{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:55:00Z","timestamp":1775040900286,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,9,23]],"date-time":"2015-09-23T00:00:00Z","timestamp":1442966400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Deanship of Scientific Research at King Saud University","award":["PRG-1436-16"],"award-info":[{"award-number":["PRG-1436-16"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s10916-015-0335-y","type":"journal-article","created":{"date-parts":[[2015,9,23]],"date-time":"2015-09-23T09:00:10Z","timestamp":1442998810000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9321-6956","authenticated-orcid":false,"given":"Shehzad Ashraf","family":"Chaudhry","sequence":"first","affiliation":[]},{"given":"Khalid","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Husnain","family":"Naqvi","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,23]]},"reference":[{"key":"335_CR1","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1), 2013. doi: 10.1007\/s10916-012-9897-0 .","DOI":"10.1007\/s10916-012-9897-0"},{"issue":"6","key":"335_CR2","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012. doi: 10.1007\/s10916-012-9835-1 .","journal-title":"J. Med. Syst."},{"issue":"4","key":"335_CR3","doi-asserted-by":"crossref","first-page":"2325","DOI":"10.1007\/s10916-011-9700-7","volume":"36","author":"S Wu","year":"2012","unstructured":"Wu, S., and Chen, K., An efficient key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst. 36(4):2325\u20132337, 2012.","journal-title":"J. Med. Syst."},{"issue":"11","key":"335_CR4","doi-asserted-by":"crossref","first-page":"3967","DOI":"10.1007\/s11042-013-1807-z","volume":"74","author":"A Irshad","year":"2015","unstructured":"Irshad, A., Sher, M., Rehman, E., Ch, S. A., Hassan, M. U., and Ghani, A., A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools and Applications 74(11): 3967\u20133984, 2015. doi: 10.1007\/s11042-013-1807-z .","journal-title":"Multimedia Tools and Applications"},{"key":"335_CR5","doi-asserted-by":"crossref","unstructured":"Mehmood, Z., uddin, N., Ch, S. A., Nasar, W., and Ghani, A., An efficient key agreement with rekeying for secured body sensor networks. In: Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on, IEEE, pp. 164\u2013167, 2012.","DOI":"10.1109\/ICDIPC.2012.6257295"},{"issue":"3","key":"335_CR6","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.comcom.2009.10.005","volume":"33","author":"Y-P Liao","year":"2010","unstructured":"Liao, Y.-P., and Wang, S.-S., A new secure password authenticated key agreement scheme for sip using self-certified public keys on elliptic curves. Comput. Commun. 33(3):372\u2013380, 2010.","journal-title":"Comput. Commun."},{"issue":"1","key":"335_CR7","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1049\/iet-com.2014.1082","volume":"9","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, S. A., Comment on \u2018robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications\u2019. IET Commun 9(1):1034\u20131034, 2015.","journal-title":"IET Commun"},{"key":"335_CR8","doi-asserted-by":"crossref","unstructured":"Ul Amin, N., Asad, M., Din, N., and Ch, S. A., An authenticated key agreement with rekeying for secured body sensor networks based on hybrid cryptosystem. In: Networking, Sensing and Control (ICNSC), 2012 9th IEEE International Conference on, IEEE, pp. 118\u2013121, 2012.","DOI":"10.1109\/ICNSC.2012.6204902"},{"issue":"3","key":"335_CR9","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.inffus.2011.01.001","volume":"13","author":"H Debiao","year":"2012","unstructured":"Debiao, H., Jianhua, C., and Jin, H., An id-based client authentication with key agreement protocol for mobile client\u2013server environment on ecc with provable security. Information Fusion 13(3):223\u2013230, 2012.","journal-title":"Information Fusion"},{"issue":"11","key":"335_CR10","doi-asserted-by":"crossref","first-page":"1892","DOI":"10.1016\/j.jss.2011.06.061","volume":"84","author":"S Islam","year":"2011","unstructured":"Islam, S., and Biswas, G., A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892\u20131898, 2011.","journal-title":"J. Syst. Softw."