{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T05:26:01Z","timestamp":1757568361483},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T00:00:00Z","timestamp":1429660800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s10916-015-0229-z","type":"journal-article","created":{"date-parts":[[2015,4,21]],"date-time":"2015-04-21T05:40:29Z","timestamp":1429594829000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps"],"prefix":"10.1007","volume":"39","author":[{"given":"Yanrong","family":"Lu","sequence":"first","affiliation":[]},{"given":"Lixiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haipeng","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Yixian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,22]]},"reference":[{"issue":"5","key":"229_CR1","first-page":"1","volume":"37","author":"CL Hsu","year":"2013","unstructured":"Hsu, C.L., Lee, M.R., Su, C.H, The role of privacy protection in healthcare information systems adoption. J. Med. Syst 37(5):1\u201312, 2013.","journal-title":"J. Med. Syst"},{"issue":"4","key":"229_CR2","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1005549330655","volume":"24","author":"C Lambrinoudakis","year":"2000","unstructured":"Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst 24(4):213\u2013234, 2000.","journal-title":"J. Med. Syst"},{"issue":"6","key":"229_CR3","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"HM Chen","year":"2012","unstructured":"Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst 36(6):3907\u20133915, 2012.","journal-title":"J. Med. Syst"},{"issue":"12","key":"229_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0142-x","volume":"38","author":"T Maitra","year":"2014","unstructured":"Maitra, T., and Giri, D., An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J. Med. Syst 38(12):1\u201319, 2014.","journal-title":"J. Med. Syst"},{"issue":"6","key":"229_CR5","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10916-014-0027-z","volume":"38","author":"AK Das","year":"2014","unstructured":"Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst 38(6):27, 2014.","journal-title":"J. Med. Syst"},{"issue":"5","key":"229_CR6","first-page":"1","volume":"38","author":"KW Kim","year":"2014","unstructured":"Kim, K.W., and Lee, J.D, On the security of two remote user authentication schemes for telecare medical information systems. J. Med. Syst 38(5):1\u201311, 2014.","journal-title":"J. Med. Syst"},{"issue":"3","key":"229_CR7","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TMC.2012.252","volume":"13","author":"B Alomair","year":"2014","unstructured":"Alomair, B., and Poovendran, R., Efficient Authentication for Mobile and Pervasive Computing. IEEE Trans on Mobile. Comput 13(3):469\u2013481, 2014.","journal-title":"IEEE Trans on Mobile. Comput"},{"issue":"4","key":"229_CR8","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1109\/TC.2013.25","volume":"63","author":"Y Sui","year":"2014","unstructured":"Sui, Y., Zou, X.K., Du, E.Y., Li, F., Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method. IEEE Trans on Comput 63(4):902\u2013916, 2014.","journal-title":"IEEE Trans on Comput"},{"key":"229_CR9","doi-asserted-by":"crossref","unstructured":"Lu, Y.R., Li, L.X., Peng, H.P., Yang, X., Yang, Y.X.: A lightweight ID based authentication and key agreement protocol for multiserver architecture. Int. J. Distrib. Sens. N. vol. 2015, Article ID 635890, 9 p, 2015. doi: 10.1155\/2015\/635890 .","DOI":"10.1155\/2015\/635890"},{"key":"229_CR10","doi-asserted-by":"crossref","unstructured":"Lu, Y.R., Li, L.X., Yang, Y.X.: Robust and efficient authentication scheme for session initiation protocol. Math. Probl. Eng. vol. 2015, Article ID 894549, 9 p, 2015. doi: 10.1155\/2015\/894549 .","DOI":"10.1155\/2015\/894549"},{"key":"229_CR11","doi-asserted-by":"crossref","unstructured":"Lu, Y.R., Li, L.X., Peng, H.P., Yang, Y.X.: An enhanced biometricbased authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3):1\u20138, 2015.","DOI":"10.1007\/s10916-015-0221-7"},{"issue":"3","key":"229_CR12","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst"},{"issue":"3","key":"229_CR13","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"DB He","year":"2012","unstructured":"He, D.B., Chen, J.H., Zhang, R., A More Secure Authentication Scheme for Telecare Medicine Information Systems. J Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J Med. Syst."