{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T13:06:57Z","timestamp":1746882417822},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s00500-023-07889-4","type":"journal-article","created":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T14:10:04Z","timestamp":1678803004000},"page":"6033-6047","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems"],"prefix":"10.1007","volume":"27","author":[{"given":"Preecha","family":"Yupapin","sequence":"first","affiliation":[]},{"given":"Chandrashekhar","family":"Meshram","sequence":"additional","affiliation":[]},{"given":"Sharad Kumar","family":"Barve","sequence":"additional","affiliation":[]},{"given":"Rabha W.","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Muhammad Azeem","family":"Akbar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,14]]},"reference":[{"key":"7889_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla M, Fouque PA, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. In: International workshop on public key cryptography. Springer, Berlin.","DOI":"10.1007\/978-3-540-30580-4_6"},{"key":"7889_CR2","first-page":"191","volume":"3376","author":"M Abdalla","year":"2005","unstructured":"Abdalla M, Pointcheval D (2005) Simple password-based authenticated key protocols. Top Cryptol\u2014CT-RSA 2005 Lect Notes Comput Sci 3376:191\u2013208","journal-title":"Top Cryptol\u2014CT-RSA 2005 Lect Notes Comput Sci"},{"key":"7889_CR3","doi-asserted-by":"crossref","first-page":"17882","DOI":"10.1109\/ACCESS.2021.3049881","volume":"9","author":"M Alawida","year":"2021","unstructured":"Alawida M, Samsudin A, Alajarmeh N, Teh JS, Ahmad M (2021) A novel hash function based on a chaotic sponge and DNA sequence. IEEE Access 9:17882\u201317897","journal-title":"IEEE Access"},{"key":"7889_CR4","doi-asserted-by":"crossref","first-page":"107993","DOI":"10.1109\/ACCESS.2020.3000716","volume":"8","author":"Z Ali","year":"2020","unstructured":"Ali Z, Hussain S, Rehman RHU, Munshi A, Liaqat M, Kumar N, Chaudhry SA (2020) ITSSAKA-MS: an improved three-factor symmetric-key based secure AKA scheme for multi-server environments. IEEE Access 8:107993\u2013108003","journal-title":"IEEE Access"},{"issue":"12","key":"7889_CR5","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/s10916-014-0136-8","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad H, Nikooghadam M (2014) Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Syst 38(12):136","journal-title":"J Med Syst"},{"key":"7889_CR6","doi-asserted-by":"crossref","first-page":"12557","DOI":"10.1109\/ACCESS.2019.2893185","volume":"7","author":"S Barman","year":"2019","unstructured":"Barman S, Shum HPH, Chattopadhyay S, Samanta D (2019) A secure authentication protocol for multi-server-based e-healthcare using a Fuzzy commitment scheme. IEEE Access 7:12557\u201312574","journal-title":"IEEE Access"},{"key":"7889_CR7","first-page":"139","volume-title":"International conference on the theory and applications of cryptographic techniques","author":"M Bellare","year":"2000","unstructured":"Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. International conference on the theory and applications of cryptographic techniques. Springer, Berlin, pp 139\u2013155"},{"key":"7889_CR8","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo P, Arco P, Santis A, Kocarev L (2005) Security of public key cryptosystems based on Chebyshev polynomials. IEEE Trans Circ Syst I 52:1382\u20131393","journal-title":"IEEE Trans Circ Syst I"},{"issue":"1","key":"7889_CR9","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ins.2010.08.032","volume":"181","author":"TY Chang","year":"2011","unstructured":"Chang TY, Hwang MS, Yang WP (2011) A communication-efficient three-party password authenticated key exchange protocol. Inf Sci 181(1):217\u2013226","journal-title":"Inf Sci"},{"issue":"8","key":"7889_CR10","doi-asserted-by":"crossref","first-page":"3504","DOI":"10.1007\/s11227-015-1601-y","volume":"74","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry SA, Naqvi H, Farash MS, Shon T, Sher M (2018) An improved and robust biometrics-based three factor authentication scheme for multiserver environments. J Supercomput 74(8):3504\u20133520","journal-title":"J Supercomput"},{"issue":"5","key":"7889_CR11","doi-asserted-by":"crossref","first-page":"5503","DOI":"10.1007\/s11042-017-4464-9","volume":"77","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry