{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T11:52:12Z","timestamp":1719316332914},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,3,22]],"date-time":"2015-03-22T00:00:00Z","timestamp":1426982400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s10916-015-0240-4","type":"journal-article","created":{"date-parts":[[2015,3,21]],"date-time":"2015-03-21T00:48:01Z","timestamp":1426898881000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems"],"prefix":"10.1007","volume":"39","author":[{"given":"Der-Chyuan","family":"Lou","sequence":"first","affiliation":[]},{"given":"Tian-Fu","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Tsung-Hung","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,22]]},"reference":[{"issue":"4","key":"240_CR1","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1005549330655","volume":"24","author":"C Lambrinoudakis","year":"2000","unstructured":"Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213\u2013234, 2000.","journal-title":"J. Med. Syst."},{"issue":"6","key":"240_CR2","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833\u20133838, 2012.","journal-title":"J. Med. Syst."},{"key":"240_CR3","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1109\/TIE.2008.921677","volume":"55","author":"WS Juang","year":"2008","unstructured":"Juang, W. S., Chen, S. T., and Liaw, H. T., Robust and efficient password-authenticated key agreement using smart card. IEEE Trans. Ind. Electron. 55:2551\u20132556, 2008.","journal-title":"IEEE Trans. Ind. Electron."},{"key":"240_CR4","doi-asserted-by":"crossref","first-page":"2556","DOI":"10.1016\/j.jss.2010.07.062","volume":"83","author":"KH Yeh","year":"2010","unstructured":"Yeh, K. H., Su, C., Lo, N. W., Li, Y. J., and Hung, Y. X., Two robust remote user authentication protocols using smart cards. J. Syst. Softw. 83:2556\u20132565, 2010.","journal-title":"J. Syst. Softw."},{"issue":"3","key":"240_CR5","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"DB He","year":"2012","unstructured":"He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"240_CR6","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"key":"240_CR7","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1016\/j.cnsns.2012.09.032","volume":"18","author":"C Guo","year":"2013","unstructured":"Guo, C., and Chang, C. C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18:1433\u20131440, 2013.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"9919","key":"240_CR8","first-page":"1","volume":"37","author":"X Hao","year":"2013","unstructured":"Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(9919):1\u20137, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"240_CR9","doi-asserted-by":"crossref","first-page":"9933","DOI":"10.1007\/s10916-013-9933-8","volume":"37","author":"T-F Lee","year":"2013","unstructured":"Lee, T.-F., and Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):9933, 2013. 1\u20138.","journal-title":"J. Med. Syst."},{"issue":"9958","key":"240_CR10","first-page":"1","volume":"37","author":"T-F Lee","year":"2013","unstructured":"Lee, T.-F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J. Med. Syst. 37(9958):1\u20139, 2013.","journal-title":"J. Med. Syst."},{"issue":"1","key":"240_CR11","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"CH Lin","year":"2004","unstructured":"Lin, C. H., and Lai, Y. Y., A flexible biometric remote user authentication scheme. Comput. Stand. Interfaces 27(1):19\u201323, 2004.","journal-title":"Comput. Stand. Interfaces"},{"issue":"3","key":"240_CR12","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.chaos.2006.05.061","volume":"35","author":"MK Khan","year":"2008","unstructured":"Khan, M. K., Zhang, J., and Wang, X., Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons Fractals 35(3):519\u2013524, 2008.","journal-title":"Chaos, Solitons Fractals"},{"issue":"1","key":"240_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C. T., and Hwang, M. S., An efficient biometric-based remote authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1\u20135, 2010.","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"240_CR14","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A. K., Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3):145\u2013151, 2011.","journal-title":"IET Inf. Secur."},{"key":"240_CR15","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11071-012-0652-3","volume":"71","author":"CC Lee","year":"2013","unstructured":"Lee, C. C., and Hsu, C. W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71:201\u2013211, 2013.","journal-title":"Nonlinear Dyn."},{"issue":"5","key":"240_CR16","first-page":"200","volume":"89","author":"Z Tan","year":"2013","unstructured":"Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Przeglad Elektrotechniczny 89(5):200\u2013204, 2013.","journal-title":"Przeglad Elektrotechniczny"},{"key":"240_CR17","doi-asserted-by":"crossref","first-page":"9972","DOI":"10.1007\/s10916-013-9972-1","volume":"37","author":"X Yan","year":"2013","unstructured":"Yan, X., Li, W., Li, P., Wang, J., Hao, X., and Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37:9972, 2013. doi: 10.1007\/s10916-013-9972-1 .","journal-title":"J. Med. Syst."},{"issue":"5","key":"240_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9964-1","volume":"37","author":"AK Awasthi","year":"2013","unstructured":"Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1\u20134, 2013.","journal-title":"J. Med. Syst."},{"key":"240_CR19","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10916-014-0027-z","volume":"38","author":"AK Das","year":"2014","unstructured":"Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38:27, 2014. doi: 10.1007\/s10916-014-0027-z .","journal-title":"J. Med. Syst."},{"key":"240_CR20","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s10916-014-0139-5","volume":"38","author":"X Li","year":"2014","unstructured":"Li, X., Wen, Q., Li, W., Zhang, H., and Jin, Z., Secure privacy-preserving biometric authentication scheme for telecare medicine information systems. J. Med. Syst. 38:139, 2014. doi: 10.1007\/s10916-014-0139-5 .","journal-title":"J. Med. Syst."