{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:34:21Z","timestamp":1760549661657},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T00:00:00Z","timestamp":1416960000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s10916-014-0158-2","type":"journal-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T09:22:24Z","timestamp":1418030544000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems"],"prefix":"10.1007","volume":"39","author":[{"given":"Zhiheng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhanqiang","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Wenbo","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,26]]},"reference":[{"key":"158_CR1","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36:1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"key":"158_CR2","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"DB He","year":"2012","unstructured":"He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36: 1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"key":"158_CR3","doi-asserted-by":"crossref","unstructured":"Wei, J., Hu, X., and Liu,W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","DOI":"10.1007\/s10916-012-9835-1"},{"issue":"6","key":"158_CR4","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833\u20133838, 2012.","journal-title":"J. Med. Syst."},{"issue":"2","key":"158_CR5","first-page":"1","volume":"37","author":"T Cao","year":"2013","unstructured":"Cao, T., and Zhai, J., Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems, . J. Med. Syst. 37 (2):1\u20137, 2013.","journal-title":"J. Med. Syst."},{"key":"158_CR6","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s11071-010-9877-1","volume":"65","author":"S Jye","year":"2011","unstructured":"Jye, S., A speech encryption using fractional chaotic systems. Nonlinear Dynamics 65: 103-108, 2011.","journal-title":"Nonlinear Dynamics"},{"issue":"9","key":"158_CR7","doi-asserted-by":"crossref","first-page":"2254","DOI":"10.1016\/j.cnsns.2009.10.012","volume":"15","author":"D Xiao","year":"2010","unstructured":"Xiao, D., Shih, F., Liao, X., A chaos-based hash function with both modification detection and localization capabilities. Commun Nonlinear Sci Numer Simulat 15(9): 2254-2261, 2010.","journal-title":"Commun Nonlinear Sci Numer Simulat"},{"issue":"5","key":"158_CR8","doi-asserted-by":"crossref","first-page":"1338","DOI":"10.1016\/j.cnsns.2009.05.065","volume":"15","author":"S Deng","year":"2010","unstructured":"Deng, S., Li, Y., Xiao, D., Analysis and improvement of a chaos-based Hash function construction. Commun Nonlinear Sci Numer Simulat 15(5):1338-1347, 2010.","journal-title":"Commun Nonlinear Sci Numer Simulat"},{"issue":"4","key":"158_CR9","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1016\/j.ins.2006.07.026","volume":"177","author":"D Xiao","year":"2007","unstructured":"Xiao, D., Liao, X., Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4). 1136\u20131142, 2007.","journal-title":"Inf. Sci."},{"issue":"3","key":"158_CR10","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.chaos.2007.01.017","volume":"38","author":"S Han","year":"2008","unstructured":"Han, S., Security of a key agreement protocol based on chaotic maps. Chaos Solitons Fractals 38(3): 764\u2013768, 2008.","journal-title":"Chaos Solitons Fractals"},{"key":"158_CR11","doi-asserted-by":"crossref","unstructured":"Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity, In: IEEE Int. Conf. Commun., ICC\u201909, 1\u20136, 2009.","DOI":"10.1109\/ICC.2009.5198581"},{"key":"158_CR12","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"Y Niu","year":"2011","unstructured":"Niu, Y., Wang, X., An anonymous key agreement protocol based on chaotic maps, Commun. Nonlinear Sci. Numer. Simul. 16: 1986\u20131992, 2011.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"158_CR13","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1016\/j.cnsns.2011.11.010","volume":"17","author":"EJ Yoon","year":"2012","unstructured":"Yoon, E.J., Efficiency and security problems of anonymous key agreement protocol based on chaotic maps, Commun. Nonlinear Sci. Numer. Simul. 17: 2735\u20132740, 2012.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"158_CR14","doi-asserted-by":"crossref","first-page":"2969","DOI":"10.1016\/j.cnsns.2011.11.025","volume":"17","author":"KP Xue","year":"2012","unstructured":"Xue, K.P., Hong, P.L., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17: 2969\u20132977, 2012.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"158_CR15","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s11071-012-0715-5","volume":"72","author":"Z Tan","year":"2012","unstructured":"Tan, Z., A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72: 311\u2013320, 2012.","journal-title":"Nonlinear Dyn."},{"issue":"1\u20132","key":"158_CR16","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s11071-011-0247-4","volume":"69","author":"C Lee","year":"2012","unstructured":"Lee, C., Chen, C., Wu, C., Huang, S., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1\u20132): 79\u201387, 2012.","journal-title":"Nonlinear Dyn."},{"key":"158_CR17","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s11071-012-0335-0","volume":"69","author":"D He","year":"2012","unstructured":"He, D., Chen, Y., Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69, 1149\u20131157, 2012.","journal-title":"Nonlinear Dyn."},{"key":"158_CR18","author":"H Lin","year":"2014","unstructured":"Lin, H., Chaotic map based mobile dynamic ID authenticated key agreement scheme. Wireless Personal Communications, DOI: 10.1007\/s11277-014-1829-5, 2014.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"158_CR19","doi-asserted-by":"crossref","first-page":"9919","DOI":"10.1007\/s10916-012-9919-y","volume":"37","author":"X Hao","year":"2013","unstructured":"Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems., J Med Syst. 37(2):9919, 2013.","journal-title":"J Med Syst"},{"issue":"4","key":"158_CR20","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/TCE.2013.6689693","volume":"59","author":"D He","year":"2013","unstructured":"He, D. Kumar, N., Khan, M., Lee, J.-H., Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks, IEEE Transactions on Consumer Electronics, 59(4), pp. 811-817, 2013.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"10","key":"158_CR21","first-page":"1","volume":"38","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Chilamkurti, N., Lee, J.-H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. Journal of Medical Systems. 38(10), pp. 1-6, 2014.","journal-title":"Journal of Medical Systems."},{"key":"158_CR22","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Khan, M., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks, Multimedia Systems, DOI: 10.1007\/s00530-013-0346-9, 2014.","journal-title":"Multimedia Systems"},{"issue":"2","key":"158_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0013-5","volume":"38","author":"Z Zhao","year":"2014","unstructured":"Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem, Journal of Medical Systems, 38(2): 1-7, 2014.","journal-title":"Journal of Medical Systems"},{"key":"158_CR24","author":"D He","year":"2014","unstructured":"He, D., Wang, D,. Robust biometrics-based authentication scheme for multi-server environment, IEEE Systems Journal, DOI: 10.1109\/JSYST.2014.2301517, 2014.","journal-title":"IEEE Systems Journal"},{"issue":"5","key":"158_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0047-8","volume":"38","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., Qi, Q., An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography, Journal of Medical Systems 38(5): 1-7, 2014.","journal-title":"Journal of Medical Systems"},{"issue":"1","key":"158_CR26","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He, D., Kumar, Lee, J.-H. Enhanced three-factor security protocol for USB consumer storage devices, IEEE Transactions on Consumer Electronics, 60(1), pp. 30-37, 2014.","journal-title":"IEEE Transactions on Consumer Electronics"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-014-0158-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-014-0158-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-014-0158-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T02:59:03Z","timestamp":1566097143000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-014-0158-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,26]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["158"],"URL":"https:\/\/doi.org\/10.1007\/s10916-014-0158-2","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,26]]},"article-number":"158"}}