{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T10:14:00Z","timestamp":1770891240923,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,2,8]],"date-time":"2015-02-08T00:00:00Z","timestamp":1423353600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10916-015-0194-6","type":"journal-article","created":{"date-parts":[[2015,2,7]],"date-time":"2015-02-07T01:04:28Z","timestamp":1423271068000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems"],"prefix":"10.1007","volume":"39","author":[{"given":"Dianli","family":"Guo","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Wenmin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhengping","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,8]]},"reference":[{"issue":"3","key":"194_CR1","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M.L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3):1086\u20131090, 2009.","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"1","key":"194_CR2","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"MS Hwang","year":"2000","unstructured":"Hwang, M.S., and Li, L.H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1):28\u201330, 2000.","journal-title":"IEEE Trans. Consum. Electron."},{"key":"194_CR3","doi-asserted-by":"crossref","unstructured":"Wen, F.T., Susilo, W., Yang, G.M., A robust smart card-based anonymous user authentication protocol for wireless communications. Security Comm. Networks, 2013. 10.1002\/sec.816 .","DOI":"10.1002\/sec.816"},{"issue":"1","key":"194_CR4","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/s11277-014-1762-7","volume":"78","author":"DL Guo","year":"2014","unstructured":"Guo, D.L., and Wen, F.T., Analysis and improvement of a robust smart card based-authentication scheme for multi-server architecture. Wireless Pers Commun. 78(1):475\u2013490, 2014.","journal-title":"Wireless Pers Commun."},{"issue":"5","key":"194_CR5","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X., Niu, J.W., Khan, M.K., Liao, J.G., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365\u20131371, 2013.","journal-title":"J. Netw. Comput. Appl."},{"key":"194_CR6","doi-asserted-by":"crossref","unstructured":"Li, X., Niu, J.W., Khan, M.K., Liao, J.G., Zhao, X.K., Robust three-factor remote user authentication scheme with key agreement for multimedia systems, 2013. doi: 10.1002\/sec.961 .","DOI":"10.1002\/sec.961"},{"issue":"4","key":"194_CR7","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1504\/IJAHUC.2014.066423","volume":"17","author":"X Li","year":"2014","unstructured":"Li, X., Niu, J.W., Liu, Y.Z., Liao, J.G., Liang, W., Robust dynamic ID-based remote user authentication scheme using smart cards. Int. J. Ad Hoc Ubiquit. Comput. 17(4):254\u2013264, 2014.","journal-title":"Int. J. Ad Hoc Ubiquit. Comput."},{"issue":"3","key":"194_CR8","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"3","key":"194_CR9","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"DB He","year":"2012","unstructured":"He, D.B., Chen, J.H., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"194_CR10","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"194_CR11","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833\u20133838, 2012.","journal-title":"J. Med. Syst."},{"key":"194_CR12","doi-asserted-by":"crossref","unstructured":"Wen, F.T., and Guo, D.L., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0026-0 .","DOI":"10.1007\/s10916-014-0026-0"},{"issue":"1","key":"194_CR13","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J.W., Ma, J., Wang, W.D., Liu, C.L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1):73\u201379, 2011.","journal-title":"J. Netw. Comput. Appl."},{"key":"194_CR14","doi-asserted-by":"crossref","unstructured":"Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function, 2014. doi: 10.1007\/s10916-014-0027-z .","DOI":"10.1007\/s10916-014-0027-z"},{"key":"194_CR15","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Ma, J.F., Lu, X., Tian, Y.L., Robust Chaotic Map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems, 2014. doi: 10.1007\/s10916-014-0012-6 .","DOI":"10.1007\/s10916-014-0012-6"},{"issue":"5","key":"194_CR16","first-page":"200","volume":"89","author":"ZW Tan","year":"2013","unstructured":"Tan, Z.W., An efficient biometrics-based authentication scheme for telecare medicine information systems. Przegl. Elektrotech. 89(5):200\u2013204, 2013.","journal-title":"Przegl. Elektrotech."},{"issue":"5","key":"194_CR17","first-page":"1","volume":"37","author":"X Yan","year":"2013","unstructured":"Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(5):1\u20136, 2013.","journal-title":"J. Med. Syst."},{"key":"194_CR18","doi-asserted-by":"crossref","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., and Khan, M., Cryptanalysis and improvement of Yan et al.\u2019s Biometric-based authentication scheme for telecare medicine information systemes. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0024-2 .","DOI":"10.1007\/s10916-014-0024-2"},{"key":"194_CR19","doi-asserted-by":"crossref","unstructured":"Tan, Z.W., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0016-2 .","DOI":"10.1007\/s10916-014-0016-2"},{"key":"194_CR20","doi-asserted-by":"crossref","unstructured":"Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0136-8 .","DOI":"10.1007\/s10916-014-0136-8"},{"key":"194_CR21","doi-asserted-by":"crossref","unstructured":"Maitra, T., and Giri, D., An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0142-x .","DOI":"10.1007\/s10916-014-0142-x"},{"key":"194_CR22","doi-asserted-by":"crossref","unstructured":"Li, X.L.,Wen, Q.Y., Li, W.M., Zhang, H., and Jin, Z.P., Secure privacy-preserving biometric authentication scheme for telecare medicine information systems. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0139-5 .","DOI":"10.1007\/s10916-014-0139-5"},{"issue":"10","key":"194_CR23","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1002\/sec.767","volume":"7","author":"X Li","year":"2014","unstructured":"Li, X., Niu, J.W., Wang, Z.B., Chen, C.S., Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur. Commun. Netw. 7(10):1488\u20131497, 2014.","journal-title":"Secur. Commun. Netw."},{"key":"194_CR24","doi-asserted-by":"crossref","unstructured":"Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0027-z .","DOI":"10.1007\/s10916-014-0027-z"},{"key":"194_CR25","first-page":"388","volume-title":"Differential power analysis","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B., Differential power analysis, pp. 388\u2013397. Santa Barbara: Proceedings of Advances in Cryptology, 1999."},{"issue":"5","key":"194_CR26","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, E.A., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"194_CR27","first-page":"28","volume-title":"A fuzzy commitment scheme. CCS \u201999 Proceedings of the 6th ACM conference on Computer and communications security","author":"A Juels","year":"1999","unstructured":"Juels, A., and Wattenberg, M., A fuzzy commitment scheme. CCS \u201999 Proceedings of the 6th ACM conference on Computer and communications security, pp. 28\u201336. New York: ACM, 1999."},{"issue":"1","key":"194_CR28","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 8(1):18\u201336, 1990.","journal-title":"ACM Trans. Comput. Syst."},{"key":"194_CR29","doi-asserted-by":"crossref","first-page":"9902","DOI":"10.1007\/s10916-012-9902-7","volume":"37","author":"YF Chang","year":"2013","unstructured":"Chang, Y.F., Yu, S.H., Shiao, D.R., An uniqueness-andanonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9902, 2013.","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0194-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0194-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0194-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T02:06:59Z","timestamp":1717726019000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0194-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,8]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["194"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0194-6","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,8]]},"article-number":"20"}}