{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T23:52:22Z","timestamp":1773186742048,"version":"3.50.1"},"reference-count":75,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T00:00:00Z","timestamp":1441411200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s10916-015-0318-z","type":"journal-article","created":{"date-parts":[[2015,9,5]],"date-time":"2015-09-05T07:48:26Z","timestamp":1441439306000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":59,"title":["Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems"],"prefix":"10.1007","volume":"39","author":[{"given":"Ruhul","family":"Amin","sequence":"first","affiliation":[]},{"given":"SK Hafizul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,5]]},"reference":[{"issue":"13","key":"318_CR1","first-page":"43","volume":"75","author":"R Amin","year":"2013","unstructured":"Amin, R, Cryptanalysis and an efficient secure id-based remote user authentication using smart card. Int. J. Comput. Appl. 75(13):43\u201348, 2013.","journal-title":"Int. J. Comput. Appl."},{"key":"318_CR2","doi-asserted-by":"crossref","unstructured":"Amin, R, and Biswas, GP, Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card. Arab. J. Sci. Eng.,1\u201315, 2015. doi: 10.1007\/s13369-015-1743-5 .","DOI":"10.1007\/s13369-015-1743-5"},{"key":"318_CR3","doi-asserted-by":"crossref","unstructured":"Amin, R, and Biswas, GP, Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wirel. Pers. Commun., 1\u201324, 2015. doi: 10.1007\/s11277-015-2616-7 .","DOI":"10.1007\/s11277-015-2616-7"},{"key":"318_CR4","doi-asserted-by":"crossref","unstructured":"Amin, R, and Biswas, GP, An improved rsa based user authentication and session key agreement protocol usable in tmis. J. Med. Syst. 39(8):79, 2015. doi: 10.1007\/s10916-015-0262-y .","DOI":"10.1007\/s10916-015-0262-y"},{"key":"318_CR5","doi-asserted-by":"crossref","unstructured":"Amin, R, and Biswas, GP, A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis. J. Med. Syst. 39(3):33, 2015. doi: 10.1007\/s10916-015-0217-3 .","DOI":"10.1007\/s10916-015-0217-3"},{"key":"318_CR6","doi-asserted-by":"crossref","unstructured":"Amin, R, and Biswas, GP, Remote access control mechanism using rabin public key cryptosystem. In: Information Systems Design and Intelligent Applications, Advances in Intelligent Systems and Computing. Vol. 339, pp. 525\u2013533. Springer, India. 2015. doi: 10.1007\/978-81-322-2250-7_52 .","DOI":"10.1007\/978-81-322-2250-7_52"},{"key":"318_CR7","doi-asserted-by":"crossref","unstructured":"Amin, R, and Biswas, GP, A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw., 2015. doi: 10.1016\/j.adhoc.2015.05.020 .","DOI":"10.1016\/j.adhoc.2015.05.020"},{"issue":"8","key":"318_CR8","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/s10916-015-0258-7","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R, and Biswas, GP, A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8):78, 2015. doi: 10.1007\/s10916-015-0258-7 .","journal-title":"J. Med. Syst."},{"key":"318_CR9","doi-asserted-by":"crossref","unstructured":"Amin, R, Islam, SH, Biswas, GP, Khan, MK: An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. In: Cyber Situational Awareness, 2015 International Conference on Data Analytics and Assessment (CyberSA). pp. 1\u20137, 2015, doi: 10.1109\/CyberSA.2015.7166114","DOI":"10.1109\/CyberSA.2015.7166114"},{"issue":"13","key":"318_CR10","first-page":"37","volume":"75","author":"R Amin","year":"2013","unstructured":"Amin, R, Maitra, T, Rana, SP, An improvement of Wang et. al.\u2019s remote user authentication scheme against smart card security breach. Int. J. Comput. Appl. 75(13):37\u201342, 2013.","journal-title":"Int. J. Comput. Appl."},{"key":"318_CR11","doi-asserted-by":"crossref","unstructured":"An, Y, Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. J. Biomed. Biotechnol. 