{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:38:25Z","timestamp":1762623505595},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2013,8,31]],"date-time":"2013-08-31T00:00:00Z","timestamp":1377907200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1007\/s10916-013-9972-1","type":"journal-article","created":{"date-parts":[[2013,8,30]],"date-time":"2013-08-30T05:12:13Z","timestamp":1377839533000},"source":"Crossref","is-referenced-by-count":52,"title":["A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems"],"prefix":"10.1007","volume":"37","author":[{"given":"Xiaopeng","family":"Yan","sequence":"first","affiliation":[]},{"given":"Weiheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiantao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xinhong","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,31]]},"reference":[{"issue":"4","key":"9972_CR1","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1005549330655","volume":"24","author":"C Lambrinoudakis","year":"2000","unstructured":"Lambrinoudakis, C., and Gritzalis, S., Managing medical and insura nce information through a smart-card-based information system. Journal of Medical Systems 24(4):213\u2013234, 2000.","journal-title":"Journal of Medical Systems"},{"key":"9972_CR2","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L., Password authentication with insecure communication. Commun ACM 24:28\u201330, 1981.","journal-title":"Commun ACM"},{"issue":"2A","key":"9972_CR3","first-page":"55","volume":"38","author":"D He","year":"2011","unstructured":"He, D., Chen, J., and Hu, J., Further improvement of Juang et al.'s password-authenticated key agreement scheme using smart cards. Kuwait Journal of Science & Engineering 38(2A):55\u201368, 2011.","journal-title":"Kuwait Journal of Science & Engineering"},{"issue":"12","key":"9972_CR4","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1002\/sec.506","volume":"5","author":"D He","year":"2012","unstructured":"He, D., Chen, J., and Chen, Y., A secure mutual authentication scheme for session initiation scheme using elliptic curve cryptography. Security and Communication Networks 5(12):1423\u20131429, 2012.","journal-title":"Security and Communication Networks"},{"issue":"3","key":"9972_CR5","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s11071-012-0335-0","volume":"69","author":"D He","year":"2012","unstructured":"He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement scheme. Nonlinear Dynamics 69(3):1149\u20131157, 2012.","journal-title":"Nonlinear Dynamics"},{"issue":"3","key":"9972_CR6","first-page":"405","volume":"13","author":"D He","year":"2012","unstructured":"He, D., Chen, J., and Hu, J., Improvement on a smart card based password authentication scheme. Journal of Internet Technology 13(3):405\u2013410, 2012.","journal-title":"Journal of Internet Technology"},{"issue":"6","key":"9972_CR7","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1016\/j.adhoc.2012.01.002","volume":"10","author":"D He","year":"2012","unstructured":"He, D., An efficient remote user authentication and key exchange scheme for mobile client\u2013server environment from pairings. Ad Hoc Networks 10(6):1009\u20131016, 2012.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"9972_CR8","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.inffus.2011.01.001","volume":"13","author":"D He","year":"2012","unstructured":"He, D., Chen, J., and Hu, J., An ID-based client authentication with key agreement scheme for mobile client\u2013server environment on ECC with provable security. Information Fusion 13(3):223\u2013230, 2012.","journal-title":"Information Fusion"},{"key":"9972_CR9","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36:1529\u201335, 2012.","journal-title":"Journal of Medical Systems"},{"key":"9972_CR10","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"DB He","year":"2012","unstructured":"He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36:1989\u20131995, 2012.","journal-title":"Journal of Medical Systems"},{"key":"9972_CR11","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems 36:3597\u20133604, 2012.","journal-title":"Journal of Medical Systems"},{"key":"9972_CR12","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An Efficient authentication scheme for telecare medicine information systems. Journal of Medical Systems 36:3833\u20133838, 2012.","journal-title":"Journal of Medical Systems"},{"key":"9972_CR13","author":"M Khan","year":"2012","unstructured":"Khan, M., and Kumari, S., An Authentication Scheme for Secure Access to Healthcare Services. Journal of medical systems, 2012. doi: 10.1007\/s10916-013-9954-3 .","journal-title":"Journal of medical systems"},{"key":"9972_CR14","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Ma, Z., et al., A privacy enhanced authentication scheme for telecare medical information systems. Journal of medical systems, 2013. doi: 10.1007\/s10916-012-9897-0 .","journal-title":"Journal of medical systems"},{"key":"9972_CR15","author":"T Lee","year":"2013","unstructured":"Lee, T., Chang, I., Lin, T., et al., A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. Journal of medical systems, 2013. doi: 10.1007\/s10916-013-9941-8 .","journal-title":"Journal of medical systems"},{"key":"9972_CR16","author":"T Cao","year":"2013","unstructured":"Cao, T., and Zhai, J., Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. Journal of medical systems, 2013. doi: 10.1007\/s10916-012-9912-5 .","journal-title":"Journal of medical systems"},{"key":"9972_CR17","author":"S Kumari","year":"2012","unstructured":"Kumari, S., Khan, M., and Kumar, R., Cryptanalysis and Improvement of \u2018A Privacy Enhanced Scheme for Telecare Medical Information Systems. Journal of medical systems, 2012. doi: 10.1007\/s10916-013-9952-5 .","journal-title":"Journal of medical systems"},{"issue":"5","key":"9972_CR18","first-page":"200","volume":"89","author":"Z Tan","year":"2013","unstructured":"Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Przeglad Elektrotechniczny 89(5):200\u2013204, 2013.","journal-title":"Przeglad Elektrotechniczny"},{"key":"9972_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C-T Li","year":"2010","unstructured":"Li, C.-T., and Hwang, M.-S., An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 33:1\u20135, 2010.","journal-title":"Journal of Network and Computer Applications"},{"key":"9972_CR20","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography, CRC Press","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A. J., Vanstone, S. A., and Van Oorschot, P. C., Handbook of Applied Cryptography, CRC Press. Inc. Boca Raton, FL, USA, 1996."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-013-9972-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-013-9972-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-013-9972-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:51:49Z","timestamp":1559465509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-013-9972-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,31]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,10]]}},"alternative-id":["9972"],"URL":"https:\/\/doi.org\/10.1007\/s10916-013-9972-1","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,31]]},"article-number":"9972"}}