{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:17Z","timestamp":1761401777200,"version":"3.41.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2015,8,6]],"date-time":"2015-08-06T00:00:00Z","timestamp":1438819200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s10916-015-0276-5","type":"journal-article","created":{"date-parts":[[2015,8,5]],"date-time":"2015-08-05T04:28:53Z","timestamp":1438748933000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS"],"prefix":"10.1007","volume":"39","author":[{"given":"Ashok Kumar","family":"Das","sequence":"first","affiliation":[]},{"given":"Vanga","family":"Odelu","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,6]]},"reference":[{"issue":"3","key":"276_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0217-3","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G.P., A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS. J. Med. Syst. 39(3):1\u201317, 2015.","journal-title":"J. Med. Syst."},{"key":"276_CR2","unstructured":"AVISPA: Automated Validation of Internet Security Protocols and Applications. http:\/\/www.avispa-project.org\/ . Accessed on January 2013"},{"key":"276_CR3","unstructured":"AVISPA: AVISPA Web Tool. http:\/\/www.avispa-project.org\/web-interface\/expert.php\/ . Accessed on March 2015"},{"issue":"3","key":"276_CR4","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D Basin","year":"2005","unstructured":"Basin, D., Modersheim, S., OFMC, L.V., A symbolic model checker for security protocols. Int. J. Inf. Secur. 4(3):181\u2013208, 2005.","journal-title":"Int. J. Inf. Secur."},{"issue":"3","key":"276_CR5","first-page":"317","volume":"5","author":"A Burnett","year":"2007","unstructured":"Burnett, A., Byrne, F., Dowling, T., Duffy, A., A Biometric Identity Based Signature Scheme. Int. J. Netw. Secur. 5(3):317\u2013326, 2007.","journal-title":"Int. J. Netw. Secur."},{"issue":"1","key":"276_CR6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 8(1):18\u201336, 1990.","journal-title":"ACM Trans. Comput. Syst."},{"issue":"9","key":"276_CR7","doi-asserted-by":"crossref","first-page":"1752","DOI":"10.1002\/sec.1140","volume":"8","author":"S Chatterjee","year":"2015","unstructured":"Chatterjee, S., and Das, A.K., An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur. Commun. Netw. 8(9):1752\u20131771, 2015.","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"276_CR8","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.jksuci.2013.10.007","volume":"26","author":"S Chatterjee","year":"2014","unstructured":"Chatterjee, S., Das, A.K., Sing, J.K., A novel and efficient user access control scheme for wireless body area sensor networks. J. King Saud Univ.-Comput. Inf. Sci. 26(2):181\u2013201, 2014.","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"issue":"4","key":"276_CR9","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1016\/j.eswa.2013.08.040","volume":"41","author":"M-C Chuang","year":"2014","unstructured":"Chuang, M.-C., and Chen, M.C., An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst. Appl. 41(4):1411\u20131418, 2014.","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"276_CR10","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1002\/nem.739","volume":"20","author":"Y-H Chuang","year":"2010","unstructured":"Chuang, Y.-H, and Tseng, Y.-M., An efficient dynamic group key agreement protocol for imbalanced wireless networks. Int. J. Netw. Manag. 20(4):167\u2013180, 2010.","journal-title":"Int. J. Netw. Manag."},{"issue":"3","key":"276_CR11","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A.K, Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3):145\u2013151, 2011.","journal-title":"IET Inf. Secur."},{"key":"276_CR12","doi-asserted-by":"crossref","unstructured":"Das, A.K., A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl.,1\u201322, 2014. doi: 10.1007\/s12083-014-0324-9 .","DOI":"10.1007\/s12083-014-0324-9"},{"key":"276_CR13","doi-asserted-by":"crossref","unstructured":"Das, A.K., A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wirel. Pers. Commun.,1\u201328, 2015. doi: 10.1007\/s11277-015-2288-3 .","DOI":"10.1007\/s11277-015-2288-3"},{"issue":"3","key":"276_CR14","first-page":"1","volume":"39","author":"AK Das","year":"2015","unstructured":"Das, A.K., A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems. J. Med. Syst. 39(3):1\u201320, 2015.","journal-title":"J. Med. Syst."},{"issue":"3","key":"276_CR15","first-page":"1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A.K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1\u201316, 2013.","journal-title":"J. Med. Syst."},{"issue":"C","key":"276_CR16","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A.K., Paul, N.R., Tripathy, L., Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inf. Sci. 209(C):80\u201392, 2012.","journal-title":"Inf. Sci."},{"issue":"5","key":"276_CR17","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1016\/j.jnca.2012.03.011","volume":"35","author":"AK Das","year":"2012","unstructured":"Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K., A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35(5):1646\u20131656, 2012.","journal-title":"J. Netw. Comput. Appl."},{"key":"276_CR18","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of the Advances in Cryptology (Eurocrypt\u201904), Vol. 3027, pp. 523\u2013540. LNCS (2004)","DOI":"10.1007\/978-3-540-24676-3_31"},{"issue":"2","key":"276_CR19","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"276_CR20","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Geng, X.H., Kim, C.S., Kim, J.