{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T12:01:31Z","timestamp":1775044891824,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,2,13]],"date-time":"2015-02-13T00:00:00Z","timestamp":1423785600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10916-015-0218-2","type":"journal-article","created":{"date-parts":[[2015,2,12]],"date-time":"2015-02-12T09:07:13Z","timestamp":1423732033000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for the Telecare Medicine Information Systems"],"prefix":"10.1007","volume":"39","author":[{"given":"Ashok Kumar","family":"Das","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,13]]},"reference":[{"key":"218_CR1","first-page":"1","volume":"2012","author":"Y An","year":"2012","unstructured":"An, Y., Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards. J. Biomed. Biotechnol. 2012:1\u20136, 2012. Article ID 519723.","journal-title":"J. Biomed. Biotechnol."},{"issue":"6","key":"218_CR2","first-page":"1","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad, H., and Nikooghadam, M., Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Systems Information. J. Med. Syst. 38(6):1\u201312, 2014.","journal-title":"J. Med. Syst."},{"key":"218_CR3","unstructured":"AVISPA: Automated Validation of Internet Security Protocols and Applications. Accessed on January 2013. http:\/\/www.avispa-project.org\/"},{"key":"218_CR4","unstructured":"AVISPA: AVISPA Web Tool. Accessed on April 2014. http:\/\/www.avispa-project.org\/web-interface\/expert.php\/"},{"issue":"5","key":"218_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9964-1","volume":"37","author":"AK Awasthi","year":"2013","unstructured":"Awasthi, A.K., and Srivastava, K., A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Med. Syst. 37(5):1\u20134, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"218_CR6","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D Basin","year":"2005","unstructured":"Basin, D., Modersheim, S., Vigano, L., OFMC: A symbolic model checker for security protocols. Int. J. Inf. Secur. 4(3):181\u2013208, 2005.","journal-title":"Int. J. Inf. Secur."},{"issue":"3","key":"218_CR7","first-page":"317","volume":"5","author":"A Burnett","year":"2007","unstructured":"Burnett, A., Byrne, F., Dowling, T., Duffy, A., A Biometric Identity Based Signature Scheme. Int. J. Netw. Secur. 5(3):317\u2013326, 2007.","journal-title":"Int. J. Netw. Secur."},{"key":"218_CR8","doi-asserted-by":"crossref","unstructured":"Chatterjee, S., and Das, A.K., An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Security and Communication Networks, 2014. doi: 10.1002\/sec.1140 .","DOI":"10.1002\/sec.1140"},{"issue":"1\u20132","key":"218_CR9","first-page":"121","volume":"21","author":"S Chatterjee","year":"2014","unstructured":"Chatterjee, S., Das, A.K., Sing, J.K., An Enhanced Access Control Scheme in Wireless Sensor Networks. Ad Hoc & Sensor Wireless Networks 21(1\u20132):121\u2013149, 2014.","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"issue":"2","key":"218_CR10","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1002\/dac.2368","volume":"27","author":"B-L Chen","year":"2014","unstructured":"Chen, B.-L., Kuo, W.-C., Wuu, L.-C., Robust smart-card-based remote user password authentication scheme. Int. J. Commun. Syst. 27(2):377\u2013389, 2014.","journal-title":"Int. J. Commun. Syst."},{"issue":"4","key":"218_CR11","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1002\/nem.739","volume":"20","author":"Y-H Chuang","year":"2010","unstructured":"Chuang, Y.-H., and Tseng, Y.-M., An efficient dynamic group key agreement protocol for imbalanced wireless networks. Int. J. Netw. Manag. 20(4):167\u2013180, 2010.","journal-title":"Int. J. Netw. Manag."},{"issue":"3","key":"218_CR12","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A.K., Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3):145\u2013151, 2011.","journal-title":"IET Inf. Secur."},{"issue":"1\u20132","key":"218_CR13","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s13119-012-0009-8","volume":"2","author":"AK Das","year":"2013","unstructured":"Das, A.K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci. 2(1\u20132):12\u201327, 2013.","journal-title":"Netw. Sci."