{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T14:53:55Z","timestamp":1758639235412},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T00:00:00Z","timestamp":1412812800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s10916-014-0139-5","type":"journal-article","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T08:10:11Z","timestamp":1412755811000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems"],"prefix":"10.1007","volume":"38","author":[{"given":"Xuelei","family":"Li","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Wenmin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhengping","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,9]]},"reference":[{"issue":"5","key":"139_CR1","first-page":"1","volume":"37","author":"CL Hsu","year":"2013","unstructured":"Hsu, C. L., Lee, M. R., and Su, C. H., The role of privacy protection in healthcare information systems adoption. J. Med. Syst. 37(5):1\u201312, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"139_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9949-0","volume":"37","author":"F Touati","year":"2013","unstructured":"Touati, F., and Tabish, R., U-Healthcare System: State-of-the-Art Review and Challenges. J. Med. Syst. 37(3):1\u201320, 2013.","journal-title":"J. Med. Syst."},{"issue":"2","key":"139_CR3","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1257\/jep.22.2.171","volume":"22","author":"KB Anderson","year":"2008","unstructured":"Anderson, K. B., Durbin, E., and Salinger, M. A., Identity theft. J. Econom. Perspect. 22(2):171\u2013192, 2008.","journal-title":"J. Econom. Perspect."},{"issue":"11","key":"139_CR4","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/MC.2012.364","volume":"45","author":"AK Jain","year":"2012","unstructured":"Jain, A. K., and Nandakumar, K., Biometric authentication: system security and user privacy. IEEE Comput. 45(11):87\u201392, 2012.","journal-title":"IEEE Comput."},{"issue":"1","key":"139_CR5","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"MS Hwang","year":"2000","unstructured":"Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electr. 46(1):28\u201330, 2000.","journal-title":"IEEE Trans. Consum. Electr."},{"issue":"4","key":"139_CR6","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"HY Chien","year":"2002","unstructured":"Chien, H. Y., Jan, J. K., and Tseng, Y. M., An efficient and practical solution to remote authentication: smart card. Comput. Secur. 21(4):372\u2013375, 2002.","journal-title":"Comput. Secur."},{"issue":"6","key":"139_CR7","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1016\/j.compeleceng.2011.09.015","volume":"37","author":"AK Awasthi","year":"2011","unstructured":"Awasthi, A. K., Srivastava, K., and Mittal, R. C., An improved timestamp-based remote user authentication scheme. Comput. Electr. Eng. 37(6):869\u2013874, 2011.","journal-title":"Comput. Electr. Eng."},{"issue":"5","key":"139_CR8","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X., Niu, J., Khurram Khan, M., and Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365\u20131371, 2013.","journal-title":"J. Netw. Comput. Appl."},{"key":"139_CR9","doi-asserted-by":"crossref","unstructured":"Wen, F., Susilo, W., and Yang, G., A robust smart card-based anonymous user authentication protocol for wireless communications. Secur. Commun. Netw. 2013. DOI: 10.1002\/sec.816.","DOI":"10.1002\/sec.816"},{"issue":"2","key":"139_CR10","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"ML Das","year":"2004","unstructured":"Das, M. L., Saxena, A., and Gulati, V. P., A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electr. 50(2):629\u2013631, 2004.","journal-title":"IEEE Trans. Consum. Electr."},{"key":"139_CR11","unstructured":"Awasthi, A.K., Comment on a dynamic ID-based remote user authentication scheme. arXiv preprint cs\/0410011, 2004. Available on: http:\/\/arxiv.org\/ftp\/cs\/papers\/0410\/0410011.pdf ."},{"issue":"1\u20132","key":"139_CR12","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","volume":"58","author":"X Li","year":"2013","unstructured":"Li, X., Ma, J., Wang, W., Xiong, Y., and Zhang, J., A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Mathematical and Computer Modelling 58(1\u20132):85\u201395, 2013.","journal-title":"Mathematical and Computer Modelling"},{"issue":"2","key":"139_CR13","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.compeleceng.2011.11.010","volume":"38","author":"F Wen","year":"2012","unstructured":"Wen, F., and Li, X., An improved dynamic ID-based remote user authentication with key agreement scheme. Comput. Electr. Eng. 38(2):381\u2013387, 2012.","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"139_CR14","first-page":"1","volume":"37","author":"TF Lee","year":"2013","unstructured":"Lee, T. F., and Liu, C. M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):1\u20138, 2013.","journal-title":"J. Med. Syst."