{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T09:45:47Z","timestamp":1767865547598,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10916-015-0221-7","type":"journal-article","created":{"date-parts":[[2015,2,13]],"date-time":"2015-02-13T04:35:05Z","timestamp":1423802105000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":88,"title":["An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem"],"prefix":"10.1007","volume":"39","author":[{"given":"Yanrong","family":"Lu","sequence":"first","affiliation":[]},{"given":"Lixiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haipeng","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yixian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,14]]},"reference":[{"key":"221_CR1","doi-asserted-by":"crossref","unstructured":"Leng, L., Teoh, A.B.J., Li, M., Khan, M.K.: A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Sec. Commun. Netw. doi: 10.1002\/sec.900 (2013)","DOI":"10.1002\/sec.900"},{"issue":"10","key":"221_CR2","first-page":"1","volume":"38","author":"DB He","year":"2014","unstructured":"He, D.B., Kumar, N., Chilamkurti, N., Lee, J.H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10):1\u20136, 2014.","journal-title":"J. Med. Syst."},{"issue":"1","key":"221_CR3","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MCOM.2015.7010506","volume":"53","author":"DB He","year":"2015","unstructured":"He, D.B., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 53(1):2\u20138, 2015.","journal-title":"IEEE Commun. Mag."},{"key":"221_CR4","doi-asserted-by":"crossref","unstructured":"Lu, Y.R., Li, L.X., Peng, H.P., Yang, X., Yang, Y.X.: A lightweight ID based authentication and key agreement protocol for multi-server architecture, Int. J. Distrib. Sens. N., Article ID 635890, 1-16, 2015. in press (2015)","DOI":"10.1155\/2015\/635890"},{"key":"221_CR5","doi-asserted-by":"crossref","unstructured":"Lu, Y.R., Li, L.X., Yang, Y.X.: Robust and efficient authentication scheme for session initiation protocol.Math. Probl. Eng2015, Article ID 894549, 1-16, in press (2015)","DOI":"10.1155\/2015\/894549"},{"issue":"3","key":"221_CR6","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"3","key":"221_CR7","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"D He","year":"2012","unstructured":"He, D., Chen, J., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"221_CR8","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"221_CR9","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833\u20133838, 2012.","journal-title":"J. Med. Syst."},{"issue":"2","key":"221_CR10","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120\u2013126, 1978.","journal-title":"Commun. ACM"},{"key":"221_CR11","first-page":"1","volume":"37","author":"F Wu","year":"2013","unstructured":"Wu, F., and Xu, L.L., Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J. Med. Syst. 37:1\u20139, 2013.","journal-title":"J. Med. Syst."},{"issue":"1","key":"221_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-012-9897-0","volume":"37","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J.F., Ma, Z., Li, G.S., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1\u20138, 2013.","journal-title":"J. Med. Syst."},{"issue":"5","key":"221_CR13","first-page":"1","volume":"38","author":"FT Wen","year":"2014","unstructured":"Wen, F.T., and Guo, D.l., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 38(5):1\u201311, 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"221_CR14","first-page":"1","volume":"38","author":"KW Kim","year":"2014","unstructured":"Kim, K.W., and Lee, J.D., On the security of two remote user authentication schemes for telecare medical information systems. J. Med. Syst. 38(5):1\u201311, 2014.","journal-title":"J. Med. Syst."},{"issue":"1","key":"221_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2015","unstructured":"Giri, D., Maitra, T., Amin, R., An efficient and robust RSA-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1):1\u20139, 2015.","journal-title":"J. Med. Syst."},{"issue":"10","key":"221_CR16","first-page":"1","volume":"38","author":"SKH Islam","year":"2014","unstructured":"Islam, S.K.H., and Khan, M.K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):1\u201316, 2014.","journal-title":"J. Med. Syst."},{"issue":"1","key":"221_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C.T., and Hwang, M.S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1\u20135, 2010.","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"221_CR18","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10916-014-0027-z","volume":"38","author":"AK Das","year":"2014","unstructured":"Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):27, 2014.","journal-title":"J. Med. Syst."},{"issue":"12","key":"221_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0142-x","volume":"38","author":"T Maitra","year":"2014","unstructured":"Maitra, T., and Giri, D., An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J. Med. Syst. 38(12):1\u201319, 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"221_CR20","first-page":"1","volume":"37","author":"X Yan","year":"2013","unstructured":"Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(5):1\u20136, 2013.","journal-title":"J. Med. Syst."