{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:11:47Z","timestamp":1769818307753,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,5,10]],"date-time":"2013-05-10T00:00:00Z","timestamp":1368144000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s10916-013-9948-1","type":"journal-article","created":{"date-parts":[[2013,5,9]],"date-time":"2013-05-09T09:22:03Z","timestamp":1368091323000},"source":"Crossref","is-referenced-by-count":88,"title":["A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care"],"prefix":"10.1007","volume":"37","author":[{"given":"Ashok Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,10]]},"reference":[{"key":"9948_CR1","unstructured":"Aumasson, J. P., Henzen, L., Meier, W., and Plasencia, M. N., Quark: A lightweight hash. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS. Vol. 6225, pp. 1\u201315, 2010."},{"key":"9948_CR2","unstructured":"AVISPA, Automated Validation of Internet Security Protocols and Applications. http:\/\/www.avispa-project.org\/ . Accessed on January 2013."},{"key":"9948_CR3","unstructured":"AVISPA: AVISPA Web Tool. http:\/\/www.avispa-project.org\/web-interface\/expert.php\/ . Accessed on January 2013."},{"issue":"3","key":"9948_CR4","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D Basin","year":"2005","unstructured":"Basin, D., Modersheim, S., and Vigano, L., OFMC: A symbolic model checker for security protocols. Int. J. Inf. Secur. 4(3):181\u2013208, 2005.","journal-title":"Int. J. Inf. Secur."},{"key":"9948_CR5","doi-asserted-by":"crossref","first-page":"9902","DOI":"10.1007\/s10916-012-9902-7","volume":"37","author":"Y-F Chang","year":"2013","unstructured":"Chang, Y.-F., Yu, S.-H., and Shiao, D.-R., An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9902, 2013.","journal-title":"J. Med. Syst."},{"key":"9948_CR6","author":"AK Das","year":"2012","unstructured":"Das, A.K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci., 2012. doi: 10.1007\/s13119-012-0009-8 .","journal-title":"Netw. Sci."},{"issue":"3","key":"9948_CR7","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A.K., Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3):145\u2013151, 2011.","journal-title":"IET Inf. Secur."},{"issue":"3","key":"9948_CR8","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s10207-012-0162-9","volume":"11","author":"AK Das","year":"2012","unstructured":"Das, A.K., A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Secur. 11(3):189\u2013211, 2012.","journal-title":"Int. J. Inf. Secur."},{"key":"9948_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-35864-7","author":"AK Das","year":"2013","unstructured":"Das, A.K., Massand, A., and Patil, S., A novel proxy signature scheme based on user hierarchical access control policy. J. King Saud Univ.\u2014Comput. Inform. Sci., 2013. doi: 10.1016\/j.jksuci.2012.12.001 .","journal-title":"J. King Saud Univ.\u2014Comput. Inform. Sci."},{"issue":"3","key":"9948_CR10","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M.L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3):1086\u20131090, 2009.","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"2","key":"9948_CR11","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"9948_CR12","first-page":"61","volume":"1","author":"MS Hwang","year":"2005","unstructured":"Hwang, M.S., and Liu, C.-Y., Authenticated encryption schemes: Current status and key issues. Int. J. Netw. Secur. 1(2):61\u201373, 2005.","journal-title":"Int. J. Netw. Secur."},{"issue":"11","key":"9948_CR13","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jina","year":"2004","unstructured":"Jina, A.T.B., Linga, D.N.C., and Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11):2245\u20132255, 2004.","journal-title":"Pattern Recogn."},{"issue":"3","key":"9948_CR14","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.chaos.2006.05.061","volume":"35","author":"MK Khan","year":"2008","unstructured":"Khan, M.K., Zhang, J., and Wang, X., Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaotic Solitons Fractals 35(3):519\u2013524, 2008.","journal-title":"Chaotic Solitons Fractals"},{"key":"9948_CR15","unstructured":"Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology\u2014CRYPTO\u201999, LNCS. Vol. 1666, pp 388\u2013397, 1999."},{"issue":"2","key":"9948_CR16","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.csi.2004.06.001","volume":"27","author":"N-Y Lee","year":"2005","unstructured":"Lee, N.-Y., and Chiu, Y.-C., Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2):177\u2013180, 2005.","journal-title":"Comput. Stand. Interfaces"},{"key":"9948_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C-T Li","year":"2010","unstructured":"Li, C.-T., and Hwang, M.-S., An efficient biometric-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33:1\u20135, 2010.","journal-title":"J. Netw. Comput. Appl."},{"key":"9948_CR18","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J.-W., Ma, J., Wang, W.-D., and Liu, C.-L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34:73\u201379, 2011.","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"9948_CR19","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern Recogn. 40(3):1057\u20131065, 2007.","journal-title":"Pattern Recogn."},{"issue":"1\u20133","key":"9948_CR20","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s10623-010-9458-9","volume":"59","author":"S Manuel","year":"2011","unstructured":"Manuel, S., Classification generation of disturbance vectors for collision attacks against SHA-1. Des. Codes Crypt. 59(1\u20133):247\u2013263, 2011.","journal-title":"Des. Codes Crypt."},{"issue":"5","key":"9948_CR21","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., and Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"9948_CR22","unstructured":"Stallings, W., Cryptography and network security: Principles and practices. Prentice Hall, 3rd edition, 2003."},{"key":"9948_CR23","unstructured":"Secure Hash Standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, 1995."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-013-9948-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-013-9948-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-013-9948-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:51:49Z","timestamp":1559465509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-013-9948-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,10]]},"references-count":23,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["9948"],"URL":"https:\/\/doi.org\/10.1007\/s10916-013-9948-1","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,10]]},"article-number":"9948"}}