6, 2012. doi: 10.1155\/2012\/519723 .","DOI":"10.1155\/2012\/519723"},{"key":"318_CR12","unstructured":"An, YH: Security improvements of dynamic id-based remote user authentication scheme with session key agreement. In: 2013 15th International Conference on Advanced Communication Technology (ICACT), pp. 1072\u20131076 (2013)"},{"key":"318_CR13","doi-asserted-by":"crossref","unstructured":"Arshad, H, and Nikooghadam, M, Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12):1\u201312, 2014. doi: 10.1007\/s10916-014-0136-8 .","DOI":"10.1007\/s10916-014-0136-8"},{"key":"318_CR14","doi-asserted-by":"crossref","unstructured":"Burrows, M, Abadi, M, Needham, R, A logic of authentication. ACM Trans. Comput. Syst. 8(1):18\u201336, 1990. doi: 10.1145\/77648.77649 10.1145\/77648.77649 .","DOI":"10.1145\/77648.77649"},{"issue":"11","key":"318_CR15","doi-asserted-by":"crossref","first-page":"3430","DOI":"10.1002\/dac.2552","volume":"27","author":"YF Chang","year":"2014","unstructured":"Chang, YF, Tai, WL, Chang, HC, Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst. 27(11):3430\u20133440, 2014. doi: 10.1002\/dac.2552 .","journal-title":"Int. J. Commun. Syst."},{"issue":"2","key":"318_CR16","doi-asserted-by":"crossref","first-page":"9902","DOI":"10.1007\/s10916-012-9902-7","volume":"37","author":"YF Chang","year":"2013","unstructured":"Chang, YF, Yu, SH, Shiao, DR, A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(2):9902, 2013. doi: 10.1007\/s10916-012-9902-7 .","journal-title":"J. Med. Syst."},{"key":"318_CR17","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, SA, Farash, MS, Naqvi, H, Kumari, S, Khan, MK, An enhanced privacy preserving remote user authentication scheme with provable security. Security and Communication Networks, 2015. doi: 10.1002\/sec.1299 .","journal-title":"Security and Communication Networks"},{"issue":"6","key":"318_CR18","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/s10916-015-0244-0","volume":"39","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, SA, Naqvi, H, Shon, T, Sher, M, Farash, MS, Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J. Med. Syst. 39(6):66, 2015. doi: 10.1007\/s10916-015-0244-0 .","journal-title":"J. Med. Syst."},{"issue":"5","key":"318_CR19","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1007\/s11042-014-2283-9","volume":"74","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, SA, Uddin, N, Sher, M, Ghani, A, Naqvi, H, Irshad, A, An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimedia Tools and Applications 74(5):1711\u20131723, 2015. doi: 10.1007\/s11042-014-2283-9 .","journal-title":"Multimedia Tools and Applications"},{"key":"318_CR20","unstructured":"Chou, JS, Huang, CH, Huang, YS, Chen4, Y: Efficient two-pass anonymous identity authentication using smart card. Cryptology ePrint Archive, Report 2013\/402 (2013)"},{"issue":"3","key":"318_CR21","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"A Das","year":"2011","unstructured":"Das, A, Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. Inf. Secur., IET 5(3):145\u2013151, 2011. doi: 10.1049\/iet-ifs.2010.0125 .","journal-title":"Inf. Secur., IET"},{"issue":"2","key":"318_CR22","doi-asserted-by":"crossref","first-page":"13","DOI":"10.5121\/ijnsa.2011.3202","volume":"3","author":"AK Das","year":"2011","unstructured":"Das, AK, Cryptanalysis and further improvement of a biometric-based remote user authentication scheme using smart cards. International Journal of Network Security and Its Applications 3(2):13\u201328, 2011.","journal-title":"International Journal of Network Security and Its Applications"},{"key":"318_CR23","doi-asserted-by":"crossref","first-page":"9948","DOI":"10.1007\/s10916-013-9948-1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, AK, and Goswami, A, A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9948, 2013. doi: 10.1007\/s10916-013-9948-1 10.1007\/s10916-013-9948-1 .","journal-title":"J. Med. Syst."},{"issue":"2","key":"318_CR24","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D, and Yao, AC, On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"318_CR25","author":"MS Farash","year":"2015","unstructured":"Farash, MS, Chaudhry, SA, Heydari, M, Sajad Sadough, SM, Kumari, S, Khan, MK, A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst., 2015. doi: 10.1002\/dac.3019 .","journal-title":"Int. J. Commun. Syst."