{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T01:03:34Z","timestamp":1770339814552,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2014,7,6]],"date-time":"2014-07-06T00:00:00Z","timestamp":1404604800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s10916-014-0077-2","type":"journal-article","created":{"date-parts":[[2014,7,5]],"date-time":"2014-07-05T08:28:48Z","timestamp":1404548928000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems"],"prefix":"10.1007","volume":"38","author":[{"given":"Chun-Ta","family":"Li","sequence":"first","affiliation":[]},{"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Chi-Yao","family":"Weng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,6]]},"reference":[{"issue":"5","key":"77_CR1","doi-asserted-by":"crossref","first-page":"9964","DOI":"10.1007\/s10916-013-9964-1","volume":"37","author":"AK Awasthi","year":"2013","unstructured":"Awasthi, A.K., and Srivastava, K., A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Med. Syst. 37(5):9964, 2013.","journal-title":"J. Med. Syst."},{"issue":"2","key":"77_CR2","first-page":"139","volume":"15","author":"CC Chang","year":"2013","unstructured":"Chang, C.C., and Lee, C.Y., A Smart Card-Based Authentication Scheme Uing User Identify Cryptography. Int. J. Netw. Secur. 15 (2):139\u2013147, 2013.","journal-title":"Int. J. Netw. Secur."},{"issue":"1","key":"77_CR3","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ins.2010.08.032","volume":"181","author":"TY Chang","year":"2011","unstructured":"Chang, T.Y., Hwang, M.S., Yang, W.P., A Communication-Efficient Three-Party Password Authenticated Key Exchange Protocol. Inf. Sci. 181 (1):217\u2013226, 2011.","journal-title":"Inf. Sci."},{"issue":"2","key":"77_CR4","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1007\/s11227-013-0966-z","volume":"66","author":"TY Chen","year":"2013","unstructured":"Chen, T.Y., Lee, C.C., Hwang, M.S., Jan, J.K., Towards Secure and Efficient User Authentication Scheme Using Smart Card for Multi-Server Environments. J. Supercomput. 66 (2):1008\u20131032, 2013.","journal-title":"J. Supercomput."},{"issue":"1","key":"77_CR5","first-page":"1","volume":"14","author":"AK Das","year":"2012","unstructured":"Das, A.K., Improving Identity-Based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks. Int. J. Netw. Secur. 14 (1):1\u201321, 2012.","journal-title":"Int. J. Netw. Secur."},{"issue":"5","key":"77_CR6","doi-asserted-by":"crossref","first-page":"9969","DOI":"10.1007\/s10916-013-9969-9","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A.K., and Bruhadeshwar, B., An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System. J. Med. Syst. 37 (5):9969, 2013.","journal-title":"J. Med. Syst."},{"issue":"6","key":"77_CR7","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1016\/j.cnsns.2012.09.032","volume":"18","author":"C Guo","year":"2013","unstructured":"Guo, C., and Chang, C.C., Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards. Commun. Nonlinear Sci. Numer. Simul. 18 (6):1433\u20131440, 2013.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"2","key":"77_CR8","doi-asserted-by":"crossref","first-page":"9919","DOI":"10.1007\/s10916-012-9919-y","volume":"37","author":"X Hao","year":"2013","unstructured":"Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A Chaotic Map-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37 (2):9919, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"77_CR9","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"D He","year":"2012","unstructured":"He, D., Chen, J., Zhang, R., A More Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 36 (3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"5","key":"77_CR10","first-page":"350","volume":"15","author":"D He","year":"2013","unstructured":"He, D., Zhao, W., Wu, S., Security Analysis of a Dynamic ID-Based Authentication Scheme for Multi-Server Environment Using Smart Cards. Int. J. Netw. Secur. 15 (5):350\u2013356, 2013.","journal-title":"Int. J. Netw. Secur."