},{"issue":"6","key":"229_CR14","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"229_CR15","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst 36(6): 3833\u20133838, 2012.","journal-title":"J. Med. Syst"},{"issue":"3","key":"229_CR16","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1007\/s11071-013-0987-4","volume":"74","author":"F \u00d6zkaynak","year":"2013","unstructured":"\u00d6zkaynak, F., and Yavuz, S., Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn 74(3):551\u2013557, 2013.","journal-title":"Nonlinear Dyn"},{"key":"229_CR17","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s11071-012-0646-1","volume":"71","author":"I Hussain","year":"2013","unstructured":"Hussain, I., Shah, T., Gondal, M., Mahmood, H., An efficient approach for the construction of LFT S-boxes using chaotic logistic map. Nonlinear Dyn 71:133\u2013140, 2013.","journal-title":"Nonlinear Dyn"},{"key":"229_CR18","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/s11071-012-0675-9","volume":"71","author":"M Khan","year":"2013","unstructured":"Khan, M., Shah, T., Mahmood, H., Gondal, M., An efficient method for the construction of block cipher with multichaotic systems. Nonlinear Dyn 71:489\u2013492, 2013.","journal-title":"Nonlinear Dyn"},{"key":"229_CR19","first-page":"1","volume":"341490","author":"B Gao","year":"2014","unstructured":"Gao, B., Shi, Y.F., Yang, C.L., Li, L.X., Wang, L.C., Yang, Y.X., STP-LWE: A variant of learning with error for a flexible encryption. Math. Probl. Eng 341490:1\u20137, 2014. Article ID 2014.","journal-title":"Math. Probl. Eng"},{"key":"229_CR20","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1016\/j.chaos.2004.06.069","volume":"23","author":"D Xiao","year":"2005","unstructured":"Xiao, D., Liao, X., Wong, K., An efficient entire chaos based scheme for deniable authentication. Chaos Soliton. Fract 23:1327\u20131331, 2005.","journal-title":"Chaos Soliton. Fract"},{"key":"229_CR21","doi-asserted-by":"crossref","unstructured":"Tseng, H., Jan, R., Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun.,1\u20136, 2009. ICC09.","DOI":"10.1109\/ICC.2009.5198581"},{"issue":"4","key":"229_CR22","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"Y Niu","year":"2011","unstructured":"Niu, Y., and Wang, X., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4):1986\u20131992, 2011.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"229_CR23","doi-asserted-by":"crossref","first-page":"2969","DOI":"10.1016\/j.cnsns.2011.11.025","volume":"17","author":"K Xue","year":"2012","unstructured":"Xue, K., and Hong, P., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17:2969\u20132977, 2012.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"6","key":"229_CR24","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1016\/j.cnsns.2012.09.032","volume":"18","author":"C Guo","year":"2013","unstructured":"Guo, C., and Chang, C.C., Chaotic maps-based passwordauthenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul 18(6):1433\u20131440, 2013.","journal-title":"Commun. Nonlinear Sci. Numer. Simul"},{"issue":"2","key":"229_CR25","doi-asserted-by":"crossref","first-page":"9919","DOI":"10.1007\/s10916-012-9919-y","volume":"37","author":"X Hao","year":"2013","unstructured":"Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst 37(2):9919, 2013.","journal-title":"J. Med. Syst"},{"key":"229_CR26","doi-asserted-by":"crossref","unstructured":"Lin, H.Y., Improved chaotic maps-based password-authenticated key agreement using smart cards.Commun. Nonlinear Sci. Numer, Simul. In: doi: 10.1016\/j.cnsns.2014.05.027 (2014)","DOI":"10.1016\/j.cnsns.2014.05.027"},{"issue":"2","key":"229_CR27","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):12, 2014.","journal-title":"J. Med. Syst."},{"issue":"6","key":"229_CR28","doi-asserted-by":"crossref","first-page":"9985","DOI":"10.1007\/s10916-013-9985-9","volume":"37","author":"TF Lee","year":"2013","unstructured":"Lee, T.F., An eEfficient chaotic map-based authentication and key agreement scheme using smart cards for telecare medicine information systems. J. Med. Syst 37(6):9985, 2013.","journal-title":"J. Med. Syst"},{"issue":"9","key":"229_CR29","first-page":"1","volume":"38","author":"CT Li","year":"2014","unstructured":"Li, C.T., Cheng, C.L., Chi, Y.W., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems, J. Med. Syst. 38(9):1\u201311, 2014.","journal-title":"J. Med. Syst."},{"key":"229_CR30","doi-asserted-by":"crossref","first-page":"062706","DOI":"10.1103\/PhysRevE.88.062706","volume":"88,","author":"B Gao","year":"2013","unstructured":"Gao, B., Li, L.X., Peng, H.P., Kurths, J., Zhang, W.G., Yang, Y.X., Principle for performing attractor transits with single control in Boolean networks. Phys. Rev. E 88,:062706, 2013.","journal-title":"Phys. Rev. E"},{"key":"229_CR31","volume-title":"Cryptography and Network Security: Principles and Practices","author":"W Stallings","year":"2003","unstructured":"Stallings, W., Cryptography and Network Security: Principles and Practices. 