{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:51:11Z","timestamp":1757541071462},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,4,2]],"date-time":"2015-04-02T00:00:00Z","timestamp":1427932800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s10916-015-0245-z","type":"journal-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T01:21:17Z","timestamp":1428024077000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems"],"prefix":"10.1007","volume":"39","author":[{"given":"Dianli","family":"Guo","sequence":"first","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Wenmin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhengping","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,2]]},"reference":[{"issue":"3","key":"245_CR1","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M.L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3): 1086\u20131090, 2009.","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"6","key":"245_CR2","first-page":"987C993","volume":"7","author":"FT Wen","year":"2013","unstructured":"Wen, F.T., Susilo, W., Yang, G.M., A robust smart card-based anonymous user authentication protocol for wireless communications. Security Comm. Networks 7(6):987C993, 2013.","journal-title":"Security Comm. Networks"},{"issue":"1","key":"245_CR3","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/s11277-014-1762-7","volume":"78","author":"DL Guo","year":"2014","unstructured":"Guo, D.L., and Wen, F.T., Analysis and improvement of a robust smart card based-authentication scheme for multi-server architecture. Wireless Pers. Commun. 78(1):475\u2013490, 2014.","journal-title":"Wireless Pers. Commun."},{"issue":"10","key":"245_CR4","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/LCOMM.2008.080283","volume":"12","author":"C Wu","year":"2008","unstructured":"Wu, C., Lee, B., Tsaur, W., A secure authentication scheme with anonymity for wireless communications. IEEE Commun. Lett. 12(10):722\u2013723, 2008.","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"245_CR5","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1002\/nem.1827","volume":"23","author":"X Li","year":"2013","unstructured":"Li, X., Wen, Q., Zhang, H., Jin, Z., An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. Int. J. Netw. Manag. 23(5):311\u2013324, 2013.","journal-title":"Int. J. Netw. Manag."},{"issue":"3","key":"245_CR6","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"3","key":"245_CR7","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"DB He","year":"2012","unstructured":"He, D.B., Chen, J.H., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"245_CR8","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36 (6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"245_CR9","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833\u20133838, 2012.","journal-title":"J. Med. Syst."},{"issue":"4","key":"245_CR10","doi-asserted-by":"crossref","first-page":"2609","DOI":"10.1007\/s10916-011-9735-9","volume":"36","author":"Q Pu","year":"2012","unstructured":"Pu, Q., Wang, J., Zhao, R.Y., Strong authentication scheme for telecare medicine information systems. J. Med. Syst. 36 (4):2609\u20132619, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"245_CR11","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"HM Chen","year":"2012","unstructured":"Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907\u20133915, 2012.","journal-title":"J. Med. Syst."},{"key":"245_CR12","author":"TJ Cao","year":"2013","unstructured":"Cao, T.J., and Zhai, J.X., Improved dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst., 2013. doi: 10.1007\/s10916-012-9912-5 .","journal-title":"J. Med. Syst."},{"key":"245_CR13","author":"Q Xie","year":"2013","unstructured":"Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst., 2013. doi: 10.1007\/s10916-012-9911-6 .","journal-title":"J. Med. Syst."},{"key":"245_CR14","author":"HY Lin","year":"2013","unstructured":"Lin, H.Y., On the security of a dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst., 2013. doi: 10.1007\/s10916-013-9929-4 .","journal-title":"J. Med. Syst."},{"key":"245_CR15","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J.F., Ma, Z., Li, G.S., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst., 2013. doi: 10.1007\/s10916-012-9897-0 .","journal-title":"J. Med. Syst."},{"key":"245_CR16","author":"F Wu","year":"2014","unstructured":"Wu, F., and Xu, L., Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J. Med. Syst., 2014. doi: 10.1007\/s10916-013-9958-z .","journal-title":"J. Med. Syst."},{"key":"245_CR17","author":"F Wen","year":"2014","unstructured":"Wen, F., and Guo, D., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0026-0 .","journal-title":"J. Med. Syst."},{"key":"245_CR18","author":"T Li","year":"2014","unstructured":"Li, T., Lee, C., Weng, C., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0077-2 .","journal-title":"J. Med. Syst."},{"key":"245_CR19","author":"AK Das","year":"2014","unstructured":"Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0027-z .","journal-title":"J. Med. Syst."},{"issue":"11","key":"245_CR20","doi-asserted-by":"crossref","first-page":"1892C 1898","DOI":"10.1016\/j.jss.2011.06.061","volume":"84","author":"SK Islam","year":"2011","unstructured":"Islam, S.K., and Biswas, G.P., A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892C 1898, 2011.","journal-title":"J. Syst. Softw."},{"issue":"1","key":"245_CR21","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1049\/iet-ifs.2012.0058","volume":"7","author":"CT Li","year":"2013","unstructured":"Li, C.T., A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inforamtion. Security 7(1):3\u201310, 2013.","journal-title":"IET Inforamtion. Security"},{"issue":"2","key":"245_CR22","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/TPDS.2013.145","volume":"25","author":"J Liu","year":"2014","unstructured":"Liu, J., Zhang, Z., Chen, X., Kwak, K., Certificateless remote anonymous authentication schemes for wireless body sensor networks. IEEE Trans. Parallel Distrib. Syst. 25(2):332\u2013342, 2014.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"245_CR23","author":"Z Zhao","year":"2014","unstructured":"Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst., 2014. doi: 10.1007\/s10916-014-0013-5 .","journal-title":"J. Med. Syst."},{"key":"245_CR24","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. Proceedings of Advances in Cryptology, Santa Barbara, CA, U.S.A., pp. 388\u2013397 (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"245_CR25","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, E.A., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"245_CR26","doi-asserted-by":"crossref","first-page":"9902","DOI":"10.1007\/s10916-012-9902-7","volume":"37","author":"YF Chang","year":"2013","unstructured":"Chang, Y.F., Yu, S.H., Shiao, D.R., An uniqueness-andanonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9902, 2013.","journal-title":"J. Med. Syst."},{"key":"245_CR27","unstructured":"Joux, A., A one round protocol for tripartite Diffie? CHellman 4th International Symposium on Algorithmic Number Theory, Lecture Notes in Comput. Sci. Vol. 1838, p. 385C394. New York: Springer, 2000."},{"issue":"3","key":"245_CR28","doi-asserted-by":"crossref","first-page":"586C615","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh, D., and Franklin, M., Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3): 586C615, 2003.","journal-title":"SIAM J. Comput."},{"key":"245_CR29","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.ins.2008.09.020","volume":"179","author":"S Wang","year":"2009","unstructured":"Wang, S., Cao, Z., Choo, K., Wang, L., An improved identity-based key agreement protocol and its security proof. Info. Sci. 179:307\u2013318, 2009.","journal-title":"Info. Sci."},{"key":"245_CR30","unstructured":"Kudla, C., Special signature schemes and key agreement protocols, PH.D. Thesis: Royal Holloway University of London , 2006."},{"key":"245_CR31","doi-asserted-by":"crossref","unstructured":"Kudla, C., and Paterson, K.: Modular security proofs for key agreement protocols. In: Proceedings ASIACRYPT\u201905, LNCS, Vol. 3788, pp. 549\u2013565 (2005)","DOI":"10.1007\/11593447_30"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0245-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0245-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0245-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T17:06:59Z","timestamp":1566493619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0245-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,2]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["245"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0245-z","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,2]]},"article-number":"62"}}