SA, Naqvi H, Khan MK (2018) An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimed Tools Appl 77(5):5503\u20135524","journal-title":"Multimed Tools Appl"},{"key":"7889_CR12","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/978-3-319-50209-0_40","volume-title":"Advances in intelligent information hiding and multimedia signal processing","author":"CM Chen","year":"2017","unstructured":"Chen CM, Xu L, Fang W, Wu TY (2017) A three-party password authenticated key exchange protocol resistant to stolen smart card attacks. Advances in intelligent information hiding and multimedia signal processing. Springer, Cham, pp 331\u2013336"},{"key":"7889_CR13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9146297","author":"SY Chiou","year":"2018","unstructured":"Chiou SY, Lin CH (2018) An efficient three-party authentication scheme for data exchange in medical environment. Sec Commun Netw. https:\/\/doi.org\/10.1155\/2018\/9146297","journal-title":"Sec Commun Netw"},{"issue":"3","key":"7889_CR14","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"H Debiao","year":"2012","unstructured":"Debiao H, Jianhua C, Rui Z (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989\u20131995","journal-title":"J Med Syst"},{"issue":"10","key":"7889_CR15","doi-asserted-by":"crossref","first-page":"5795","DOI":"10.1007\/s11042-015-2542-4","volume":"75","author":"BD Deebak","year":"2016","unstructured":"Deebak BD, Muthaiah R, Thenmozhi K, Swaminathan PI (2016) Analyzing three-party authentication and key agreement protocol for real time IP multimedia server\u2013client systems. Multimed Tools Appl 75(10):5795\u20135817","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"7889_CR16","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"issue":"1\u20132","key":"7889_CR17","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s11071-014-1304-6","volume":"77","author":"MS Farash","year":"2014","unstructured":"Farash MS, Attari MA (2014) An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn 77(1\u20132):399\u2013411","journal-title":"Nonlinear Dyn"},{"key":"7889_CR18","first-page":"194","volume":"2004","author":"R Gennaro","year":"2004","unstructured":"Gennaro R, Shoup V (2004) A note on an encryption scheme of Kurosawa and Desmedt. IACR Cryptol ePrint Arch 2004:194","journal-title":"IACR Cryptol ePrint Arch"},{"key":"7889_CR19","doi-asserted-by":"crossref","first-page":"111265","DOI":"10.1109\/ACCESS.2020.3002558","volume":"8","author":"XY Guo","year":"2020","unstructured":"Guo XY, Sun DZ, Yang Y (2020) An improved three-factor session initiation protocol using Chebyshev chaotic map. IEEE Access 8:111265\u2013111277","journal-title":"IEEE Access"},{"issue":"3","key":"7889_CR20","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1016\/j.chaos.2007.06.030","volume":"39","author":"S Han","year":"2009","unstructured":"Han S, Chang E (2009) Chaotic map based key agreement with\/out clock synchronization. Choas Soliton Fract 39(3):1283\u20131289","journal-title":"Choas Soliton Fract"},{"key":"7889_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9919-y","author":"X Hao","year":"2013","unstructured":"Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst. https:\/\/doi.org\/10.1007\/s10916-012-9919-y","journal-title":"J Med Syst"},{"key":"7889_CR22","doi-asserted-by":"crossref","first-page":"4677","DOI":"10.1007\/s00500-020-05478-3","volume":"25","author":"A Hasheminezhad","year":"2021","unstructured":"Hasheminezhad A, Hadadi F, Shirmohammadi H (2021) Investigation and prioritization of risk factors in the collision of two passenger trains based on fuzzy COPRAS and fuzzy DEMATEL methods. Soft Comput 25:4677\u20134697","journal-title":"Soft Comput"},{"issue":"1","key":"7889_CR23","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30\u201337","journal-title":"IEEE Trans Consum Electron"},{"key":"7889_CR24","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.cmpb.2016.07.022","volume":"135","author":"MH Ibrahim","year":"2016","unstructured":"Ibrahim MH, Kumari S, Das AK, Wazid M, Odelu V (2016) Secure anonymous mutual authentication for star two-tier wireless body area networks. Comput Methods Progr Biomed 135:37\u201350","journal-title":"Comput Methods Progr