{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:05:34Z","timestamp":1748750734695,"version":"3.41.0"},"publisher-location":"New Delhi","reference-count":17,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226932"},{"type":"electronic","value":"9788132226956"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_44","type":"book-chapter","created":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:41:10Z","timestamp":1445733670000},"page":"527-537","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of a Chaotic Map-Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems"],"prefix":"10.1007","author":[{"given":"Sandip","family":"Roy","sequence":"first","affiliation":[]},{"given":"Santanu","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"issue":"2","key":"44_CR1","first-page":"139","volume":"15","author":"CC Chang","year":"2013","unstructured":"Chang, C.C., Lee, C.Y.: A smart card-based authentication scheme uing user identify cryptography. Int. J. Netw. Secur. 15(2), 139\u2013147 (2013)","journal-title":"Int. J. Netw. Secur."},{"issue":"1","key":"44_CR2","first-page":"121","volume":"14","author":"AK Das","year":"2012","unstructured":"Das, A.K.: Improving identity-based random key establishment scheme for large-scale hierarchical wireless sensor networks. Int. J. Netw. Secur. 14(1), 121 (2012)","journal-title":"Int. J. Netw. Secur."},{"issue":"5","key":"44_CR3","first-page":"350","volume":"15","author":"D He","year":"2013","unstructured":"He, D., Zhao, W., Wu, S.: Security analysis of a dynamic ID-based authentication scheme for multi-server environment using smart cards. Int. J. Netw. Secur. 15(5), 350\u2013356 (2013)","journal-title":"Int. J. Netw. Secur."},{"issue":"5","key":"44_CR4","first-page":"357","volume":"15","author":"J Kar","year":"2013","unstructured":"Kar, J.: ID-based deniable authentication protocol based on diffie-hellman problem on elliptic curve. Int. J. Netw. Secur. 15(5), 357\u2013364 (2013)","journal-title":"Int. J. Netw. Secur."},{"issue":"1","key":"44_CR5","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1007\/s11071-013-1174-3","volume":"76","author":"CC Lee","year":"2014","unstructured":"Lee, C.C., Lou, D.C., Li, C.T., Hsu, C.W.: An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn. 76(1), 853\u2013866 (2014)","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"44_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 15 (2010)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1\u20132","key":"44_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11071-013-0772-4","volume":"73","author":"CC Lee","year":"2013","unstructured":"Lee, C.C., Li, C.T., Hsu, C.W.: A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73(1\u20132), 125\u2013132 (2013)","journal-title":"Nonlinear Dyn."},{"issue":"6","key":"44_CR8","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1016\/j.cnsns.2012.09.032","volume":"18","author":"C Guo","year":"2013","unstructured":"Guo, C., Chang, C.C.: Chaotic Maps-Based PasswordAuthenticated Key Agreement Using Smart Cards. Commun. Nonlinear Sci. Numer. Simul. 18(6), 1433\u20131440 (2013)","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"2","key":"44_CR9","doi-asserted-by":"publisher","first-page":"9919","DOI":"10.1007\/s10916-012-9919-y","volume":"37","author":"X Hao","year":"2013","unstructured":"Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A chaotic map based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2), 9919 (2013)","journal-title":"J. Med. Syst."},{"issue":"2","key":"44_CR10","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust Chaotic mapbased authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2), 12 (2014)","journal-title":"J. Med. Syst."},{"issue":"6","key":"44_CR11","doi-asserted-by":"publisher","first-page":"9985","DOI":"10.1007\/s10916-013-9985-9","volume":"37","author":"TF Lee","year":"2013","unstructured":"Lee, T.F.: An efficient chaotic map-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J. Med. Syst. 37(6), 9985 (2013)","journal-title":"J. Med. Syst."},{"doi-asserted-by":"crossref","unstructured":"Kocarev, L., Tasev, Z.: Public-key encryption based on Chebyshev maps. Proc. Int. Symp. Circ. Syst. 3:III-28\u2013III-31 (2003)","key":"44_CR12","DOI":"10.1109\/ISCAS.2003.1204947"},{"issue":"7","key":"44_CR13","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P. Bergamo","year":"2005","unstructured":"Bergamo, P., DArco, P., Santis, A., Kocarev, L.: Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst.-I 52:1382\u20131393 (2005)","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"key":"44_CR14","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10916-014-0077-2","volume":"38","author":"CT Li","year":"2014","unstructured":"Li, C.T., Lee, C.C., Weng, C.Y.: A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38, 77 (2014). doi: 10.1007\/s10916-014-0077-2","journal-title":"J. Med. Syst."},{"issue":"3","key":"44_CR15","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos. Soliton. Fract. 37(3), 669\u2013674 (2008)","journal-title":"Chaos. Soliton. Fract."},{"key":"44_CR16","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10916-014-0027-z","volume":"38","author":"AK Das","year":"2014","unstructured":"Das, A.K., Goswami, A.: An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38, 27 (2014). doi: 10.1007\/s10916-014-0027-z","journal-title":"J. Med. Syst."},{"key":"44_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Srinivas, J., Mukhopadhyay, S.: A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systemss. J. Med. Syst. 38, 120 (2014). doi: 10.1007\/s10916-014-0120-3","journal-title":"J. Med. Syst."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T03:55:51Z","timestamp":1748663751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_44","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}