-U., A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929\u2013936, 2014.","journal-title":"J. Internet Technol."},{"issue":"1","key":"276_CR21","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chen, J., Lee, C.-C., Chilamkurti, N., Yeo, S.-S., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21(1): 49\u201360, 2015.","journal-title":"Multimed. Syst."},{"key":"276_CR22","doi-asserted-by":"crossref","unstructured":"He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks: Information Sciences, 2015. doi: 10.1016\/j.ins.2015.02.010 .","DOI":"10.1016\/j.ins.2015.02.010"},{"key":"276_CR23","doi-asserted-by":"crossref","unstructured":"He, D., Kumar, N., Chilamkurti, N., Lee, J.-H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10), 2014.","DOI":"10.1007\/s10916-014-0116-z"},{"issue":"1","key":"276_CR24","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Lee, J.-H., Sherratt, R.S., Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans. Consum. Electron. 60(1):30\u201337, 2014.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"276_CR25","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"53","author":"D He","year":"2015","unstructured":"He, D., and Zeadally, S., Authentication protocol for an ambient assisted living system. IEEE Commun. Mag. 53(1):71\u201377, 2015.","journal-title":"IEEE Commun. Mag."},{"issue":"10","key":"276_CR26","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s10916-014-0135-9","volume":"38","author":"SKH Islam","year":"2014","unstructured":"Islam, S. K. H., and Khan, M.K., Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems. J. Med. Syst. 38(10):135, 2014.","journal-title":"J. Med. Syst."},{"issue":"11","key":"276_CR27","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jina","year":"2004","unstructured":"Jina, A.T.B., Linga, D.N.C., Biohashing, A. G., Two factor authentication featuring fingerprint data and tokenized random number. Pattern Recogn. 37(11):2245\u20132255, 2004.","journal-title":"Pattern Recogn."},{"key":"276_CR28","doi-asserted-by":"crossref","unstructured":"Khan, M.K., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4), 2013.","DOI":"10.1007\/s10916-013-9954-3"},{"issue":"2","key":"276_CR29","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1002\/sec.791","volume":"7","author":"MK Khan","year":"2014","unstructured":"Khan, M.K., and Kumari, S., Cryptanalysis and Improvement of \u201cAn Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. Secur. Commun. Netw. 7(2):399\u2013408, 2014.","journal-title":"Secur. Commun. Netw."},{"key":"276_CR30","first-page":"1","volume":"2014","author":"MK Khan","year":"2014","unstructured":"Khan, M.K., and Kumari, S., An improved user authentication protocol for healthcare services via wireless medical sensor networks. Int. J. Distrib. Sensor Netw. 2014:1\u201310, 2014. doi: 10.1155\/2014\/347169 . Article ID 347169.","journal-title":"Int. J. Distrib. Sensor Netw."},{"key":"276_CR31","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Proceedings of Advances in Cryptology - CRYPTO\u201999, Vol. 1666, pp. 388\u2013397. LNCS (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"276_CR32","doi-asserted-by":"crossref","unstructured":"Kumari, S., Khan, M.K., Kumar, R., Cryptanalysis and improvement of \u2018a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37(4), 2013.","DOI":"10.1007\/s10916-013-9952-5"},{"issue":"1","key":"276_CR33","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J.-W., Ma, J., Wang, W.-D., Liu, C.-L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1):73\u201379, 2011.","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"276_CR34","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li, X., Xiong, Y., Ma, J., Wang, W., An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2):763\u2013769, 2012.","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"276_CR35","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recogn. 40(3): 1057\u20131065, 2007.","journal-title":"Pattern Recogn."},{"issue":"12","key":"276_CR36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0142-x","volume":"38","author":"T Maitra","year":"2014","unstructured":"Maitra, T., and Giri, D., An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J. Med. Syst. 38(12):1\u201319, 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"276_CR37","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"276_CR38","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"276_CR39","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/s10916-014-0154-6","volume":"39","author":"D Mishra","year":"2014","unstructured":"Mishra, D., On the security flaws in ID-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1):154, 2014.","journal-title":"J. Med. Syst."},{"issue":"3","key":"276_CR40","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10916-015-0193-7","volume":"39","author":"D Mishra","year":"2015","unstructured":"Mishra, D., Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems. J. Med. Syst. 39(3):19, 2015.","journal-title":"J. Med. Syst."},{"key":"276_CR41","doi-asserted-by":"crossref","unstructured":"Mishra, D., Das, A.K., Mukhopadhyay, S., A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Netw. Appl.,1\u201322, 2014. doi: 10.1007\/s12083-014-0321-z .","DOI":"10.1007\/s12083-014-0321-z"},{"issue":"18","key":"276_CR42","doi-asserted-by":"crossref","first-page":"8129","DOI":"10.1016\/j.eswa.2014.07.004","volume":"41","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Das, A. K., Mukhopadhyay, S., A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst. Appl. 41(18):8129\u20138143, 2014.","journal-title":"Expert Syst. Appl."