},{"issue":"1","key":"318_CR26","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"E98B","author":"Z Fu","year":"2015","unstructured":"Fu, Z, Sun, X, Liu, Q, Zhou, L, Shu, J, Achieving efficient cloud search services: Multikeyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98B(1):190\u2013200, 2015.","journal-title":"IEICE Trans. Commun."},{"issue":"1","key":"318_CR27","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2014","unstructured":"Giri, D, Maitra, T, Amin, R, Srivastava, PD, An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1):145, 2014. doi: 10.1007\/s10916-014-0145-7 .","journal-title":"J. Med. Syst."},{"issue":"6","key":"318_CR28","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P, Wang, J, Li, B, Lee, S, A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929\u2013936, 2014.","journal-title":"J. Internet Technol."},{"issue":"5","key":"318_CR29","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1007\/s11767-014-4002-0","volume":"31","author":"SH Islam","year":"2014","unstructured":"Islam, S H, and Biswas, GP, Dynamic id-based remote user mutual authentication scheme with smartcard using elliptic curve cryptography. J. Electron. (China) 31(5):473\u2013488, 2014. doi: 10.1007\/s11767-014-4002-0 .","journal-title":"J. Electron. (China)"},{"issue":"3","key":"318_CR30","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"D He","year":"2012","unstructured":"He, D, Jianhua, C, Rui, Z, A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"3\u20134","key":"318_CR31","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1504\/IJESDF.2013.058650","volume":"5","author":"D He","year":"2013","unstructured":"He, D, and Khan, MK, Cryptanalysis of a key agreement protocol based on chaotic hash. Int. J. Electron. Secur. Digit. Forensic. 5(3\u20134):172\u2013177, 2013. doi: 10.1504\/IJESDF.2013.058650 .","journal-title":"Int. J. Electron. Secur. Digit. Forensic."},{"issue":"1\u20132","key":"318_CR32","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1504\/IJAHUC.2015.067774","volume":"18","author":"D He","year":"2015","unstructured":"He, D, Khan, MK, Kumar, N, A new handover authentication protocol based on bilinear pairing functions for wireless networks. Int. J. Ad Hoc Ubiquit. Comput. 18(1\u20132):67\u201374, 2015. doi: 10.1504\/IJAHUC.2015.067774 .","journal-title":"Int. J. Ad Hoc Ubiquit. Comput."},{"issue":"1","key":"318_CR33","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He, D, Kumar, N, Chen, J, Lee, CC, Chilamkurti, N, Yeo, SS, Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems. 21(1):49\u201360, 2015. doi: 10.1007\/s00530-013-0346-9 .","journal-title":"Multimedia Systems."},{"key":"318_CR34","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"D He","year":"2015","unstructured":"He, D, Kumar, N, Chilamkurti, N, A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci 321: 263\u2013277, 2015. doi: 10.1016\/j.ins.2015.02.010 .","journal-title":"Inf. Sci"},{"issue":"10","key":"318_CR35","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/s10916-014-0116-z","volume":"38","author":"D He","year":"2014","unstructured":"He, D, Kumar, N, Chilamkurti, N, Lee, JH, Lightweight ecc based rfid authentication integrated with an id verifier transfer protocol. J. Med. Syst. 38(10):116, 2014. doi: 10.1007\/s10916-014-0116-z 10.1007\/s10916-014-0116-z .","journal-title":"J. Med. Syst."},{"issue":"1","key":"318_CR36","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He, D, Kumar, N, Lee, JH, Sherratt, R, Enhanced three-factor security protocol for consumer usb mass storage devices. IEEE Trans. Consum. Electron. 