{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T11:52:27Z","timestamp":1725882747856},"publisher-location":"Singapore","reference-count":13,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811041532"},{"type":"electronic","value":"9789811041549"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-4154-9_28","type":"book-chapter","created":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T00:29:21Z","timestamp":1489710561000},"page":"241-248","source":"Crossref","is-referenced-by-count":3,"title":["On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment"],"prefix":"10.1007","author":[{"given":"Chun-Ta","family":"Li","sequence":"first","affiliation":[]},{"given":"Dong-Her","family":"Shih","sequence":"additional","affiliation":[]},{"given":"Chun-Cheng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,18]]},"reference":[{"issue":"19","key":"28_CR1","first-page":"2261","volume":"8","author":"A Banerjee","year":"2013","unstructured":"Banerjee, A., Agrawal, P., Rajkumar, R.: Design of a cloud based emergency healthcare service model. Int. J. Appl. Eng. Res. 8(19), 2261\u20132264 (2013)","journal-title":"Int. J. Appl. Eng. Res."},{"issue":"9","key":"28_CR2","first-page":"1","volume":"38","author":"CL Chen","year":"2014","unstructured":"Chen, C.L., Yang, T.T., Shih, T.F.: A secure medical data exchange protocol based on cloud environments. J. Med. Syst. 38(9), 1\u201312 (2014). article no. 112","journal-title":"J. Med. Syst."},{"issue":"11","key":"28_CR3","first-page":"1","volume":"38","author":"CL Chen","year":"2014","unstructured":"Chen, C.L., Yang, T.T., Chiang, M.L., Shih, T.F.: A privacy authentication scheme based on cloud for medical environments. J. Med. Syst. 38(11), 1\u201316 (2014). article no. 143","journal-title":"J. Med. Syst."},{"issue":"4","key":"28_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-016-0453-1","volume":"40","author":"SY Chiou","year":"2016","unstructured":"Chiou, S.Y., Ying, Z., Liu, J.: Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 40(4), 1\u201315 (2016). article no. 101","journal-title":"J. Med. Syst."},{"issue":"1","key":"28_CR5","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"35","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S.: Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1), 71\u201377 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"28_CR6","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chen, J.: Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Syst. 21(1), 49\u201360 (2015)","journal-title":"Multimedia Syst."},{"issue":"6","key":"28_CR7","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking Appl. 8(6), 1070\u20131081 (2015)","journal-title":"Peer-to-Peer Networking Appl."},{"issue":"4","key":"28_CR8","doi-asserted-by":"crossref","first-page":"2085","DOI":"10.1007\/s11071-015-2467-5","volume":"83","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A.: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83(4), 2085\u20132101 (2016)","journal-title":"Nonlinear Dyn."},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-319-27161-3_39","volume-title":"Algorithms and Architectures for Parallel Processing","author":"CT Li","year":"2015","unstructured":"Li, C.T., Lee, C.C., Wang, C.C., Yang, T.H., Chen, S.J.: Design flaws in a secure medical data exchange protocol based on cloud environments. In: Wang, G., Zomaya, A., Perez, G.M., Li, K. (eds.) ICA3PP 2015. LNCS, vol. 9532, pp. 435\u2013444. Springer, Cham (2015). doi: 10.1007\/978-3-319-27161-3_39"},{"issue":"8","key":"28_CR10","first-page":"1","volume":"39","author":"CT Li","year":"2015","unstructured":"Li, C.T., Weng, C.Y., Lee, C.C.: A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems. J. Med. Syst. 39(8), 1\u20138 (2015). article no. 77","journal-title":"J. Med. Syst."},{"issue":"11","key":"28_CR11","first-page":"1","volume":"39","author":"CT Li","year":"2015","unstructured":"Li, C.T., Weng, C.Y., Lee, C.C., Wang, C.C.: A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system. J. Med. Syst. 39(11), 1\u201311 (2015). article no. 144","journal-title":"J. Med. Syst."},{"issue":"5","key":"28_CR12","first-page":"1","volume":"40","author":"CT Li","year":"2016","unstructured":"Li, C.T., Lee, C.C., Weng, C.Y.: A secure cloud-assisted wireless body area network in mobile emergency medical care system. J. Med. Syst. 40(5), 1\u201315 (2016). article no. 117","journal-title":"J. Med. Syst."},{"issue":"1","key":"28_CR13","first-page":"149","volume":"2","author":"RP Padhy","year":"2012","unstructured":"Padhy, R.P., Patra, M.R., Satapathy, S.C.: Design and implementation of a cloud based rural healthcare information system model. Univ. J. Comput. Sci. Eng. Technol. 2(1), 149\u2013157 (2012)","journal-title":"Univ. J. Comput. Sci. Eng. Technol."}],"container-title":["Lecture Notes in Electrical Engineering","Information Science and Applications 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-4154-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T08:49:07Z","timestamp":1498380547000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-4154-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811041532","9789811041549"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-4154-9_28","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}