{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:54:51Z","timestamp":1775040891688,"version":"3.50.1"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T00:00:00Z","timestamp":1298937600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s10916-011-9658-5","type":"journal-article","created":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T18:40:45Z","timestamp":1299004845000},"page":"1989-1995","source":"Crossref","is-referenced-by-count":216,"title":["A More Secure Authentication Scheme for Telecare Medicine Information Systems"],"prefix":"10.1007","volume":"36","author":[{"given":"He","family":"Debiao","sequence":"first","affiliation":[]},{"given":"Chen","family":"Jianhua","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Rui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,3,1]]},"reference":[{"issue":"4","key":"9658_CR1","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1005549330655","volume":"24","author":"C Lambrinoudakis","year":"2000","unstructured":"Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213\u2013234, 2000.","journal-title":"J Med Syst"},{"issue":"1","key":"9658_CR2","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TITB.2007.906101","volume":"12","author":"WB Lee","year":"2008","unstructured":"Lee, W. B., and Lee, C. D., A cryptographic key management solution for HIPAA privacy\/security regulations. IEEE Trans. Inf. Technol. Biomed. 12(1):34\u201341, 2008.","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"4","key":"9658_CR3","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"E Liao","year":"2006","unstructured":"Liao, E., Lee, C. C., and Hwang, M. S., A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72(4):727\u2013740, 2006.","journal-title":"J Comput Syst Sci"},{"issue":"6","key":"9658_CR4","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., and Hellman, M., New directions in cryptology. IEEE Trans. Inf. Theory 22(6):644\u2013654, 1976.","journal-title":"IEEE Trans Inf Theory"},{"key":"9658_CR5","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.cose.2004.10.007","volume":"24","author":"CC Yang","year":"2005","unstructured":"Yang, C. C., Wang, R. C., and Liu, W. T., Secure authentication scheme for session initiation protocol. Comput. Secur. 24:381\u2013386, 2005.","journal-title":"Comput Secur"},{"issue":"10","key":"9658_CR6","doi-asserted-by":"crossref","first-page":"2205","DOI":"10.1016\/j.comcom.2008.02.002","volume":"31","author":"JY Liu","year":"2008","unstructured":"Liu, J. Y., Zhou, A. M., and Gao, M. X., A new mutual authentication scheme based on nonce and smart cards. Comput. Commun. 31(10):2205\u20132209, 2008.","journal-title":"Comput Commun"},{"key":"9658_CR7","doi-asserted-by":"crossref","unstructured":"He, D., Chen J., and Hu J., An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security, Information Fussion, doi: 10.1016\/j.inffus.2011.01.001 .","DOI":"10.1016\/j.inffus.2011.01.001"},{"issue":"4","key":"9658_CR8","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723\u2013728, 2009.","journal-title":"Comput Stand Interfaces"},{"key":"9658_CR9","doi-asserted-by":"crossref","unstructured":"Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee H.-C., and Chung, Y., A Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. doi: 10.1007\/s10916-010-9614-9 .","DOI":"10.1007\/s10916-010-9614-9"},{"key":"9658_CR10","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., and Jun, B., Differential power analysis, Proc. Adv. Cryptology (CRYPTO'99). 388\u2013397, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"9658_CR11","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"9658_CR12","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1145\/1044552.1044562","volume":"39","author":"W-C Ku","year":"2005","unstructured":"Ku, W.-C., and Chen, S.-M., Cryptanalysis of a flexible remote user authentication scheme using smart cards [J].ACMSIGOPS Oper. Syst. Rev. 39(1):90\u201396, 2005.","journal-title":"Operating Systems Review"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-011-9658-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-011-9658-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-011-9658-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T22:21:17Z","timestamp":1560032477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-011-9658-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,1]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["9658"],"URL":"https:\/\/doi.org\/10.1007\/s10916-011-9658-5","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3,1]]}}}