},{"key":"240_CR21","unstructured":"Kocarev, L., and Tasev, Z., Public-key encryption based on Chebyshev maps. In: Proc. Int. Symp. Circuits Syst. 3:III-28\u2013III-31, 2003."},{"key":"240_CR22","volume-title":"Chebyshev polynomials","author":"JC Mason","year":"2003","unstructured":"Mason, J. C., and Handscomb, D. C., Chebyshev polynomials. Chapman & Hall\/CRC, Boca Raton, 2003."},{"key":"240_CR23","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2005","unstructured":"Bergamo, P., D\u2019Arco, P., Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. 52:1382\u20131393, 2005.","journal-title":"IEEE Trans. Circuits Syst."},{"key":"240_CR24","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.chaos.2007.01.017","volume":"38","author":"S Han","year":"2008","unstructured":"Han, S., Security of a key agreement protocol based on chaotic maps. Chaos, Solitons Fractals 38:764\u2013768, 2008.","journal-title":"Chaos, Solitons Fractals"},{"key":"240_CR25","doi-asserted-by":"crossref","first-page":"4069","DOI":"10.1016\/j.ins.2010.06.013","volume":"180","author":"XF Guo","year":"2010","unstructured":"Guo, X. F., and Zhang, J. S., Secure group key agreement protocol based on chaotic hash. Inform. Sci. 180:4069\u20134074, 2010.","journal-title":"Inform. Sci."},{"key":"240_CR26","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"Y Niu","year":"2011","unstructured":"Niu, Y., and Wang, X., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16:1986\u20131992, 2011.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"240_CR27","doi-asserted-by":"crossref","first-page":"4052","DOI":"10.1016\/j.cnsns.2010.02.014","volume":"15","author":"X Wang","year":"2010","unstructured":"Wang, X., and Zhao, J., An improved key agreement protocol based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15:4052\u20134057, 2010.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"1\u20132","key":"240_CR28","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s11071-014-1304-6","volume":"77","author":"MS Farash","year":"2014","unstructured":"Farash, M. S., and Attari, M. A., An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn. 77(1\u20132):399\u2013411, 2014.","journal-title":"Nonlinear Dyn."},{"key":"240_CR29","volume-title":"Cryptography and network security: principles and practice","author":"W Stallings","year":"1999","unstructured":"Stallings, W., Cryptography and network security: principles and practice, 2nd edition. Prentice Hall, Upper Saddle River, 1999.","edition":"2"},{"issue":"8","key":"240_CR30","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"DE Denning","year":"1981","unstructured":"Denning, D. E., and Sacco, G. M., Timestamps in key distribution protocols. Commun. ACM 24(8):533\u2013536, 1981.","journal-title":"Commun. ACM"},{"issue":"1","key":"240_CR31","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/130704.130709","volume":"26","author":"L Gong","year":"1992","unstructured":"Gong, L., A security risk of depending on synchronized clocks. ACM Oper Syst Rev 26(1):49\u201353, 1992.","journal-title":"ACM Oper Syst Rev"},{"key":"240_CR32","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1016\/j.jss.2011.05.006","volume":"84","author":"TF Lee","year":"2011","unstructured":"Lee, T. F., and Hwang, T., Provably secure and efficient authentication techniques for the global mobility network. J. Syst. Softw. 84:1717\u20131725, 2011.","journal-title":"J. Syst. Softw."},{"issue":"3","key":"240_CR33","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669\u2013674, 2008.","journal-title":"Chaos, Solitons Fractals"},{"key":"240_CR34","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume":"1666","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. Lect. Notes Comput. Sci 1666:388\u2013397, 1999.","journal-title":"Lect. Notes Comput. Sci"},{"key":"240_CR35","doi-asserted-by":"crossref","unstructured":"Messerges, T., Dabbish, E., and Sloan, R., Examining smartcard security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","DOI":"10.1109\/TC.2002.1004593"},{"key":"240_CR36","doi-asserted-by":"crossref","unstructured":"Suzuki, S., and Nakada, K., An authentication technique based on distributed security management for the global mobility network. IEEE J. Sel. Areas Commun. 15:1608\u20131617, 1997.","DOI":"10.1109\/49.634798"},{"issue":"1\u20132","key":"240_CR37","first-page":"79","volume":"69","author":"CC Lee","year":"2012","unstructured":"Lee, C. C., Chen, C. L., Wu, C. Y., and Huang, S. Y., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1\u20132):79\u201387, 2012.","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"240_CR38","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s11071-012-0335-0","volume":"69","author":"D He","year":"2012","unstructured":"He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3):1149\u20131157, 2012.","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"240_CR39","doi-asserted-by":"crossref","first-page":"2325","DOI":"10.1007\/s10916-011-9700-7","volume":"36","author":"S Wu","year":"2012","unstructured":"Wu, S., and Chen, K., An efficient key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst. 36(4):2325\u20132337, 2012.","journal-title":"J. Med. Syst."},{"key":"240_CR40","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1002\/sec.709","volume":"6","author":"ZY Cheng","year":"2013","unstructured":"Cheng, Z. Y., Liu, Y., Chang, C. C., and Chang, S. C., Authenticated RFID security mechanism based on chaotic maps. Secur. Comm. Netw. 6:247\u2013256, 2013.","journal-title":"Secur. Comm. Netw."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0240-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0240-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0240-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T04:50:56Z","timestamp":1559451056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0240-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,22]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["240"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0240-4","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,22]]},"article-number":"58"}}