60(1):30\u201337, 2014. doi: 10.1109\/TCE.2014.6780922 .","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"318_CR37","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"53","author":"D He","year":"2015","unstructured":"He, D, and Zeadally, S, Authentication protocol for an ambient assisted living system. Commun. Mag. IEEE 53(1):71\u201377, 2015. doi: 10.1109\/MCOM.2015.7010518 .","journal-title":"Commun. Mag. IEEE"},{"key":"318_CR38","doi-asserted-by":"crossref","unstructured":"Islam, S H, Khan, MK, Obaidat, MS, Muhaya, F.T.B, Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps. Wirel. Pers. Commun.,1\u201322, 2015. doi: 10.1007\/s11277-015-2542-8 .","DOI":"10.1007\/s11277-015-2542-8"},{"key":"318_CR39","doi-asserted-by":"crossref","unstructured":"Islam, SH, Design and analysis of an improved smartcard based remote user password authentication scheme. Int. J. Commun. Syst., 2014. doi: 10.1002\/dac.2793 .","DOI":"10.1002\/dac.2793"},{"issue":"3","key":"318_CR40","doi-asserted-by":"crossref","first-page":"1975","DOI":"10.1007\/s11277-014-1968-8","volume":"79","author":"SH Islam","year":"2014","unstructured":"Islam, SH, A provably secure id-based mutual authentication and key agreement scheme for mobile multi-server environment without esl attack. Wirel. Pers. Commun. 79(3):1975\u20131991, 2014. doi: 10.1007\/s11277-014-1968-8 .","journal-title":"Wirel. Pers. Commun."},{"key":"318_CR41","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.ins.2015.03.050","volume":"312","author":"SH Islam","year":"2015","unstructured":"Islam, SH, Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf. Sci. 312:104\u2013130, 2015. doi: 10.1016\/j.ins.2015.03.050 .","journal-title":"Inf. Sci."},{"issue":"11","key":"318_CR42","doi-asserted-by":"crossref","first-page":"1892","DOI":"10.1016\/j.jss.2011.06.061","volume":"84","author":"SH Islam","year":"2011","unstructured":"Islam, SH, and Biswas, GP, A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892\u20131898, 2011.","journal-title":"J. Syst. Softw."},{"issue":"1112","key":"318_CR43","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1016\/j.mcm.2011.07.001","volume":"57","author":"SH Islam","year":"2013","unstructured":"Islam, SH, and Biswas, GP, Design of improved password authentication and update scheme based on elliptic curve cryptography. Math. Comput. Model. 57(1112):2703\u20132717, 2013. doi: 10.1016\/j.mcm.2011.07.001 . Information System Security and Performance Modeling and Simulation for Future Mobile Networks.","journal-title":"Math. Comput. Model."},{"issue":"10","key":"318_CR44","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s10916-014-0135-9","volume":"38","author":"SH Islam","year":"2014","unstructured":"Islam, SH, and Khan, MK, Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014. doi: 10.1007\/s10916-014-0135-9 .","journal-title":"J. Med. Syst."},{"issue":"11","key":"318_CR45","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jina","year":"2004","unstructured":"Jina, A.T.B, Ling, D.N.C, Goh, A, Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11):2245\u20132255, 2004.","journal-title":"Pattern Recogn."},{"issue":"11","key":"318_CR46","doi-asserted-by":"crossref","first-page":"1260","DOI":"10.1002\/sec.573","volume":"5","author":"MK Khan","year":"2012","unstructured":"Khan, MK, and He, D, A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Sec. and Commun. Netw. 5(11):1260\u20131266, 2012. doi: 10.1002\/sec.573 .","journal-title":"Sec. and Commun. Netw."},{"key":"318_CR47","doi-asserted-by":"crossref","unstructured":"Khan, MK, and Kumari, S, An improved biometrics-based remote user authentication scheme with user anonymity. BioMed Res. Int.,9, 2013. doi: 10.1155\/2013\/491289 .","DOI":"10.1155\/2013\/491289"},{"key":"318_CR48","doi-asserted-by":"crossref","unstructured":"Khan, MK, and Zhang, J, Improving the security of a flexible biometrics remote user authentication scheme. Comput. Stand. Interfaces. 