{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T21:51:10Z","timestamp":1774389070551,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,4,26]],"date-time":"2015-04-26T00:00:00Z","timestamp":1430006400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s10916-015-0244-0","type":"journal-article","created":{"date-parts":[[2015,4,25]],"date-time":"2015-04-25T08:10:26Z","timestamp":1429949426000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":75,"title":["Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems"],"prefix":"10.1007","volume":"39","author":[{"given":"Shehzad Ashraf","family":"Chaudhry","sequence":"first","affiliation":[]},{"given":"Husnain","family":"Naqvi","sequence":"additional","affiliation":[]},{"given":"Taeshik","family":"Shon","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Sher","sequence":"additional","affiliation":[]},{"given":"Mohammad Sabzinejad","family":"Farash","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,26]]},"reference":[{"key":"244_CR1","doi-asserted-by":"crossref","unstructured":"Ch, S.A., uddin, N., Sher, M., Ghani, A., Naqvi, H., Irshad, A., An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimed. Tools Appl.,1\u201313, 2014. doi: 10.1007\/s11042-014-2283-9 .","DOI":"10.1007\/s11042-014-2283-9"},{"issue":"6","key":"244_CR2","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"HM Chen","year":"2012","unstructured":"Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907\u20133915, 2012. doi: 10.1007\/s10916-012-9862-y .","journal-title":"J. Med. Syst."},{"issue":"3","key":"244_CR3","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s10916-015-0204-8","volume":"39","author":"A Das","year":"2015","unstructured":"Das, A., A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system. J. Med. Syst. 39(3):25, 2015. doi: 10.1007\/s10916-015-0204-8 .","journal-title":"J. Med. Syst."},{"issue":"3","key":"244_CR4","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.inffus.2011.01.001","volume":"13","author":"H Debiao","year":"2012","unstructured":"Debiao, H., Jianhua, C., Jin, H., An id-based client authentication with key agreement protocol for mobile client\u2013server environment on ecc with provable security. Inf. Fusion 13(3):223\u2013230, 2012.","journal-title":"Inf. Fusion"},{"issue":"3","key":"244_CR5","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"H Debiao","year":"2012","unstructured":"Debiao, H., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012. doi: 10.1007\/s10916-011-9658-5 .","journal-title":"J. Med. Syst."},{"key":"244_CR6","doi-asserted-by":"crossref","unstructured":"Diffie, W., and Hellman, M.E., New directions in cryptography. IEEE Trans. Inf. Theory 22(6):644\u2013654, 1976.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"244_CR7","unstructured":"Farash, M.S., and Attari, M.A., Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. ISC Int. J. Inf. Secur. 5(1):18\u201343, 2013."},{"issue":"2","key":"244_CR8","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.compeleceng.2012.09.004","volume":"39","author":"MS Farash","year":"2013","unstructured":"Farash, M.S., Attari, M.A., Atani, R.E., Jami, M., A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput. Electr. Eng. 39(2):530\u2013541, 2013.","journal-title":"Comput. Electr. Eng."},{"key":"244_CR9","doi-asserted-by":"crossref","unstructured":"Farash, M.S., An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int. J. Commun. Syst. 2014. doi: 10.1002\/dac.2879 .","DOI":"10.1002\/dac.2879"},{"key":"244_CR10","doi-asserted-by":"crossref","unstructured":"Farash, M.S., Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Netw. Appl.,1\u201310, 2014. doi: 10.1007\/s12083-014-0315-x .","DOI":"10.1007\/s12083-014-0315-x"},{"key":"244_CR11","doi-asserted-by":"crossref","unstructured":"Farash, M.S., and Attari, M.A., An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps. Nonlinear Dyn. 77(1\u20132):399\u2013411, 2014.","DOI":"10.1007\/s11071-014-1304-6"},{"key":"244_CR12","doi-asserted-by":"crossref","unstructured":"Farash, M.S., and Attari, M.A., An enhanced and secure threeparty password-based authenticated key exchange protocol without using server\u2019s public-keys and symmetric cryptosystems. Inf. Technol. Control 43(2):143\u2013150, 2014.","DOI":"10.5755\/j01.itc.43.2.3790"},{"key":"244_CR13","doi-asserted-by":"crossref","unstructured":"Farash, M.S., and Attari, M.A., A secure and efficient identity-based authenticated key exchange protocol for mobile client\u2013server networks. J. Supercomputing, 1\u201317, 2014.","DOI":"10.1007\/s11227-014-1170-5"},{"key":"244_CR14","doi-asserted-by":"crossref","unstructured":"Farash, M.S., and Attari, M.A., An efficient client-client password-based authentication scheme with provable security. J Supercomput. 