},{"key":"139_CR15","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume":"99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. Advances in Cryptology-CRYPTO 99:388\u2013397, 1999.","journal-title":"Advances in Cryptology-CRYPTO"},{"issue":"5","key":"139_CR16","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"139_CR17","first-page":"203","volume":"08","author":"T Eisenbarth","year":"2008","unstructured":"Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., and Shalmani, M. T. M., On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme. Advances in Cryptology-CRYPTO 08:203\u2013220, 2008.","journal-title":"Advances in Cryptology-CRYPTO"},{"issue":"6","key":"139_CR18","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"HM Chen","year":"2012","unstructured":"Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907\u20133915, 2012.","journal-title":"J. Med. Syst."},{"issue":"2","key":"139_CR19","first-page":"1","volume":"37","author":"T Cao","year":"2013","unstructured":"Cao, T., and Zhai, J., Improved dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1\u20137, 2013.","journal-title":"J. Med. Syst."},{"issue":"2","key":"139_CR20","first-page":"1","volume":"37","author":"Q Xie","year":"2013","unstructured":"Xie, Q., Zhang, J., and Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1\u20138, 2013.","journal-title":"J. Med. Syst."},{"issue":"4","key":"139_CR21","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1109\/TIFS.2009.2031942","volume":"4","author":"CI Fan","year":"2009","unstructured":"Fan, C. I., and Lin, Y. H., Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans. Inf. Foren. Sec. 4(4):933\u2013945, 2009.","journal-title":"IEEE Trans. Inf. Foren. Sec."},{"issue":"1","key":"139_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C. T., and Hwang, M. S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1\u20135, 2010.","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"139_CR23","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J., Ma, J., Wang, W., and Liu, C., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 34(1):73\u201379, 2011.","journal-title":"Journal of Network and Computer Applications"},{"key":"139_CR24","doi-asserted-by":"crossref","unstructured":"Li, X., Niu, J., Wang, Z., Chen, C., Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks, 2013, in press, DOI: 10.1002\/sec.767 .","DOI":"10.1002\/sec.767"},{"key":"139_CR25","doi-asserted-by":"crossref","unstructured":"Li, X., Niu, J., Khan, M., Liao, J., Zhao, X., Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Security and Communication Networks, 2013, in press, DOI: 10.1002\/sec.961 .","DOI":"10.1002\/sec.961"},{"issue":"8","key":"139_CR26","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang, X., Xiang, Y., Chonka, A., Zhou, J., and Deng, R. H., A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8):1390\u20131397, 2011.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"139_CR27","first-page":"1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1\u201317, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"139_CR28","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"D He","year":"2012","unstructured":"He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"5","key":"139_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9964-1","volume":"37","author":"AK Awasthi","year":"2013","unstructured":"Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1\u20134, 2013.","journal-title":"J. Med. Syst."},{"key":"139_CR30","unstructured":"Mishra, D., and Mukhopadhyay, S., Security enhancement of biometric authentication scheme for telecare medicine information systems with nonce. arXiv preprint arXiv:1309.4690, 2013. Available on: http:\/\/arxiv.org\/pdf\/1309.4690v2.pdf ."},{"issue":"1","key":"139_CR31","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1):97\u2013139, 2008.","journal-title":"SIAM J. Comput."},{"issue":"1871","key":"139_CR32","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., and Needham, R., A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences 426(1871):233\u2013271, 1989.","journal-title":"Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences"},{"issue":"3","key":"139_CR33","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1145\/322510.322514","volume":"2","author":"S Halevi","year":"1999","unstructured":"Halevi, S., and Krawczyk, H., Public-key cryptography and password protocols. ACM Transactions on Information and System Security (TISSEC) 2(3):230\u2013268, 1999.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"5","key":"139_CR34","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1002\/nem.1827","volume":"23","author":"X Li","year":"2013","unstructured":"Li, X., Wen, Q., Zhang, H., and Jin, Z., An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. International Journal of Network Management 23(5):311\u2013324, 2013.","journal-title":"International Journal of Network Management"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-014-0139-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-014-0139-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-014-0139-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:50:53Z","timestamp":1559465453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-014-0139-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,9]]},"references-count":34,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["139"],"URL":"https:\/\/doi.org\/10.1007\/s10916-014-0139-5","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,9]]},"article-number":"139"}}