Biomed"},{"issue":"4","key":"7889_CR25","doi-asserted-by":"crossref","first-page":"3177","DOI":"10.1007\/s11071-018-04748-y","volume":"95","author":"A Jabbari","year":"2019","unstructured":"Jabbari A, Mohasefi JB (2019) Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 95(4):3177\u20133191","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"7889_CR26","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/s11276-020-02451-8","volume":"27","author":"A Jabbari","year":"2021","unstructured":"Jabbari A, Mohasefi JB (2021) User-sensor mutual authenticated key establishment scheme for critical applications in wireless sensor networks. Wireless Netw 27(1):227\u2013248","journal-title":"Wireless Netw"},{"issue":"5","key":"7889_CR27","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/j.csi.2006.12.002","volume":"29","author":"JO Kwon","year":"2007","unstructured":"Kwon JO, Jeong IR, Sakurai K, Lee DH (2007) Efficient verifier-based password-authenticated key exchange in the three-party setting. Comput Stand Interfaces 29(5):513\u2013520","journal-title":"Comput Stand Interfaces"},{"issue":"4","key":"7889_CR28","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1005549330655","volume":"24","author":"C Lambrinoudakis","year":"2000","unstructured":"Lambrinoudakis C, Gritzalis S (2000) Managing medical and insurance information through a smart-card-based information system. J Med Syst 24(4):213\u2013234","journal-title":"J Med Syst"},{"key":"7889_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-013-9985-9","author":"TF Lee","year":"2013","unstructured":"Lee TF (2013) An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med Syst. https:\/\/doi.org\/10.1007\/s10916-013-9985-9","journal-title":"J Med Syst"},{"key":"7889_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-012-0652-3","author":"CC Lee","year":"2013","unstructured":"Lee CC, Hsu CW (2013) A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. https:\/\/doi.org\/10.1007\/s11071-012-0652-3","journal-title":"Nonlinear Dyn"},{"issue":"9","key":"7889_CR31","doi-asserted-by":"crossref","first-page":"1702","DOI":"10.1016\/j.ins.2010.01.005","volume":"180","author":"TF Lee","year":"2010","unstructured":"Lee TF, Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inf Sci 180(9):1702\u20131714","journal-title":"Inf Sci"},{"issue":"3","key":"7889_CR32","doi-asserted-by":"crossref","first-page":"9933","DOI":"10.1007\/s10916-013-9933-8","volume":"37","author":"TF Lee","year":"2013","unstructured":"Lee TF, Liu CM (2013) A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J Med Syst 37(3):9933","journal-title":"J Med Syst"},{"issue":"2","key":"7889_CR33","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1016\/j.amc.2004.06.129","volume":"167","author":"SW Lee","year":"2005","unstructured":"Lee SW, Kim HS, Yoo KY (2005) Efficient verifier-based key agreement protocol for three parties without server\u2019s public key. Appl Math Comput 167(2):996\u20131003","journal-title":"Appl Math Comput"},{"issue":"4","key":"7889_CR34","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1016\/j.camwa.2009.02.039","volume":"58","author":"TF Lee","year":"2009","unstructured":"Lee TF, Liu JL, Sung MJ, Yang SB, Chen CM (2009) Communication-efficient three-party protocols for authentication and key agreement. Comput Math Appl 58(4):641\u2013648","journal-title":"Comput Math Appl"},{"key":"7889_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0260-0","author":"CT Li","year":"2015","unstructured":"Li CT, Weng CY, Lee CC (2015) A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. J Med Syst. https:\/\/doi.org\/10.1007\/s10916-015-0260-0","journal-title":"J Med Syst"},{"key":"7889_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0586-2","author":"CT Li","year":"2016","unstructured":"Li CT, Lee CC, Weng CY, Chen SJ (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst. https:\/\/doi.org\/10.1007\/s10916-016-0586-2","journal-title":"J Med Syst"},{"issue":"1","key":"7889_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/spy2.1","volume":"1","author":"C Meshram","year":"2018","unstructured":"Meshram C, Obaidat MS, Meshram SG (2018) Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography. Sec Privacy 1(1):1\u20139","journal-title":"Sec