},{"issue":"6","key":"221_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M.K., Cryptanalysis and improvement of Yan et al.\u2019s biometric-based authentication scheme for telecare medicine information systems. J. Med.Syst. 38(6):1\u201312, 2014.","journal-title":"J. Med.Syst."},{"issue":"11","key":"221_CR22","first-page":"1","volume":"38","author":"XL Li","year":"2014","unstructured":"Li, X.L., Wen, Q.Y., Li, W.M., Zhang, H., Jin, Z.P., Secure privacy-preserving biometric authentication scheme for telecare medicine information systems. J. Med. Syst. 38(11):1\u20138, 2014.","journal-title":"J. Med. Syst."},{"key":"221_CR23","doi-asserted-by":"crossref","unstructured":"He, D.B., and Wang, D.: Robust biometrics-based authentication scheme for multi-server environment, IEEE. Syst. J. doi: 10.1109\/JSYST.2014.2301517 (2014)","DOI":"10.1109\/JSYST.2014.2301517"},{"issue":"5","key":"221_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9964-1","volume":"37","author":"AK Awasthi","year":"2013","unstructured":"Awasthi, A.K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1\u20134, 2013.","journal-title":"J. Med. Syst."},{"issue":"5","key":"221_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0041-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5): 1\u201311, 2014.","journal-title":"J. Med. Syst."},{"issue":"3","key":"221_CR26","first-page":"1","volume":"38","author":"Z Tan","year":"2014","unstructured":"Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 38(3):1\u20139, 2014.","journal-title":"J. Med. Syst."},{"issue":"12","key":"221_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0136-8","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12):1\u201312, 2014.","journal-title":"J. Med. Syst."},{"key":"221_CR28","first-page":"417","volume-title":"Uses of elliptic curves in cryptography. Advances in CryptologyCRYPTO\u201985 Proceedings","author":"V Miller","year":"1986","unstructured":"Miller, V., Uses of elliptic curves in cryptography. Advances in CryptologyCRYPTO\u201985 Proceedings. pp. 417\u2013426. Berlin Heidelberg: Springer Verlag LNCS 218, 1986."},{"key":"221_CR29","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N., Elliptic curve cryptosystems. Math. Comp. 48:203\u2013209, 1987.","journal-title":"Math. Comp."},{"key":"221_CR30","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrow","year":"1990","unstructured":"Burrow, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 8:18\u201336, 1990.","journal-title":"ACM Trans. Comput. Syst."},{"issue":"11","key":"221_CR31","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L., Password authentication with insecure communication. Commun. ACM 24(11):770\u2013772, 1981.","journal-title":"Commun. ACM"},{"issue":"2","key":"221_CR32","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11277-013-1282-x","volume":"74","author":"DB He","year":"2014","unstructured":"He, D.B., Zhang, Y.Y., Chen, J.H., Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks . Wirel. Pers. Commun. 74(2):229\u2013243, 2014.","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"221_CR33","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s11277-012-0696-1","volume":"70","author":"DB He","year":"2013","unstructured":"He, D.B., and Wu, S.H., Security flaws in a smart card based authentication scheme for multi-server environment. Wirel. Pers. Commun. 70(1):323\u2013329, 2013.","journal-title":"Wirel. Pers. Commun."},{"issue":"5","key":"221_CR34","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"221_CR35","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume":"1666","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Adv. Cryptology CRYPTO\u201999 LNCS 1666: 388\u2013397, 1999b.","journal-title":"Adv. Cryptology CRYPTO\u201999 LNCS"},{"key":"221_CR36","doi-asserted-by":"crossref","unstructured":"Belguechi, R., Rosenberger, C., Ait-Aoudia, S., Biohashing for securing minutiae template. Int. Conf. Pattern Recognition (ICPR2010),1168\u20131171, 2010.","DOI":"10.1109\/ICPR.2010.292"},{"issue":"3","key":"221_CR37","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recogn. 40(3): 1057\u20131065, 2007.","journal-title":"Pattern Recogn."},{"key":"221_CR38","doi-asserted-by":"crossref","first-page":"806","DOI":"10.1007\/978-3-642-01793-3_82","volume":"5558","author":"M Inuma","year":"2009","unstructured":"Inuma, M., Otsuka, A., Imai, H., Theoretical framework for constructing matching algorithms in biometric authentication systems. Adv. Biometrics 5558:806\u2013815, 2009.","journal-title":"Adv. Biometrics"},{"issue":"6","key":"221_CR39","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10916-014-0027-z","volume":"38","author":"AK Das","year":"2014","unstructured":"Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):27, 2014.","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0221-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T22:26:11Z","timestamp":1566339971000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0221-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,14]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["221"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0221-7","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,14]]},"article-number":"32"}}