issue":"1","key":"40_CR4","first-page":"21","volume":"52","author":"CT Li","year":"2015","unstructured":"Li, C.T., Weng, C.Y., Lee, C.C., et al.: Secure user authentication and user anonymity scheme based on quadratic residues for the integrated EPRIS. Proc. Comput. Sci. 52(1), 21\u201328 (2015)","journal-title":"Proc. Comput. Sci."},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Das, A.K.: A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 39(3), 204 (2015)","DOI":"10.1007\/s10916-015-0204-8"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Mir, O., Weide, T.V.D., Lee, C.C.: A secure user anonymity and authentication scheme using AVISPA for Telecare medical information systems. J. Med. Syst. 39(9), 265 (2015)","DOI":"10.1007\/s10916-015-0265-8"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Li, C.T., Weng, C.Y., Lee, C.C., et al.: A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system. J. Med. Syst. 39(11), 144 (2015)","DOI":"10.1007\/s10916-015-0322-3"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Jung, J., Kang, D., Lee, D., et al.: An improved and secure anonymous biometric-based user authentication with key agreement scheme for the integrated EPR information system. Plos One 12(1), e0169414 (2017)","DOI":"10.1371\/journal.pone.0169414"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Wen, F., Guo, D.: An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 38(5), 26 (2014)","DOI":"10.1007\/s10916-014-0026-0"},{"issue":"5","key":"40_CR10","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541\u2013552 (2002)","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"40_CR11","first-page":"18","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proc. Roy. Soc. Math. Phys. Eng. Sci. 8(5), 18\u201336 (1990)","journal-title":"Proc. Roy. Soc. Math. Phys. Eng. Sci."},{"issue":"2","key":"40_CR12","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","volume":"16","author":"HH Kilinc","year":"2014","unstructured":"Kilinc, H.H., Yanik, T.: A survey of SIP authentication and key agreement schemes. IEEE Commun. Surv. Tutorials 16(2), 1005\u20131023 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69471-9_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,23]],"date-time":"2017-10-23T13:12:22Z","timestamp":1508764342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69471-9_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694702","9783319694719"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69471-9_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}