Privacy"},{"issue":"16","key":"7889_CR38","doi-asserted-by":"crossref","first-page":"6937","DOI":"10.1007\/s00500-018-3332-5","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Lee CC, Meshram SG, Li CT (2019a) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937\u20136946","journal-title":"Soft Comput"},{"issue":"24","key":"7889_CR39","doi-asserted-by":"crossref","first-page":"13127","DOI":"10.1007\/s00500-019-03855-1","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Lee CC, Meshram SG, Khan MK (2019b) An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput 23(24):13127\u201313138","journal-title":"Soft Comput"},{"issue":"7","key":"7889_CR40","doi-asserted-by":"crossref","first-page":"e4307","DOI":"10.1002\/dac.4307","volume":"33","author":"C Meshram","year":"2020","unstructured":"Meshram C, Lee CC, Ranadive AS, Li CT, Meshram SG, Tembhurne JV (2020a) A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int J Commun Syst 33(7):e4307","journal-title":"Int J Commun Syst"},{"issue":"1","key":"7889_CR41","doi-asserted-by":"crossref","first-page":"80063","DOI":"10.1109\/ACCESS.2020.2991348","volume":"8","author":"C Meshram","year":"2020","unstructured":"Meshram C, Lee CC, Meshram SG, Meshram A (2020b) OOS-SSS: An efficient online\/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network. IEEE Access 8(1):80063\u201380073","journal-title":"IEEE Access"},{"key":"7889_CR42","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.jare.2020.08.015","volume":"32","author":"C Meshram","year":"2021","unstructured":"Meshram C, Ibrahim RW, Obaid AJ, Meshram SG, Meshram A, Abd El-Latif AM (2021a) Fractional chaotic maps based short signature scheme under human-centred IoT environments. J Adv Res 32:139\u2013148","journal-title":"J Adv Res"},{"key":"7889_CR43","doi-asserted-by":"crossref","first-page":"3649","DOI":"10.1109\/ACCESS.2020.3046367","volume":"9","author":"C Meshram","year":"2021","unstructured":"Meshram C, Alsanad A, Tembhurne JV, Shende SW, Kalare KW, Meshram SG, Akbar MA, Gumaei A (2021b) A provably secure lightweight subtree-based short signature scheme with fuzzy user data sharing for human-centered IoT. IEEE Access 9:3649\u20133659","journal-title":"IEEE Access"},{"issue":"9","key":"7889_CR44","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10916-015-0265-8","volume":"39","author":"O Mir","year":"2015","unstructured":"Mir O, van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. J Med Syst 39(9):89","journal-title":"J Med Syst"},{"key":"7889_CR45","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"Y Niu","year":"2011","unstructured":"Niu Y, Wang X (2011) An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Simulat 16:1986\u20131992","journal-title":"Commun Nonlinear Sci Simulat"},{"issue":"1","key":"7889_CR46","first-page":"157","volume":"48","author":"J Sadeghi","year":"2015","unstructured":"Sadeghi J, Essmayil Kaboli M (2015) Investigation of the influences of track superstructure parameters on ballasted railway track design. Civil Eng Infrastruct J 48(1):157\u2013174","journal-title":"Civil Eng Infrastruct J"},{"key":"7889_CR47","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1016\/j.ins.2019.07.029","volume":"527","author":"FM Salem","year":"2020","unstructured":"Salem FM, Amin R (2020) A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Inf Sci 527:382\u2013393","journal-title":"Inf Sci"},{"key":"7889_CR48","unstructured":"Shoup V (2004) Sequences of games: a tool for taming complexity in security proofs. IACR Cryptology ePrint Archive. http:\/\/eprint.iacr.org\/2004\/332"},{"key":"7889_CR49","first-page":"102539","volume":"53","author":"V Sureshkumar","year":"2020","unstructured":"Sureshkumar V, Amin R, Obaidat MS, Karthikeyan I (2020) An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map. J Inf Sec Appl 53:102539","journal-title":"J Inf Sec Appl"},{"key":"7889_CR50","doi-asserted-by":"crossref","unstructured":"Tseng H, Jan R, Yang W (2009) A chaotic maps-based key agreement protocol that preserves user anonymity. In: IEEE International conference on communications (ICC\u201909):1\u20136.","DOI":"10.1109\/ICC.2009.5198581"},{"issue":"2","key":"7889_CR51","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1007\/s11227-013-0917-8","volume":"66","author":"R Tso","year":"2013","unstructured":"Tso R (2013) Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol. J Supercomput 66(2):863\u2013874","journal-title":"J