{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:09:17Z","timestamp":1766268557734},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,18]],"date-time":"2014-11-18T00:00:00Z","timestamp":1416268800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s10916-014-0145-7","type":"journal-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T09:25:17Z","timestamp":1418030717000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":86,"title":["An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems"],"prefix":"10.1007","volume":"39","author":[{"given":"Debasis","family":"Giri","sequence":"first","affiliation":[]},{"given":"Tanmoy","family":"Maitra","sequence":"additional","affiliation":[]},{"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[]},{"given":"P. D.","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"issue":"11","key":"145_CR1","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L., Password authentication with insecure communication. Commun. ACM 24(11):770\u2013772, 1981.","journal-title":"Commun. ACM"},{"issue":"1","key":"145_CR2","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"MS Hwang","year":"2000","unstructured":"Hwang, M.S., and Li, L.H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1):28\u201330, 2000.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"145_CR3","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.compeleceng.2006.11.005","volume":"34","author":"NY Lee","year":"2008","unstructured":"Lee, N.Y., Wu, C.N., Wang, C.C., Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings. Comput. Electr. Eng. 34(1):12\u201320, 2008.","journal-title":"Comput. Electr. Eng."},{"issue":"3\u20134","key":"145_CR4","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"JH Yang","year":"2009","unstructured":"Yang, J.H., and Chang, C.C., An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3\u20134):138\u2013143, 2009.","journal-title":"Comput. Secur."},{"issue":"4","key":"145_CR5","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1016\/j.jcss.2010.07.004","volume":"77","author":"RC Wang","year":"2011","unstructured":"Wang, R.C., Juang, W.S., Lei, C.L., Provably secure and efficient identification and key agreement protocol with user anonymity. J. Comput Syst. Sci. 77(4):790\u2013798, 2011.","journal-title":"J. Comput Syst. Sci."},{"issue":"12","key":"145_CR6","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1002\/sec.506","volume":"5","author":"D He","year":"2012","unstructured":"He, D., Chen, J., Chen, Y., A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Commun. Netw. 5(12):1423\u20131429, 2012.","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"145_CR7","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"5","key":"145_CR8","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P Shor","year":"1997","unstructured":"Shor, P., Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5):1484\u20131509, 1997.","journal-title":"SIAM J. Comput."},{"issue":"3","key":"145_CR9","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"D He","year":"2012","unstructured":"He, D., Chen, J., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"145_CR10","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"145_CR11","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833\u20133838, 2012.","journal-title":"J. Med. Syst."},{"issue":"2","key":"145_CR12","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120\u2013126, 1978.","journal-title":"Commun. ACM"},{"issue":"4","key":"145_CR13","first-page":"1","volume":"37","author":"MK Khan","year":"2013","unstructured":"Khan, M.K., and Kumari, S., Authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):1\u201312, 2013.","journal-title":"J. Med. Syst."},{"key":"145_CR14","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO\u201999), LNCS, vol. 1666, pp. 388\u2013397 (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"145_CR15","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"issue":"2","key":"145_CR16","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TMC.2006.16","volume":"5","author":"N Potlapally","year":"2006","unstructured":"Potlapally, N., Ravi, S., Raghunathan, A., Jha, N., A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mobile Comput. 5(2):128\u2013143, 2006.","journal-title":"IEEE Trans. Mobile Comput."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-014-0145-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-014-0145-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-014-0145-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T03:01:18Z","timestamp":1566097278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-014-0145-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,18]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["145"],"URL":"https:\/\/doi.org\/10.1007\/s10916-014-0145-7","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,18]]},"article-number":"145"}}