},{"issue":"1","key":"77_CR11","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.ins.2012.11.004","volume":"227","author":"MS Hwang","year":"2013","unstructured":"Hwang, M.S., Lee, C.C., Tzeng, S.F., A New Proxy Signature Scheme for a Specified Group of Verifiers. Inf. Sci. 227 (1):102\u2013115, 2013.","journal-title":"Inf. Sci."},{"issue":"2","key":"77_CR12","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust Chaotic Map-Based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38 (2):12, 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"77_CR13","first-page":"357","volume":"15","author":"J Kar","year":"2013","unstructured":"Kar, J., ID-Based Deniable Authentication Protocol Based on Diffie-Hellman Problem on Elliptic Curve. Int. J. Netw. Secur. 15 (5):357\u2013364, 2013.","journal-title":"Int. J. Netw. Secur."},{"issue":"6","key":"77_CR14","doi-asserted-by":"crossref","first-page":"9985","DOI":"10.1007\/s10916-013-9985-9","volume":"37","author":"TF Lee","year":"2013","unstructured":"Lee, T.F., An Efficient Chaotic Map-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems. J. Med. Syst. 37 (6):9985, 2013.","journal-title":"J. Med. Syst."},{"issue":"1-2","key":"77_CR15","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1007\/s11071-013-0772-4","volume":"73","author":"CC Lee","year":"2013","unstructured":"Lee, C.C., Li, C.T., Hsu, C.W., A Three-Party Password-Based Authenticated Key Exchange Protocol with User Anonymity Using Extended Chaotic Maps. Nonlinear Dyn. 73 (1-2):125\u2013132, 2013.","journal-title":"Nonlinear Dyn."},{"key":"77_CR16","doi-asserted-by":"crossref","unstructured":"Lee, C.C., Chen, C.T., Li, C.T., Wu, P.H., A Practical RFID Authentication Mechanism for Digital Television, Telecommunication Systems: Article in press, 2013.","DOI":"10.1007\/s11235-013-9844-5"},{"issue":"1","key":"77_CR17","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1007\/s11071-013-1174-3","volume":"76","author":"CC Lee","year":"2014","unstructured":"Lee, C.C., Lou, D.C., Li, C.T., Hsu, C.W., An Extended Chaotic-Maps-Based Protocol with Key Agreement for Multiserver Environments. Nonlinear Dyn. 76 (1):853\u2013866, 2014.","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"77_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C.T., and Hwang, M.S., An Efficient Biometrics-Based Remote User Authentication Scheme Using Smart Cards. J. Netw. Comput. Appl. 33 (1):1\u20135, 2010.","journal-title":"J. Netw. Comput. Appl."},{"issue":"23","key":"77_CR19","doi-asserted-by":"crossref","first-page":"5333","DOI":"10.1016\/j.ins.2011.07.014","volume":"181","author":"CT Li","year":"2011","unstructured":"Li, C.T., and Hwang, M.S., A Lightweight Anonymous Routing Protocol Without Public Key En\/Decryptions for Wireless ad Hoc Networks. Inf. Sci. 181 (23):5333\u20135347, 2011.","journal-title":"Inf. Sci."},{"issue":"2","key":"77_CR20","first-page":"157","volume":"40","author":"CT Li","year":"2011","unstructured":"Li, C.T., Secure Smart Card Based Password Authentication Scheme with User Anonymity. Inf. Technol. Control. 40 (2):157\u2013162, 2011.","journal-title":"Inf. Technol. Control."},{"issue":"3","key":"77_CR21","first-page":"236","volume":"40","author":"CT Li","year":"2011","unstructured":"Li, C.T., and Lee, C.C., A Robust Remote User Authentication Scheme Using Smart Card. Inf. Technol. Control. 40 (3):236\u2013245, 2011.","journal-title":"Inf. Technol. Control."},{"issue":"1-2","key":"77_CR22","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.mcm.2011.01.010","volume":"55","author":"CT Li","year":"2012","unstructured":"Li, C.T., and Lee, C.C., A Novel User Authentication and Privacy Preserving Scheme with Smart Cards for Wireless Communications. Math. Comput. Model. 55 (1-2):35\u201344 , 2012.","journal-title":"Math. Comput. Model."},{"issue":"1","key":"77_CR23","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1049\/iet-ifs.2012.0058","volume":"7","author":"CT Li","year":"2013","unstructured":"Li, C.T., A New Password Authentication and User Anonymity Scheme Based on Elliptic Curve Cryptography and Smart Card. IET Inf. Secur. 