Supercomput"},{"issue":"20","key":"7889_CR52","doi-asserted-by":"crossref","first-page":"965","DOI":"10.12988\/imf.2006.06079","volume":"1","author":"RC Wang","year":"2006","unstructured":"Wang RC, Mo KR (2006) Security enhancement on efficient verifier-based key agreement protocol for three parties without server\u2019s public key. Int Math Forum 1(20):965\u2013972","journal-title":"Int Math Forum"},{"key":"7889_CR53","first-page":"497","volume-title":"International conference on emerging internetworking, data and web technologies","author":"Q Wang","year":"2017","unstructured":"Wang Q, Ruan O, Wang Z (2017) Security analysis and improvements of three-party password-based authenticated key exchange protocol. International conference on emerging internetworking, data and web technologies. Springer, Cham, pp 497\u2013508"},{"issue":"6","key":"7889_CR54","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei J, Hu X, Liu W (2012) An improved authentication scheme for telecare medicine information systems. J Med Syst 36(6):3597\u20133604","journal-title":"J Med Syst"},{"key":"7889_CR55","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0026-0","author":"F Wen","year":"2014","unstructured":"Wen F, Guo D (2014) An improved anonymous authentication scheme for telecare medical information systems. J Med Syst. https:\/\/doi.org\/10.1007\/s10916-014-0026-0","journal-title":"J Med Syst"},{"issue":"2","key":"7889_CR56","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1049\/ip-com:20045087","volume":"152","author":"HA Wen","year":"2005","unstructured":"Wen HA, Lee TF, Hwang T (2005) Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEEE Proc-Commun 152(2):138\u2013143","journal-title":"IEEE Proc-Commun"},{"issue":"3","key":"7889_CR57","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu ZY, Lee YC, Lai F, Lee HC, Chung Y (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529\u20131535","journal-title":"J Med Syst"},{"key":"7889_CR58","volume-title":"Local fractional integral transforms and their applications","author":"XJ Yang","year":"2015","unstructured":"Yang XJ, Baleanu D, Srivastava HM (2015) Local fractional integral transforms and their applications. Academic Press, Cambridge"},{"key":"7889_CR59","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-013-9993-9","author":"WC Yau","year":"2013","unstructured":"Yau WC, Phan RCW (2013) Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst. https:\/\/doi.org\/10.1007\/s10916-013-9993-9","journal-title":"J Med Syst"},{"issue":"6","key":"7889_CR60","first-page":"1059","volume":"19","author":"HT Yeh","year":"2003","unstructured":"Yeh HT, Sun HM, Hwang T (2003) Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. J Inf Sci Eng 19(6):1059\u20131070","journal-title":"J Inf Sci Eng"},{"issue":"3","key":"7889_CR61","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solit Fract 37(3):669\u2013674","journal-title":"Chaos Solit Fract"},{"issue":"5","key":"7889_CR62","doi-asserted-by":"crossref","first-page":"3623","DOI":"10.3934\/mbe.2019180","volume":"16","author":"Q Zhang","year":"2019","unstructured":"Zhang Q, Chaudhary P, Kumari S, Kong Z, Liu W (2019) Verifier-based anonymous password-authenticated key exchange protocol in the standard model. Math Biosci Eng 16(5):3623\u20133640","journal-title":"Math Biosci Eng"},{"issue":"6","key":"7889_CR63","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu Z (2012) An efficient authentication scheme for telecare medicine information systems. J Med Syst 36(6):3833\u20133838","journal-title":"J Med Syst"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-07889-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-07889-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-07889-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T22:39:30Z","timestamp":1702075170000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-07889-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,14]]},"references-count":63,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["7889"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-07889-4","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,14]]},"assertion":[{"value":"29 January 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not available.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}