29(1):82\u201385, 2007. doi: 10.1016\/j.csi.2006.01.002 .","DOI":"10.1016\/j.csi.2006.01.002"},{"key":"318_CR49","doi-asserted-by":"crossref","unstructured":"Kocher, P, Jaffe, J, Jun, B: Differential power analysis. In: Advances in Cryptology CRYPTO 99, Lecture Notes in Computer Science, Vol. 1666, pp. 388\u2013397 (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"318_CR50","doi-asserted-by":"crossref","unstructured":"Kumari, S, and Khan, MK, More secure smart card-based remote user password authentication scheme with user anonymity. Secur. Commun. Netw. 7(11):2039\u20132053, 2014. doi: 10.1002\/sec.916 .","DOI":"10.1002\/sec.916"},{"key":"318_CR51","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.adhoc.2014.11.018","volume":"27","author":"S Kumari","year":"2015","unstructured":"Kumari, S, Khan, MK, Atiquzzaman, M, User authentication schemes for wireless sensor networks: A review. Ad Hoc Netw. 27:159\u2013194, 2015. doi: 10.1016\/j.adhoc.2014.11.018 .","journal-title":"Ad Hoc Netw."},{"issue":"6","key":"318_CR52","doi-asserted-by":"crossref","first-page":"1997","DOI":"10.1016\/j.compeleceng.2014.05.007","volume":"40","author":"S Kumari","year":"2014","unstructured":"Kumari, S, Khan, MK, Li, X, An improved remote user authentication scheme with key agreement. Comput. Electr. Eng. 40(6):1997\u20132012, 2014. doi: 10.1016\/j.compeleceng.2014.05.007 .","journal-title":"Comput. Electr. Eng."},{"issue":"10","key":"318_CR53","first-page":"609","volume":"27","author":"S Kumari","year":"2014","unstructured":"Kumari, S, Khan, MK, Li, X, Wu, F, Design of a user anonymous password authentication scheme without smart card. Int. J. Commun. Syst. 27(10):609\u2013618, 2014. doi: 10.1002\/dac.2853 .","journal-title":"Int. J. Commun. Syst."},{"issue":"12","key":"318_CR54","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"JK Lee","year":"2002","unstructured":"Lee, JK, Ryu, SR, Yoo, KY, Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 38(12):554\u2013555, 2002.","journal-title":"Electron. Lett."},{"issue":"1","key":"318_CR55","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, CT, and Hwang, MS, An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1\u20135, 2010.","journal-title":"J. Netw. Comput. Appl."},{"issue":"12","key":"318_CR56","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","volume":"58","author":"X Li","year":"2013","unstructured":"Li, X, Ma, J, Wang, W, Xiong, Y, Zhang, J, A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(12):85\u201395, 2013. doi: 10.1016\/j.mcm.2012.06.033 .","journal-title":"Math. Comput. Model."},{"issue":"5","key":"318_CR57","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X, Niu, J, Khan, MK, Liao, J, An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365\u20131371, 2013. doi: 10.1016\/j.jnca.2013.02.034 .","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"318_CR58","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X, Niu, JW, Ma, J, Wang, WD, Liu, CL, Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1):73\u201379, 2011.","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"318_CR59","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li, X, Xiong, Y, Ma, J, Wang, W, An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2):763\u2013769, 2012. doi: 10.1016\/j.jnca.2011.11.009 .","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"318_CR60","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"CH Lin","year":"2004","unstructured":"Lin, CH, and Lai, YY, A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces 27(1):19\u201323, 2004. doi: 10.1016\/j.csi.2004.03.003 .","journal-title":"Computer Standards & Interfaces"},{"issue":"3","key":"318_CR61","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A, and Nanni, L, An improved biohashing for human authentication. Pattern Recogn. 40(3): 1057\u20131065, 2007.","journal-title":"Pattern Recogn."},{"issue":"5","key":"318_CR62","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, TS, Dabbish, EA, Sloan, RH, Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"318_CR63","unstructured":"Mishra, D: A study on id-based authentication schemes for telecare medical information system. CoRR arXiv: http:\/\/arxiv.org\/abs\/1311.0151 (2013)"},{"issue":"6","key":"318_CR64","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D, Mukhopadhyay, S, Chaturvedi, A, Kumari, S, Khan, MK, Cryptanalysis and improvement of yan et al.