{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:19Z","timestamp":1767340159632,"version":"build-2065373602"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,2,10]],"date-time":"2015-02-10T00:00:00Z","timestamp":1423526400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10916-015-0204-8","type":"journal-article","created":{"date-parts":[[2015,2,9]],"date-time":"2015-02-09T09:21:30Z","timestamp":1423473690000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System"],"prefix":"10.1007","volume":"39","author":[{"given":"Ashok Kumar","family":"Das","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,10]]},"reference":[{"key":"204_CR1","unstructured":"Aumasson, J.P., Henzen, L., Meier, W., Plasencia, M.N., Quark: A lightweight hash. In: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS, vol. 6225, pp. 1\u201315, 2010."},{"key":"204_CR2","unstructured":"AVISPA, Automated Validation of Internet Security Protocols and Applications, 2013. Accessed on January 2013. http:\/\/www.avispa-project.org\/ ."},{"key":"204_CR3","unstructured":"AVISPA, AVISPA Web Tool, 2014. Accessed on April 2014. http:\/\/www.avispa-project.org\/web-interface\/expert.php\/ ."},{"issue":"3","key":"204_CR4","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D Basin","year":"2005","unstructured":"Basin, D., Modersheim, S., OFMC, L. Vigano., A symbolic model checker for security protocols. Int. J. Inf. Secur. 4(3):181\u2013208, 2005.","journal-title":"Int. J. Inf. Secur."},{"issue":"2","key":"204_CR5","first-page":"1","volume":"37","author":"Y-F Chang","year":"2013","unstructured":"Chang, Y.-F., Yu, S.-H., Shiao, D.-R., An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(2):1\u20139, 2013.","journal-title":"J. Med. Syst."},{"key":"204_CR6","doi-asserted-by":"crossref","unstructured":"Chatterjee, S., and Das, A.K., An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur. Commun. Netw., 2014. doi: 10.1002\/sec.1140 .","DOI":"10.1002\/sec.1140"},{"issue":"3","key":"204_CR7","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A.K, Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3):145\u2013151, 2011.","journal-title":"IET Inf. Secur."},{"issue":"3","key":"204_CR8","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s10207-012-0162-9","volume":"11","author":"AK Das","year":"2012","unstructured":"Das, A.K., A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Secury. 11(3):189\u2013211, 2012.","journal-title":"Int. J. Inf. Secury."},{"issue":"1-2","key":"204_CR9","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s13119-012-0009-8","volume":"2","author":"AK Das","year":"2013","unstructured":"Das, A.K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci. 2(1-2):12\u201327, 2013.","journal-title":"Netw. Sci."},{"key":"204_CR10","doi-asserted-by":"crossref","unstructured":"Das, A.K., A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl., 2014. doi: 10.1007\/s12083-014-0324-9 .","DOI":"10.1007\/s12083-014-0324-9"},{"issue":"5","key":"204_CR11","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1142\/S0129054113500214","volume":"24","author":"AK Das","year":"2013","unstructured":"Das, A.K., Chatterjee, S., Sing, J.K., A novel efficient access control scheme for large-scale distributed wireless sensor networks. Int. J. Found. Comput. Sci. 24(5):625\u2013653, 2013.","journal-title":"Int. J. Found. Comput. Sci."},{"issue":"3","key":"204_CR12","first-page":"1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A.K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1\u201316, 2013.","journal-title":"J. Med. Syst."},{"issue":"2","key":"204_CR13","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.jksuci.2012.12.001","volume":"25","author":"AK Das","year":"2013","unstructured":"Das, A.K., Massand, A., Patil, S., A novel proxy signature scheme based on user hierarchical access control policy. J. King Saud University - Comput. Inform. Sci. 25(2):219\u2013228, 2013.","journal-title":"J. King Saud University - Comput. Inform. Sci."},{"issue":"3","key":"204_CR14","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M.L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3):1086\u20131090, 2009.","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"2","key":"204_CR15","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"204_CR16","unstructured":"Kocher, P., Jaffe, J., Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology - CRYPTO\u201999, LNCS, vol. 1666, pp. 388\u2013397, 1999."},{"key":"204_CR17","doi-asserted-by":"crossref","unstructured":"Lee, T.-F., Chang, I.-P., Lin, T.-H., Wang, C.-C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3), 2013.","DOI":"10.1007\/s10916-013-9941-8"},{"issue":"1-3","key":"204_CR18","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s10623-010-9458-9","volume":"59","author":"S Manuel","year":"2011","unstructured":"Manuel, S., Classification and generation of disturbance vectors for collision attacks against SHA-1. Des. Codes Crypt. 59(1-3):247\u2013263, 2011.","journal-title":"Des. Codes Crypt."},{"issue":"5","key":"204_CR19","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"204_CR20","doi-asserted-by":"crossref","unstructured":"Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1), 2014.","DOI":"10.1007\/s10916-014-0154-6"},{"key":"204_CR21","doi-asserted-by":"crossref","unstructured":"Mishra, D., Das, A.K., Mukhopadhyay, S., A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card, 2014. doi: 10.1007\/s12083-014-0321-z .","DOI":"10.1007\/s12083-014-0321-z"},{"key":"204_CR22","doi-asserted-by":"crossref","unstructured":"Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Sys 38(5), 2014.","DOI":"10.1007\/s10916-014-0041-1"},{"key":"204_CR23","doi-asserted-by":"crossref","unstructured":"Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Sys 38(10), 2014.","DOI":"10.1007\/s10916-014-0120-3"},{"issue":"4","key":"204_CR24","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/1880022.1880027","volume":"13","author":"P Sarkar","year":"2010","unstructured":"Sarkar, P., A simple and generic construction of authenticated encryption with associated data. ACM Trans Inf. Syst. Secur. 13(4):33, 2010.","journal-title":"ACM Trans Inf. Syst. Secur."},{"key":"204_CR25","volume-title":"Cryptography and network security: Principles and practices","author":"W Stallings","year":"2003","unstructured":"Stallings, W., Cryptography and network security: Principles and practices. 3 ed. Englewood Cliffs: Prentice Hall, 2003.","edition":"3"},{"key":"204_CR26","unstructured":"Secure Hash Standard: Secure hash standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995 (1995)"},{"issue":"2","key":"204_CR27","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s10623-005-6344-y","volume":"38","author":"DR Stinson","year":"2006","unstructured":"Stinson, D.R., Some observations on the theory of cryptographic hash functions. Des. Codes Crypt. 38(2):259\u2013277, 2006.","journal-title":"Des. Codes Crypt."},{"issue":"5","key":"204_CR28","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/s10916-014-0042-0","volume":"38","author":"F Wen","year":"2014","unstructured":"Wen, F., A more secure anonymous user authentication scheme for the integrated EPR information system. J. Med. Syst. 38(5):42, 2014.","journal-title":"J. Med. Syst."},{"issue":"2","key":"204_CR29","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/s10916-010-9527-7","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Chung, Y.-F., Lai, F., Chen, T.-S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631\u2013638, 2012.","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0204-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0204-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0204-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T19:27:53Z","timestamp":1566329273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0204-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,10]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["204"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0204-8","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2015,2,10]]},"article-number":"25"}}