{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T12:01:33Z","timestamp":1775044893714,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s10916-014-0027-z","type":"journal-article","created":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T10:41:47Z","timestamp":1401705707000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function"],"prefix":"10.1007","volume":"38","author":[{"given":"Ashok Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,3]]},"reference":[{"key":"27_CR1","unstructured":"AVISPA: Automated validation of internet security protocols and applications. http:\/\/www.avispa-project.org\/ . Accessed Jan 2013."},{"key":"27_CR2","unstructured":"AVISPA: AVISPA Web Tool. http:\/\/www.avispa-project.org\/web-interface\/expert.php\/ . Accessed Sept 2013."},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1\u20134, 2013.","DOI":"10.1007\/s10916-013-9964-1"},{"key":"27_CR4","unstructured":"Basin, D., Modersheim, S., and Vigano, L., OFMC: A symbolic model checker for security protocols. Int. J. Inf. Sec. 4(3):181\u2013208, 2005."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Chang, Y.-F., Yu, S.-H., and Shiao, D.-R., An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9902, 2013.","DOI":"10.1007\/s10916-012-9902-7"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Chang, Y.-F., Yu, S.-H., and Shiao, D.-R., An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:1\u20139, 2013.","DOI":"10.1007\/s10916-012-9902-7"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Das, A. K., Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Sec. 5(3):145\u2013151, 2011.","DOI":"10.1049\/iet-ifs.2010.0125"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Das, A. K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci. 2(1\u20132):12\u201327, 2013.","DOI":"10.1007\/s13119-012-0009-8"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Das, A. K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1\u201316, 2013.","DOI":"10.1007\/s10916-013-9948-1"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Das, A. K., Massand, A., and Patil, S., A novel proxy signature scheme based on user hierarchical access control policy. J. King Saud University - Comput. Inf. Sci. 25(2):219\u2013228, 2013.","DOI":"10.1016\/j.jksuci.2012.12.001"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Das, A. K., Paul, N. R., and Tripathy, L., Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inf. Sci. 209:80\u201392, 2012.","DOI":"10.1016\/j.ins.2012.04.036"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1\u201317, 2013.","DOI":"10.1007\/s10916-013-9969-9"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Das, M. L., Saxena, A., and Gulati, V. P., A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2):629\u2013631, 2004.","DOI":"10.1109\/TCE.2004.1309441"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory. 29(2):198\u2013208, 1983.","DOI":"10.1109\/TIT.1983.1056650"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Hwang, M.-S., and Li, L.-H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1): 28\u201330, 2000.","DOI":"10.1109\/30.826377"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Hwang, T., Chen, Y., and Laih, C.-S., Non-interactive password authentications without password tables. In: Proceedings of IEEE Region 10 Conference on Computer and Communication Systems (TENCON\u201990). Vol. 1, pp. 429\u2013431, 1990.","DOI":"10.1109\/TENCON.1990.152647"},{"key":"27_CR17","unstructured":"Jaspher, G., Kathrine, W., Kirubakaran, E., and Prakash, P., Smart card based remote user authentication schemes: A survey. Procedia Eng. 38:1318\u20131326, 2012."},{"key":"27_CR18","unstructured":"Jina, A. T. B., Linga, D. N. C., and Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog. 37(11):2245\u20132255, 2004."},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Khan, M. K., Kim, S.-K., and Alghathbar, K., Cryptanalysis and security enhancement of a \u2018more efficient & secure dynamic ID-based remote user authentication scheme\u2019. Comput Commun. 34(3):305\u2013309, 2011.","DOI":"10.1016\/j.comcom.2010.02.011"},{"key":"27_CR20","unstructured":"Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology - CRYPTO\u201999, LNCS. Vol. 1666, pp. 388\u2013397, 1999."},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Lamport, L., Password authentification with insecure communication. Commun. ACM. 24(11):770\u2013772, 1981.","DOI":"10.1145\/358790.358797"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Li, C.-T., and Hwang, M.-S., An efficient biometric-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33:1\u20135, 2010.","DOI":"10.1016\/j.jnca.2009.08.001"},{"key":"27_CR23","unstructured":"Li, C.-T., Lee, C.-C., Liu, C.-J., and Lee, C.-W., A robust remote user authentication scheme against smart card security breach. In: Proceedings of Data and Applications Security and Privacy XXV, LNCS. VOl. 6818, pp. 231\u2013238, 2011."},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Li, X., Niu, J.-W., Ma, J., Wang, W.-D., and Liu, C.-L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34:73\u201379, 2011.","DOI":"10.1016\/j.jnca.2010.09.003"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern Recog. 40(3):1057\u20131065, 2007.","DOI":"10.1016\/j.patcog.2006.05.030"},{"key":"27_CR26","unstructured":"Madhusudhan, R., and Mittal, R. C., Dynamic ID-based remote user password authentication schemes using smart cards: A review. J. Netw. Comput. Appl. 35(4):1235\u20131248, 2012."},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","DOI":"10.1109\/TC.2002.1004593"},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Odelu, V., Das, A. K., and Goswami, A., An effective and secure key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst. 37(2):1\u201318, 2013.","DOI":"10.1007\/s10916-012-9920-5"},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Wang, Y.-Y., Liu, J.-Y., Xiao, F.-X., and Dan, J., A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32(4):583\u2013585, 2009.","DOI":"10.1016\/j.comcom.2008.11.008"},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Xiao, D., Liao, X., and Deng, S., One-way hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons Fractals. 241:65\u201371, 2005.","DOI":"10.1016\/j.chaos.2004.07.003"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-014-0027-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-014-0027-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-014-0027-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T05:53:12Z","timestamp":1746251592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-014-0027-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":30,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["27"],"URL":"https:\/\/doi.org\/10.1007\/s10916-014-0027-z","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6]]},"article-number":"27"}}