},{"issue":"5","key":"218_CR14","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1142\/S0129054113500214","volume":"24","author":"AK Das","year":"2013","unstructured":"Das, A.K., Chatterjee, S., Sing, J.K., A novel efficient access control scheme for large-scale distributed wireless sensor networks. Int. J. Found. Comput. Sci. 24(5):625\u2013653, 2013.","journal-title":"Int. J. Found. Comput. Sci."},{"issue":"3","key":"218_CR15","first-page":"1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A.K., and Goswami, A., A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. J. Med. Syst. 37(3):1\u201316, 2013.","journal-title":"J. Med. Syst."},{"key":"218_CR16","doi-asserted-by":"crossref","unstructured":"Das, A.K., and Goswami, A.: A robust anonymous biometric-based remote user authentication scheme using smart cards. Journal of King Saud University - Computer and Information Sciences (Elsevier). In Press (2014)","DOI":"10.1016\/j.jksuci.2014.03.020"},{"issue":"2","key":"218_CR17","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.jksuci.2012.12.001","volume":"25","author":"AK Das","year":"2013","unstructured":"Das, A.K., Massand, A., Patil, S., A novel proxy signature scheme based on user hierarchical access control policy. Journal of King Saud University - Comput. Inform. Sci. 25(2):219\u2013228, 2013.","journal-title":"Journal of King Saud University - Comput. Inform. Sci."},{"issue":"C","key":"218_CR18","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A.K., Paul, N.R., Tripathy, L., Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem . Inf. Sci. 209(C):80\u201392, 2012.","journal-title":"Inf. Sci."},{"key":"218_CR19","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the Advances in Cryptology (Eurocrypt\u201904), LNCS, Vol. 3027, pp. 523\u2013540 (2004)","DOI":"10.1007\/978-3-540-24676-3_31"},{"issue":"2","key":"218_CR20","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"218_CR21","first-page":"1","volume":"39","author":"D Giri","year":"2014","unstructured":"Giri, D., Maitra, T., Amin, R., Srivastava, P.D., An efficient and robust rsa-based remote user authentication for systems telecare medical information. J. Med. Syst. 39(1):1\u20139, 2014.","journal-title":"J. Med. Syst."},{"issue":"3","key":"218_CR22","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"D He","year":"2012","unstructured":"He, D., Chen, J., Zhang, R., A More Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"1","key":"218_CR23","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Lee, J.-H., Sherratt, R.S., Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans. Consum. Electron. 60(1):30\u201337, 2014.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"218_CR24","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.jksuci.2013.03.004","volume":"26","author":"SH Islam","year":"2014","unstructured":"Islam, S.H., and Biswas, G.P., A provably secure identity-based strong designated verifier proxy signature scheme from pairings bilinear. Journal of King Saud University - Comput. Inform. Sci. 26(1):55\u201367, 2014.","journal-title":"Journal of King Saud University - Comput. Inform. Sci."},{"issue":"10","key":"218_CR25","first-page":"1","volume":"38","author":"SKH Islam","year":"2014","unstructured":"Islam, S.K.H., and Khan, M.K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):1\u201316, 2014.","journal-title":"J. Med. Syst."},{"issue":"2","key":"218_CR26","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1002\/sec.791","volume":"7","author":"MK Khan","year":"2014","unstructured":"Khan, M.K., and Kumari, S., Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Security and Communication Networks 7(2):399\u2013408, 2014.","journal-title":"Security and Communication Networks"},{"key":"218_CR27","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N., Elliptic Curves Cryptosystems. Math. Comput. 48:203\u2013209, 1987.","journal-title":"Math. Comput."},{"key":"218_CR28","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of Advances in Cryptology - CRYPTO\u201999, LNCS, Vol. 1666, pp. 388\u2013397 (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"4","key":"218_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9952-5","volume":"37","author":"S Kumari","year":"2013","unstructured":"Kumari, S., Khan, M.K., Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37(4):1\u201311, 2013.","journal-title":"J. Med. Syst."