{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:58:35Z","timestamp":1770339515091,"version":"3.49.0"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,1,20]],"date-time":"2013-01-20T00:00:00Z","timestamp":1358640000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s10916-012-9919-y","type":"journal-article","created":{"date-parts":[[2013,1,19]],"date-time":"2013-01-19T06:49:05Z","timestamp":1358578145000},"source":"Crossref","is-referenced-by-count":52,"title":["A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems"],"prefix":"10.1007","volume":"37","author":[{"given":"Xinhong","family":"Hao","sequence":"first","affiliation":[]},{"given":"Jiantao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qinghai","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaopeng","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,1,20]]},"reference":[{"issue":"4","key":"9919_CR1","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1109\/TITB.2004.840019","volume":"8","author":"RSH Istepanian","year":"2004","unstructured":"Istepanian, R. S. H., Jovanov, E., and Zhang, Y. T., Guest editorial introduction to the special section on M-health: Beyond seamless mobility and global wireless health-care connectivity. IEEE Trans. Inf. Technol. Biomed. 8(4):405\u2013414, 2004.","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"9919_CR2","doi-asserted-by":"crossref","unstructured":"Latr\u00e9, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P., A survey on wireless body area networks. J. Wireless Netw. 17(1). January 2011.","DOI":"10.1007\/s11276-010-0252-4"},{"key":"9919_CR3","doi-asserted-by":"crossref","unstructured":"Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y., A secure authentication scheme for Telecare medicine information systems. J. Med. Syst., 2010. doi: 10.1007\/s10916-010-9614-9 .","DOI":"10.1007\/s10916-010-9614-9"},{"key":"9919_CR4","doi-asserted-by":"crossref","unstructured":"He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst., 2011. doi: 10.1007\/s10916-011-9658-5 .","DOI":"10.1007\/s10916-011-9658-5"},{"key":"9919_CR5","doi-asserted-by":"crossref","unstructured":"Wei, J., Hu, X., and Liu, W., An Improved Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst., 2012. doi: 10.1007\/s10916-012-9835-1 .","DOI":"10.1007\/s10916-012-9835-1"},{"key":"9919_CR6","doi-asserted-by":"crossref","unstructured":"Zhu, Z., An Efficient Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst., 2012. doi: 10.1007\/s10916-012-9856-9 .","DOI":"10.1007\/s10916-012-9856-9"},{"key":"9919_CR7","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Proc. Adv. Cryptology (CRYPTO 99), pp. 388\u2013397, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"9919_CR8","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"T Messerges","year":"2002","unstructured":"Messerges, T., Dabbish, E., and Sloan, R., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"9919_CR9","doi-asserted-by":"crossref","unstructured":"Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun. (ICC09), 2009; p.1\u20136.","DOI":"10.1109\/ICC.2009.5198581"},{"issue":"4","key":"9919_CR10","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"N Yujun","year":"2011","unstructured":"Yujun, N., and Xingyuan, W., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear. Sci. Numer. Simulat. 16(4):1986\u20131992, 2011.","journal-title":"Commun. Nonlinear. Sci. Numer. Simulat."},{"key":"9919_CR11","doi-asserted-by":"crossref","unstructured":"Xue, K., and Hong, P., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simulat., 2011. doi: 10.1016\/j.cnsns.2011.11.025 .","DOI":"10.1016\/j.cnsns.2011.11.025"},{"key":"9919_CR12","doi-asserted-by":"crossref","unstructured":"Guo, C., and Chang, C., Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards. Commun. Nonlinear Sci. Numer. Simulat., 2012. doi: 10.1016\/j.cnsns.2012.09.032 .","DOI":"10.1016\/j.cnsns.2012.09.032"},{"key":"9919_CR13","doi-asserted-by":"crossref","first-page":"4052","DOI":"10.1016\/j.cnsns.2010.02.014","volume":"15","author":"X Wang","year":"2010","unstructured":"Wang, X., and Zhao, J., An improved key agreement protocol based on chaos, Communications in Commun. Nonlinear. Sci. Numer. Simulat. 15:4052\u20134057, 2010.","journal-title":"Nonlinear. Sci. Numer. Simulat."},{"key":"9919_CR14","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo, P., Arco, P., Santis, A., and Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I 52:1382\u20131393, 2005.","journal-title":"IEEE. Trans. Circ. Syst. I"},{"issue":"3","key":"9919_CR15","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos. Soliton. Fract. 37(3):669\u2013674, 2008.","journal-title":"Chaos. Soliton. Fract."},{"issue":"2","key":"9919_CR16","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1109\/TIE.2009.2028351","volume":"57","author":"X Li","year":"2010","unstructured":"Li, X., Qiu, W., Zheng, D., Chen, K., and Li, J., Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Ind. Electron. 57(2):793\u2013800, 2010.","journal-title":"IEEE Trans. Ind. Electron."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-012-9919-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-012-9919-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-012-9919-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T14:11:18Z","timestamp":1562595078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-012-9919-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,20]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["9919"],"URL":"https:\/\/doi.org\/10.1007\/s10916-012-9919-y","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,1,20]]},"article-number":"9919"}}