2014. doi: 10.1007\/s11227-014-1273-z","DOI":"10.1007\/s11227-014-1273-z"},{"issue":"1","key":"244_CR15","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2014","unstructured":"Giri, D., Maitra, T., Amin, R., Srivastava, P., An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1):145, 2014. doi: 10.1007\/s10916-014-0145-7 .","journal-title":"J. Med. Syst."},{"issue":"6","key":"244_CR16","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1016\/j.adhoc.2012.01.002","volume":"10","author":"D He","year":"2012","unstructured":"He, D., An efficient remote user authentication and key agreement protocol for mobile client\u2013server environment from pairings. Ad Hoc Netw. 10(6):1009\u20131016, 2012.","journal-title":"Ad Hoc Netw."},{"key":"244_CR17","doi-asserted-by":"crossref","unstructured":"Irshad, A., Sher, M., Faisal, M.S., Ghani, A., Ul Hassan, M., Ch, S.A.: A secure authentication scheme for session initiation protocol by using ecc on the basis of the tang and liu scheme. Secur. Comm. Netw. (2013)","DOI":"10.1002\/sec.834"},{"key":"244_CR18","doi-asserted-by":"crossref","unstructured":"Irshad, A., Sher, M., Rehman, E., Ch, S.A., Hassan, M.U., Ghani, A., A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimed Tools Appl.,1\u201318, 2013.","DOI":"10.1007\/s11042-013-1807-z"},{"key":"244_CR19","doi-asserted-by":"crossref","unstructured":"Islam, S., and Biswas, G., A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892\u20131898, 2011.","DOI":"10.1016\/j.jss.2011.06.061"},{"key":"244_CR20","doi-asserted-by":"crossref","unstructured":"Islam, S., and Khan, M., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014. doi: 10.1007\/s10916-014-0135-9","DOI":"10.1007\/s10916-014-0135-9"},{"issue":"1","key":"244_CR21","doi-asserted-by":"crossref","first-page":"9897","DOI":"10.1007\/s10916-012-9897-0","volume":"37","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):9897, 2013. doi: 10.1007\/s10916-012-9897-0 .","journal-title":"J. Med. Syst."},{"key":"244_CR22","doi-asserted-by":"crossref","unstructured":"Khan, M.K., Kim, S.K., Alghathbar, K., Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Comput. Commun. 34(3):305\u2013309, 2011. doi: 10.1016\/j.comcom.2010.02.011 . Special Issue of Computer Communications on Information and Future Communication Security.","DOI":"10.1016\/j.comcom.2010.02.011"},{"key":"244_CR23","doi-asserted-by":"crossref","unstructured":"Khan, M.K., and Kumari, S., Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems? Secur. Commun. Netw. 7(2):399\u2013408, 2014. doi: 10.1002\/sec.791","DOI":"10.1002\/sec.791"},{"key":"244_CR24","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology CRYPTO 99, pp. 388\u2013397. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"4","key":"244_CR25","doi-asserted-by":"crossref","first-page":"9952","DOI":"10.1007\/s10916-013-9952-5","volume":"37","author":"S Kumari","year":"2013","unstructured":"Kumari, S., Khan, M.K., Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37(4):9952, 2013. doi: 10.1007\/s10916-013-9952-5 .","journal-title":"J. Med. Syst."},{"issue":"1\u20132","key":"244_CR26","first-page":"79","volume":"69","author":"CC Lee","year":"2012","unstructured":"Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1\u20132):79\u201387, 2012.","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"244_CR27","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.comcom.2009.10.005","volume":"33","author":"YP Liao","year":"2010","unstructured":"Liao, Y.P., and Wang, S.S., A new secure password authenticated key agreement scheme for sip using self-certified public keys on elliptic curves. Comput. Commun. 33 (3): 372\u2013380 , 2010.","journal-title":"Comput. Commun."},{"issue":"2","key":"244_CR28","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/TPDS.2013.145","volume":"25","author":"J Liu","year":"2014","unstructured":"Liu, J., Zhang, Z., Chen, X., Kwak, K.S., Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Distrib. Syst. 25 (2): 332\u2013342 , 2014.