7 (1):3\u201310, 2013.","journal-title":"IET Inf. Secur."},{"issue":"1","key":"77_CR24","first-page":"119","volume":"7","author":"CT Li","year":"2013","unstructured":"Li, C.T., Lee, C.C., Weng, C.Y., Fan, C.I., An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Trans. Int. Inf. Syst. 7 (1):119\u2013131, 2013.","journal-title":"KSII Trans. Int. Inf. Syst."},{"issue":"8","key":"77_CR25","doi-asserted-by":"crossref","first-page":"9589","DOI":"10.3390\/s130809589","volume":"13","author":"CT Li","year":"2013","unstructured":"Li, C.T., Weng, C.Y., Lee, C.C., An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks. Sensors 13 (8):9589\u20139603, 2013.","journal-title":"Sensors"},{"issue":"4","key":"77_CR26","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1007\/s11071-013-1029-y","volume":"74","author":"CT Li","year":"2013","unstructured":"Li, C.T., Lee, C.C., Weng, C.Y., An Extended Chaotic Maps Based User Authentication and Privacy Preserving Scheme Against DoS Attacks in Pervasive and Ubiquitous Computing Environments. Nonlinear Dyn. 74 (4):1133\u20131143, 2013.","journal-title":"Nonlinear Dyn."},{"issue":"9(B","key":"77_CR27","first-page":"6817","volume":"16","author":"CT Li","year":"2013","unstructured":"Li, C.T., and Lee, C.C., More Secure Authenticated Group Key Agreement in a Mobile Environment. Inf. Int. Interdiscip. J. 16 (9(B)):6817\u20136830, 2013.","journal-title":"Inf. Int. Interdiscip. J."},{"issue":"4","key":"77_CR28","first-page":"1271","volume":"17","author":"CT Li","year":"2014","unstructured":"Li, C.T., and Lee, C.C., A Novel User Authentication and Key Agreement Scheme with Smart Cards Over Insecure Networks. Inf. Int. Interdiscip. J. 17 (4):1271\u20131284, 2014.","journal-title":"Inf. Int. Interdiscip. J."},{"issue":"4","key":"77_CR29","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.jcss.2005.10.001","volume":"72","author":"IE Liao","year":"2006","unstructured":"Liao, I.E., Lee, C.C., Hwang, M.S., A Password Authentication Scheme Over Insecure Networks. J. Comput. Syst. Sci. 72 (4):727\u2013740, 2006.","journal-title":"J. Comput. Syst. Sci."},{"issue":"3","key":"77_CR30","first-page":"180","volume":"14","author":"R Ramasamy","year":"2012","unstructured":"Ramasamy, R., and Muniyandi, A.P., An Efficient Password Authentication Scheme for Smart Card. Int. J. Netw. Secur. 14 (3):180\u2013186, 2012.","journal-title":"Int. J. Netw. Secur."},{"key":"77_CR31","unstructured":"National Institute of Standards and Technology, US Department of Commerce, Secure Hash Standard, pp. 180\u2013182: US Federal Information Processing Standard Publication, 2002."},{"issue":"3","key":"77_CR32","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 36 (3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"1","key":"77_CR33","doi-asserted-by":"crossref","first-page":"9994","DOI":"10.1007\/s10916-013-9994-8","volume":"38","author":"X Xu","year":"2013","unstructured":"Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems. J. Med. Syst. 38 (1):9994, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"77_CR34","first-page":"156","volume":"14","author":"L Yang","year":"2012","unstructured":"Yang, L., Ma, J.F., Jiang, Q., Mutual Authentication Scheme with Smart Cards and Password Under Trusted Computing. Int. J. Netw. Secur. 14 (3):156\u2013163, 2012.","journal-title":"Int. J. Netw. Secur."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-014-0077-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-014-0077-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-014-0077-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:51:52Z","timestamp":1559465512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-014-0077-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,6]]},"references-count":34,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["77"],"URL":"https:\/\/doi.org\/10.1007\/s10916-014-0077-2","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,6]]},"article-number":"77"}}