\u2019s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6): 24, 2014. doi: 10.1007\/s10916-014-0024-2 .","journal-title":"J. Med. Syst."},{"issue":"5","key":"318_CR65","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10916-014-0041-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D, Mukhopadhyay, S, Kumari, S, Khan, M, Chaturvedi, A, Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5):41, 2014. doi: 10.1007\/s10916-014-0041-1 .","journal-title":"J. Med. Syst."},{"issue":"2","key":"318_CR66","first-page":"317","volume":"16","author":"Y Ren","year":"2014","unstructured":"Ren, Y, Shen, J, Wang, J, Han, J, Lee, S, Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2):317\u2013323, 2014.","journal-title":"J. Internet Technol."},{"key":"318_CR67","unstructured":"Tool, AW: http:\/\/www.avispa-project.org\/web-interface\/expert.php\/ use on febraury (2015)"},{"issue":"5","key":"318_CR68","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/j.csi.2006.11.005","volume":"29","author":"XM Wang","year":"2007","unstructured":"Wang, XM, Zhang, WF, Zhang, JS, Khan, MK, Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Computer Standards & Interfaces 29(5):507\u2013512, 2007. doi: 10.1016\/j.csi.2006.11.005 .","journal-title":"Computer Standards & Interfaces"},{"issue":"4","key":"318_CR69","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"Y Yan Wang","year":"2009","unstructured":"Yan Wang, Y, Yong Liu, J, Xia Xiao, F, Dan, J, A more efficient and secure dynamic id-based remote user authentication scheme. Comput. Commun. 32(4):583\u2013585, 2009. doi: 10.1016\/j.comcom.2008.11.008 .","journal-title":"Comput. Commun."},{"issue":"6","key":"318_CR70","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J, Hu, X, Liu, W, An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"2","key":"318_CR71","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.compeleceng.2011.11.010","volume":"38","author":"F Wen","year":"2012","unstructured":"Wen, F, and Li, X, An improved dynamic id-based remote user authentication with key agreement scheme. Comput. Electr. Eng. 38(2):381\u2013387, 2012. doi: 10.1016\/j.compeleceng.2011.11.010 .","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"318_CR72","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, ZY, Lee, YC, Lai, F, Lee, HC, Chung, Y, A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"318_CR73","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"X Xu","year":"2014","unstructured":"Xu, X, Zhu, P, Wen, Q, Jin, Z, Zhang, H, He, L, A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(6):24, 2014. doi: 10.1007\/s10916-013-9994-8. .","journal-title":"J. Med. Syst."},{"issue":"5","key":"318_CR74","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10916-015-0233-3","volume":"39","author":"L Zhang","year":"2015","unstructured":"Zhang, L, and Zhu, S, Robust ecc-based authenticated key agreement scheme with privacy protection for telecare medicine information systems. J. Med. Syst. 39(5):49, 2015. doi: 10.1007\/s10916-015-0233-3 .","journal-title":"J. Med. Syst."},{"issue":"6","key":"318_CR75","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z, An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833\u20133838, 2012. doi: 10.1007\/s10916-012-9856-9 .","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0318-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0318-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0318-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T23:33:47Z","timestamp":1718062427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0318-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,5]]},"references-count":75,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["318"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0318-z","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,5]]},"article-number":"140"}}