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"244_CR29","doi-asserted-by":"crossref","unstructured":"Mehmood, Z., uddin, N., Ch, S.A., Nasar, W., Ghani, A.: An efficient key agreement with rekeying for secured body sensor networks. In: 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC), pp. 164\u2013167. IEEE (2012)","DOI":"10.1109\/ICDIPC.2012.6257295"},{"issue":"5","key":"244_CR30","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans Comput"},{"key":"244_CR31","doi-asserted-by":"crossref","unstructured":"Chaudhry, S.A., Comment on \u2018Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications\u2019. IET Communications, pp. 1. doi: 10.1049\/iet-com.2014.1082 .","DOI":"10.1049\/iet-com.2014.1082"},{"key":"244_CR32","doi-asserted-by":"crossref","unstructured":"Ul Amin, N., Asad, M., Din, N., Ch, S.A.: An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem. In: 2012 9th IEEE International Conference on Networking, Sensing and Control (ICNSC), pp. 118\u2013121. IEEE (2012)","DOI":"10.1109\/ICNSC.2012.6204902"},{"issue":"1","key":"244_CR33","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/s10916-014-0158-2","volume":"39","author":"Z Wang","year":"2014","unstructured":"Wang, Z., Huo, Z., Shi, W., A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems. J. Med. Syst. 39(1):158, 2014. doi: 10.1007\/s10916-014-0158-2 .","journal-title":"J. Med. Syst."},{"issue":"6","key":"244_CR34","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012. doi: 10.1007\/s10916-012-9835-1 .","journal-title":"J. Med. Syst."},{"key":"244_CR35","doi-asserted-by":"crossref","unstructured":"Wu, S., and Chen, K., An efficient key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst. 36(4):2325\u20132337, 2012.","DOI":"10.1007\/s10916-011-9700-7"},{"issue":"3","key":"244_CR36","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012. doi: 10.1007\/s10916-010-9614-9 .","journal-title":"J. Med. Syst."},{"key":"244_CR37","doi-asserted-by":"crossref","unstructured":"Xiang, T., Wong, K.W., Liao, X., On the security of a novel key agreement protocol based on chaotic maps. Chaos, Solitons & Fractals 40(2):672\u2013675, 2009. doi: 10.1016\/j.chaos.2007.08.012 .","DOI":"10.1016\/j.chaos.2007.08.012"},{"key":"244_CR38","doi-asserted-by":"crossref","unstructured":"Xu, L., and Wu, F., Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J. Med. Syst. 39(2):10, 2015. doi: 10.1007\/s10916-014-0179-x","DOI":"10.1007\/s10916-014-0179-x"},{"key":"244_CR39","doi-asserted-by":"crossref","unstructured":"Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1\u20137, 2014.","DOI":"10.1007\/s10916-013-9994-8"},{"key":"244_CR40","doi-asserted-by":"crossref","unstructured":"Yang, H., Kim, H., Mtonga, K., An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-to-Peer Netw. Appl.,1\u201311, 2014. doi: 10.1007\/s12083-014-0299-6 .","DOI":"10.1007\/s12083-014-0299-6"},{"issue":"2","key":"244_CR41","doi-asserted-by":"crossref","first-page":"285","DOI":"10.15388\/Informatica.2005.099","volume":"16","author":"EJ Yoon","year":"2005","unstructured":"Yoon, E.J., Ryu, E.K., Yoo, K.Y., Attacks and solutions of Yang et al.\u2019s protected password changing scheme. Informatica 16(2):285\u2013294, 2005.","journal-title":"Informatica"},{"issue":"1","key":"244_CR42","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1049\/iet-com.2012.0783","volume":"8","author":"L Zhang","year":"2014","unstructured":"Zhang, L., Tang, S., Cai, Z., Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications. IET Communications 8(1):83\u201391, 2014.","journal-title":"IET Communications"},{"issue":"2","key":"244_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0013-5","volume":"38","author":"Z Zhao","year":"2014","unstructured":"Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2):1\u20137, 2014.","journal-title":"J. Med. Syst."},{"issue":"6","key":"244_CR44","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833\u20133838, 2012. doi: 10.1007\/s10916-012-9856-9 .","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0244-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0244-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0244-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T09:45:46Z","timestamp":1598953546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0244-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,26]]},"references-count":44,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["244"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0244-0","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,26]]},"article-number":"66"}}