},{"key":"276_CR43","doi-asserted-by":"crossref","unstructured":"Mishra, D., and Mukhopadhyay, S.: Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols. In: Information Systems Security, volume 8303 of Lecture Notes in Computer Science, pp. 247\u2013254. Springer Berlin Heidelberg (2013)","DOI":"10.1007\/978-3-642-45204-8_19"},{"issue":"6","key":"276_CR44","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M.K., et al., Cryptanalysis and Improvement of Yan Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(6):24, 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"276_CR45","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10916-014-0041-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5):41, 2014.","journal-title":"J. Med. Syst."},{"key":"276_CR46","doi-asserted-by":"crossref","unstructured":"Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10), 2014.","DOI":"10.1007\/s10916-014-0120-3"},{"issue":"5","key":"276_CR47","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/s10916-015-0215-5","volume":"39","author":"R Mishra","year":"2015","unstructured":"Mishra, R., and Barnwal, A.K., A privacy preserving secure and efficient authentication scheme for telecare medical information systems. J. Med. Syst. 39(5):54, 2015.","journal-title":"J. Med. Syst."},{"issue":"9","key":"276_CR48","doi-asserted-by":"crossref","first-page":"1732","DOI":"10.1002\/sec.1139","volume":"8","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., Goswami, A., A secure and efficient ecc-based user anonymity preserving single sign-on scheme for distributed computer networks. Secur. Commun. Netw. 8(9):1732\u20131751, 2015.","journal-title":"Secur. Commun. Netw."},{"key":"276_CR49","doi-asserted-by":"crossref","unstructured":"Odelu, V., Das, A.K., Goswami, A., A secure and scalable group access control scheme for wireless sensor networks: Wireless Personal Communications, 2015. doi: 10.1007\/s11277-015-2866-4 .","DOI":"10.1007\/s11277-015-2866-4"},{"key":"276_CR50","doi-asserted-by":"crossref","unstructured":"Odelu, V., Das, A.K., Goswami, A., A secure biometricsbased multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensic. Secur. 10(9):1953\u20131966, 2015. doi: 10.1109\/TIFS.2015.2439964 .","DOI":"10.1109\/TIFS.2015.2439964"},{"issue":"4","key":"276_CR51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1880022.1880027","volume":"13","author":"P Sarkar","year":"2010","unstructured":"Sarkar, P., A simple and generic construction of authenticated encryption with associated data. ACM Trans. Inf. Syst. Secur. 13(4):1\u201316, 2010.","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"276_CR52","doi-asserted-by":"crossref","first-page":"9997","DOI":"10.1007\/s10916-013-9997-5","volume":"38","author":"Z Siddiqui","year":"2014","unstructured":"Siddiqui, Z., Abdullah, A.-H., Khan, M.K., Alghamdi, A.S., Smart environment as a service, three factor cloud based user authentication for telecare medical information system. J. Med. Syst. 38(1):9997, 2014.","journal-title":"J. Med. Syst."},{"issue":"2","key":"276_CR53","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.jnca.2010.11.011","volume":"34","author":"SK Sood","year":"2011","unstructured":"Sood, S.K., Sarje, A.K., Singh, K., A secure dynamic identity based authentication protocol for multi-server architecture. J. Netw. Comput. Appl. 34(2):609\u2013618, 2011.","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"276_CR54","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s10623-005-6344-y","volume":"38","author":"DR Stinson","year":"2006","unstructured":"Stinson, D.R., Some Observations on the Theory of Cryptographic Hash Functions. Des., Codes Crypt. 38(2): 259\u2013277, 2006.","journal-title":"Des., Codes Crypt."},{"key":"276_CR55","unstructured":"Von Oheimb, D.: The high-level protocol specification language hlpsl developed in the eu project avispa , pp. 1\u201317. Tallinn (2005)"},{"issue":"2","key":"276_CR56","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/s11277-011-0456-7","volume":"68","author":"B Wang","year":"2013","unstructured":"Wang, B., and Ma, M., A smart card based efficient and secured multi-server authentication scheme. Wirel. Pers. Commun. 68(2):361\u2013378, 2013.","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"276_CR57","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.jcss.2013.07.004","volume":"80","author":"K Xue","year":"2014","unstructured":"Xue, K., Hong, P., Ma, C., A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. J. Comput. Syst. Sci. 80(1):195\u2013206, 2014.","journal-title":"J. Comput. Syst. Sci."},{"key":"276_CR58","doi-asserted-by":"crossref","unstructured":"Yang, D., and Yang, B.: A biometric password-based multi-server authentication scheme with smart card. In: 2010 International Conference on Computer Design and Applications (ICCDA), Vol. 5, pp. 554\u2013559. IEEE (2010)","DOI":"10.1109\/ISDPE.2010.11"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0276-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0276-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0276-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T21:48:19Z","timestamp":1748555299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0276-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,6]]},"references-count":58,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["276"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0276-5","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2015,8,6]]},"article-number":"92"}}