3rd edn. Englewood Cliffs: Prentice Hall, 2003.","edition":"3"},{"key":"229_CR32","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1007\/s11071-013-1029-y","volume":"74","author":"CT Li","year":"2013","unstructured":"Li, C.T., Lee, C.C., Weng, C.Y., An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn 74:1133\u20131143, 2013.","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"229_CR33","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1007\/s11071-013-1174-3","volume":"76","author":"CC Lee","year":"2014","unstructured":"Lee, C.C., Lou, D.C., Li, C.T., An extended chaotic maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn 76(1):853\u2013866, 2014.","journal-title":"Nonlinear Dyn"},{"key":"229_CR34","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11071-012-0652-3","volume":"71","author":"CC Lee","year":"2013","unstructured":"Lee, C.C., and Hsu, C.W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn 71:201\u2013211, 2013.","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"229_CR35","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.camwa.2011.12.067","volume":"64","author":"DW Zhao","year":"2012","unstructured":"Zhao, D.W., Peng, H.P., Li, L.X., Yang, Y.X., A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Comput. Math. Appl 64(4):611\u2013615, 2012.","journal-title":"Comput. Math. Appl"},{"issue":"5","key":"229_CR36","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput"},{"key":"229_CR37","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.jcss.2011.01.002","volume":"78","author":"M H\u00f6lbl","year":"2012","unstructured":"H\u00f6lbl, M., Welzer, T., Brumen, B., An improved two-party identity-based authenticated key agreement protocol using pairings, J. Cmput. Syst 78:142\u2013150, 2012.","journal-title":"J. Cmput. Syst"},{"key":"229_CR38","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo, P., Arco, P., Santis, A., Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I 52:1382\u20131393, 2005.","journal-title":"IEEE. Trans. Circ. Syst. I"},{"issue":"3","key":"229_CR39","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recognition 40(3):1057\u20131065, 2007.","journal-title":"Pattern Recognition"},{"issue":"6","key":"229_CR40","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10916-014-0027-z","volume":"38","author":"AK Das","year":"2014","unstructured":"Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst 38(6):27, 2014.","journal-title":"J. Med. Syst"},{"key":"229_CR41","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrow","year":"1990","unstructured":"Burrow, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans on Compu. Syst. 8:18\u201336, 1990.","journal-title":"ACM Trans on Compu. Syst."},{"key":"229_CR42","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11277-014-1750-y","volume":"78","author":"DW Zhao","year":"2013","unstructured":"Zhao, D.W., Peng, H.P., Li, L.X., Yang, Y.X., A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun 78:247\u2013269, 2013. doi: 10.1007\/s11277-014-1750-y .","journal-title":"Wireless Pers. Commun"},{"issue":"11","key":"229_CR43","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L., Password authentication with insecure communication. Commun.ACM 24(11):770\u2013772, 1981.","journal-title":"Commun.ACM"},{"issue":"10","key":"229_CR44","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.ins.2013.10.022","volume":"269","author":"V Odelu","year":"2014","unstructured":"Odelu, V., Das, A.K., Goswami, A., A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inform Sciences 269(10):270\u2013285, 2014.","journal-title":"Inform Sciences"},{"key":"229_CR45","doi-asserted-by":"crossref","first-page":"9969","DOI":"10.1007\/s10916-013-9969-9","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A.K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system, J. Med. Syst 37:9969, 2013.","journal-title":"J. Med. Syst"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0229-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0229-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0229-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T21:22:57Z","timestamp":1566595377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0229-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,22]]},"references-count":45,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["229"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0229-z","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,22]]},"article-number":"65"}}