},{"issue":"1\u20132","key":"218_CR30","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11071-012-0652-3","volume":"71","author":"C-C Lee","year":"2013","unstructured":"Lee, C.-C., and Hsu, C.-W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1\u20132):201\u2013211, 2013.","journal-title":"Nonlinear Dyn."},{"key":"218_CR31","doi-asserted-by":"crossref","unstructured":"Lee, C.-C., Li, C.-T., Chiu, S.-T., Lai, Y.-M., A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn.,1\u201311, 2014. doi: 10.1007\/s11071-014-1827-x .","DOI":"10.1007\/s11071-014-1827-x"},{"issue":"3","key":"218_CR32","first-page":"1","volume":"37","author":"T-F Lee","year":"2013","unstructured":"Lee, T.-F., and Liu, C.-M., A Secure Smart-Card Based Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37(3):1\u20138 , 2013.","journal-title":"J. Med. Syst."},{"issue":"1","key":"218_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C-T Li","year":"2010","unstructured":"Li, C.-T., and Hwang, M.-S., An efficient biometric-based remote authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1\u20135, 2010.","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"218_CR34","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J.-W., Ma, J., Wang, W.-D., Liu, C.-L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1):73\u201379, 2011.","journal-title":"J. Netw. Comput. Appl."},{"issue":"12","key":"218_CR35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0142-x","volume":"38","author":"T Maitra","year":"2014","unstructured":"Maitra, T., and Giri, D., An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J. Med. Syst. 38(12):1\u201319, 2014.","journal-title":"J. Med. Syst."},{"issue":"3","key":"218_CR36","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/TITB.2010.2087414","volume":"15","author":"T Massey","year":"2011","unstructured":"Massey, T., Marfia, G., Stoelting, A., Tomasi, R., Spirito, M.A., Sarrafzadeh, M., Pau, G., Leveraging Social System Networks in Ubiquitous High-Data-Rate Health Systems. IEEE Trans. Inf. Technol. Biomed. 15(3):491\u2013498, 2011.","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"issue":"5","key":"218_CR37","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"218_CR38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0154-6","volume":"39","author":"D Mishra","year":"2015","unstructured":"Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1):1\u201316, 2015.","journal-title":"J. Med. Syst."},{"issue":"6","key":"218_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M.K., Cryptanalysis and improvement of Yan et al.\u2019s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):1\u201312, 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"218_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0041-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5): 1\u201311, 2014.","journal-title":"J. Med. Syst."},{"issue":"10","key":"218_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10):1\u201310, 2014.","journal-title":"J. Med. Syst."},{"issue":"2","key":"218_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-012-9920-5","volume":"37","author":"V Odelu","year":"2013","unstructured":"Odelu, V., Das, A.K., Goswami, A., An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System. J. Med. Syst. 37(2):1\u201318, 2013.","journal-title":"J. Med. Syst."},{"issue":"C","key":"218_CR43","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.ins.2013.10.022","volume":"269","author":"V Odelu","year":"2014","unstructured":"Odelu, V., Das, A.K., Goswami, A., A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inf. Sci. 269(C):270\u2013285, 2014.","journal-title":"Inf. Sci."},{"key":"218_CR44","doi-asserted-by":"crossref","unstructured":"Odelu, V., Das, A.K., Goswami, A., A secure and efficient ECC-based user anonymity preserving single sign-on scheme for distributed computer networks. Security and Communication Networks, 2014. doi: 10.1002\/sec.1139 .","DOI":"10.1002\/sec.1139"},{"issue":"1","key":"218_CR45","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MWC.2010.5416354","volume":"17","author":"M Patel","year":"2010","unstructured":"Patel, M., and Wang, J., Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel. Commun. 17(1):80\u201388, 2010.","journal-title":"IEEE Wirel. Commun."