{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:00:44Z","timestamp":1762506044591},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T00:00:00Z","timestamp":1360281600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s10916-012-9920-5","type":"journal-article","created":{"date-parts":[[2013,2,6]],"date-time":"2013-02-06T21:44:29Z","timestamp":1360187069000},"source":"Crossref","is-referenced-by-count":20,"title":["An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System"],"prefix":"10.1007","volume":"37","author":[{"given":"Vanga","family":"Odelu","sequence":"first","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,2,8]]},"reference":[{"key":"9920_CR1","unstructured":"Advanced Encryption Standard, FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November 2001. http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf . Accessed on November 2010."},{"issue":"3","key":"9920_CR2","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"SG Akl","year":"1983","unstructured":"Akl, S. G., and Taylor, P. D., Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. (TOCS) 1(3):239\u2013248, 1983.","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"9920_CR3","unstructured":"Aumasson, J. P., Henzen, L., Meier, W., and Plasencia, M. N., Quark: A lightweight hash. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS. Vol. 6225, pp. 1\u201315, 2010."},{"key":"9920_CR4","unstructured":"Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., Seurin, Y., and Vikkelsoe, C., PRESENT: An ultra-lightweight block cipher. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), LNCS. Vol. 4727, pp. 450\u2013466, 2007."},{"key":"9920_CR5","unstructured":"Canniere, C. D., Dunkelman, O., and Knezevic, M., KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2009), LNCS. Vol. 5747, pp. 272\u2013288, 2009."},{"issue":"1","key":"9920_CR6","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.ins.2007.08.001","volume":"178","author":"YF Chung","year":"2008","unstructured":"Chung, Y. F., Lee, H. H., Lai, F., and Chen, T. S., Access control in user hierarchy based on elliptic curve cryptosystem. Inform. Sci. 178(1):230\u2013243, 2008.","journal-title":"Inform. Sci."},{"key":"9920_CR7","author":"AK Das","year":"2012","unstructured":"Das, A. K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci., 2012. doi: 10.1007\/s13119-012-0009-8 .","journal-title":"Netw. Sci."},{"issue":"3","key":"9920_CR8","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s10207-012-0162-9","volume":"11","author":"AK Das","year":"2012","unstructured":"Das, A. K., A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Secur. 11(3):189\u2013211, 2012.","journal-title":"Int. J. Inf. Secur."},{"key":"9920_CR9","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A. K., Paul, N. R., and Tripathy, L., Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inform. Sci. 209:80\u201392, 2012.","journal-title":"Inform. Sci."},{"key":"9920_CR10","unstructured":"DeWin, E., Bosselaers, A., Vandenberghe, S., De Gersem, P. and Vandewalle, J., A fast software implementation for arithmetic operations in $GF(2^{n})$ . In: Proceedings of Advances in Cryptology - ASIACRYPT \u201996, LNCS. Vol. 1163, pp. 65\u201376. Springer-Verlag, 1996."},{"issue":"2","key":"9920_CR11","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"9920_CR12","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1016\/j.jss.2006.01.018","volume":"79","author":"FG Jeng","year":"2006","unstructured":"Jeng, F. G., and Wang, C. M., An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. J. Syst. Softw. 79(8):1161\u20131167, 2006.","journal-title":"J. Syst. Softw."},{"key":"9920_CR13","unstructured":"Knudsen, L. R., Leander, G., Poschmann, A., and Robshaw, M. J. B., PRINTcipher: A block cipher for IC-Printing. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS. Vol. 6225, pp. 16\u201332, 2010."},{"key":"9920_CR14","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48:203\u2013209, 1987.","journal-title":"Math. Comput."},{"issue":"2\u20133","key":"9920_CR15","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N Koblitz","year":"2000","unstructured":"Koblitz, N., Menezes, A., and Vanstone, S. A., The state of elliptic curve cryptography. Des. Codes Crypt. 19(2\u20133):173\u2013193, 2000.","journal-title":"Des. Codes Crypt."},{"key":"9920_CR16","first-page":"109","volume":"8","author":"HZ Liao","year":"2006","unstructured":"Liao, H. Z., and Shen, Y. Y., On the elliptic curve digital signature algorithm. Tunghai Sci. 8:109\u2013126, 2006.","journal-title":"Tunghai Sci."},{"issue":"4","key":"9920_CR17","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1016\/j.jss.2010.11.926","volume":"84","author":"Y-L Lin","year":"2011","unstructured":"Lin, Y.-L., and Hsu, C.-L., Secure key management scheme for dynamic hierarchical access control based on ECC. J. Syst. Softw. 84(4):679\u2013685, 2011.","journal-title":"J. Syst. Softw."},{"issue":"480","key":"9920_CR18","doi-asserted-by":"crossref","first-page":"354","DOI":"10.2307\/3619777","volume":"77","author":"RWD Nickalls","year":"1993","unstructured":"Nickalls, R. W. D., A new approach to solving the cubic: Cardan\u2019s solution revealed. Math. Gaz. 77(480):354\u2013359, 1993.","journal-title":"Math. Gaz."},{"key":"9920_CR19","author":"M Nikooghadam","year":"2012","unstructured":"Nikooghadam, M., and Zakerolhosseini, A., Secure communication of medical information using mobile agents. J. Med. Syst., 2012. doi: 10.1007\/s10916-012-9857-8 .","journal-title":"J. Med. Syst."},{"issue":"10","key":"9920_CR20","doi-asserted-by":"crossref","first-page":"1917","DOI":"10.1016\/j.jss.2010.05.072","volume":"83","author":"M Nikooghadam","year":"2010","unstructured":"Nikooghadam, M., Zakerolhosseini, A., and Moghaddam, M. E., Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J. Syst. Softw. 83(10):1917\u20131929, 2010.","journal-title":"J. Syst. Softw."},{"key":"9920_CR21","doi-asserted-by":"crossref","unstructured":"Pang, C., Hansen, D., and Maeder, A., Managing RBAC states with transitive relations. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS \u201907), pp. 139\u2013148, 2007.","DOI":"10.1145\/1229285.1229306"},{"key":"9920_CR22","doi-asserted-by":"crossref","unstructured":"Schroeppel, R., Orman, H., O\u2019Malley, S., and Spatscheck, O., Fast key exchange with elliptic curve systems. In: Proceedings of Advances in Cryptology - CRYPTO \u201995, LNCS. Vol. 963, pp. 43\u201356. Springer-Verlag, 1995.","DOI":"10.1007\/3-540-44750-4_4"},{"key":"9920_CR23","unstructured":"Stallings, W., Cryptography and network security: principles and practices. 3 ed.: Prentice Hall, 2003."},{"key":"9920_CR24","unstructured":"Secure Hash Standard . FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995"},{"key":"9920_CR25","author":"S Wu","year":"2011","unstructured":"Wu, S., and Chen, K., An efficient key-management scheme for hierarchical access control in E-Medicine system. J. Med. Syst., 2011. doi: 10.1007\/s10916-011-9700-7 .","journal-title":"J. Med. Syst."},{"issue":"2","key":"9920_CR26","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/s10916-010-9527-7","volume":"36","author":"Z-Y Wu","year":"2012","unstructured":"Wu, Z.-Y., Chung, Y., Lai, F., and Chen, T.-S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631\u2013638, 2012.","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-012-9920-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-012-9920-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-012-9920-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T06:41:11Z","timestamp":1562654471000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-012-9920-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,8]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["9920"],"URL":"https:\/\/doi.org\/10.1007\/s10916-012-9920-5","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,2,8]]},"article-number":"9920"}}