},{"issue":"4","key":"218_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1880022.1880027","volume":"13","author":"P Sarkar","year":"2010","unstructured":"Sarkar, P., A Simple and Generic Construction of Authenticated Encryption with Associated Data. ACM Trans. Inf. Syst. Secur. 13(4):1\u201316, 2010.","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"218_CR47","first-page":"1","volume":"38","author":"Z Siddiqui","year":"2013","unstructured":"Siddiqui, Z., Abdullah, A.H., Khan, M.K., Alghamdi, A., Smart environment as a service: Three factor cloud based user authentication for telecare medical information system. J. Med. Syst. 38(1):1\u201314, 2013.","journal-title":"J. Med. Syst."},{"key":"218_CR48","unstructured":"Stallings, W., Cryptography and Network Security: Principles and Practices. 3rd edition: Pearson Education India, 2003."},{"issue":"2","key":"218_CR49","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s10623-005-6344-y","volume":"38","author":"DR Stinson","year":"2006","unstructured":"Stinson, D.R., Some Observations on the Theory of Cryptographic Hash Functions. Des. Codes Crypt. 38(2):259\u2013277 , 2006.","journal-title":"Des. Codes Crypt."},{"issue":"5","key":"218_CR50","first-page":"200","volume":"89","author":"Z Tan","year":"2013","unstructured":"Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Przegl. Elctrotech. 89(5):200\u2013204, 2013.","journal-title":"Przegl. Elctrotech."},{"issue":"3","key":"218_CR51","first-page":"1","volume":"38","author":"Z Tan","year":"2014","unstructured":"Tan, Z., A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(3):1\u20139, 2014.","journal-title":"J. Med. Syst."},{"issue":"12","key":"218_CR52","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1002\/dac.2428","volume":"25","author":"H Tang","year":"2012","unstructured":"Tang, H., and Liu, X., Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme. Int. J. Commun. Syst. 25(12):1639\u20131644, 2012.","journal-title":"Int. J. Commun. Syst."},{"key":"218_CR53","unstructured":"von Oheimb, D.: The high-level protocol specification language hlpsl developed in the eu project avispa. In: Proceedings of APPSEM 2005 Workshop (2005)"},{"issue":"6","key":"218_CR54","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An Improved Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"3","key":"218_CR55","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.-C., Lai, F., Lee, H.-C., Chung, Y.-F., A Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"1","key":"218_CR56","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1002\/dac.1286","volume":"25","author":"Q Xie","year":"2012","unstructured":"Xie, Q., A new authenticated key agreement for session initiation protocol. Int. J. Commun. Syst. 25(1):47\u201354, 2012.","journal-title":"Int. J. Commun. Syst."},{"issue":"4","key":"218_CR57","doi-asserted-by":"crossref","first-page":"2288","DOI":"10.1109\/TCE.2010.5681102","volume":"56","author":"H Yan","year":"2010","unstructured":"Yan, H., Huo, H., Xu, Y., Gidlund, M., Wireless sensor network based E-health system implementation and experimental results. IEEE Trans. Consum. Electron. 56(4):2288\u20132295, 2010.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"5","key":"218_CR58","first-page":"1","volume":"37","author":"X Yan","year":"2013","unstructured":"Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(5):1\u20136, 2013.","journal-title":"J. Med. Syst."},{"key":"218_CR59","doi-asserted-by":"crossref","unstructured":"Yang, H., Kim, H., Mtonga, K., An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-to-Peer Networking and Applications, 1\u201311, 2014. doi: 10.1007\/s12083-014-0299-6 .","DOI":"10.1007\/s12083-014-0299-6"},{"issue":"6","key":"218_CR60","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An Efficient Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 36(6): 3833\u20133838, 2012.","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0218-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0218-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0218-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T05:07:05Z","timestamp":1717736825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0218-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,13]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["218"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0218-2","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,13]]},"article-number":"30"}}