},{"key":"335_CR11","doi-asserted-by":"crossref","unstructured":"Islam, S., and Khan, M., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10), 2014. doi: 10.1007\/s10916-014-0135-9 .","DOI":"10.1007\/s10916-014-0135-9"},{"key":"335_CR12","doi-asserted-by":"crossref","unstructured":"Farash, M. S., Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications,1\u201310, 2014. doi: 10.1007\/s12083-014-0315-x .","DOI":"10.1007\/s12083-014-0315-x"},{"issue":"1","key":"335_CR13","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/s11227-014-1170-5","volume":"69","author":"MS Farash","year":"2014","unstructured":"Farash, M. S., and Attari, M. A., A secure and efficient identity-based authenticated key exchange protocol for mobile client\u2013server networks. J. Supercomput. 69(1):395\u2013411, 2014.","journal-title":"J. Supercomput."},{"key":"335_CR14","doi-asserted-by":"crossref","unstructured":"Giri, D., Maitra, T., Amin, R., and Srivastava, P., An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1), 2015. doi: 10.1007\/s10916-014-0145-7 .","DOI":"10.1007\/s10916-014-0145-7"},{"issue":"2","key":"335_CR15","doi-asserted-by":"crossref","first-page":"143","DOI":"10.5755\/j01.itc.43.2.3790","volume":"43","author":"MS Farash","year":"2014","unstructured":"Farash, M. S., and Attari, M. A., An enhanced and secure three-party password-based authenticated key exchange protocol without using server\u2019s public-keys and symmetric cryptosystems. Information Technology And Control 43 (2):143\u2013150, 2014.","journal-title":"Information Technology And Control"},{"key":"335_CR16","doi-asserted-by":"crossref","unstructured":"Farash, M. S., An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int. J. Commun. Syst., 2014. doi: 10.1002\/dac.2879 .","DOI":"10.1002\/dac.2879"},{"issue":"1-2","key":"335_CR17","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s11071-014-1304-6","volume":"77","author":"MS Farash","year":"2014","unstructured":"Farash, M. S., and Attari, M. A., An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps. Nonlinear Dyn. 77(1-2):399\u2013411, 2014.","journal-title":"Nonlinear Dyn."},{"issue":"8","key":"335_CR18","doi-asserted-by":"crossref","first-page":"1210","DOI":"10.1002\/sec.834","volume":"7","author":"A Irshad","year":"2014","unstructured":"Irshad, A., Sher, M., Faisal, M. S., Ghani, A., Ul Hassan, M., and Ch, S. A., A secure authentication scheme for session initiation protocol by using ecc on the basis of the tang and liu scheme. Secur. Commun. Netw. 7(8):1210\u20131218, 2014. doi: 10.1002\/sec.834 .","journal-title":"Secur. Commun. Netw."},{"key":"335_CR19","doi-asserted-by":"crossref","unstructured":"Farash, M. S., Chaudhry, S. A., Heydari, M., Sajad Sadough, S. M., Kumari, S., and Khan, M. K., A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst., 2015. doi: 10.1002\/dac.3019 .","DOI":"10.1002\/dac.3019"},{"issue":"5","key":"335_CR20","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1007\/s11042-014-2283-9","volume":"74","author":"SA Ch","year":"2015","unstructured":"Ch, S. A., Uddin, N., Sher, M., Ghani, A., Naqvi, H., and Irshad, A., An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimedia Tools and Applications 74(5):1711\u20131723, 2015. doi: 10.1007\/s11042-014-2283-9 .","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"335_CR21","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"Z-Y Wu","year":"2012","unstructured":"Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012. doi: 10.1007\/s10916-010-9614-9 .","journal-title":"J. Med. Syst."},{"issue":"3","key":"335_CR22","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"H Debiao","year":"2012","unstructured":"Debiao, H., Jianhua, C., and Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012. doi: 10.1007\/s10916-011-9658-5 .","journal-title":"J. Med. Syst."},{"issue":"6","key":"335_CR23","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833\u20133838, 2012. doi: 10.1007\/s10916-012-9856-9 .","journal-title":"J. Med. Syst."},{"issue":"5","key":"335_CR24","first-page":"1","volume":"36","author":"F Wen","year":"2015","unstructured":"Wen, F., and Guo, D., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 36(5):1\u201311, 2015. doi: 10.1007\/s10916-015-0244-0 .","journal-title":"J. Med. Syst."},{"issue":"1","key":"335_CR25","first-page":"1","volume":"38","author":"X Xu","year":"2013","unstructured":"Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., and He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1\u20137, 2013.","journal-title":"J. Med. Syst."},{"key":"335_CR26","doi-asserted-by":"crossref","unstructured":"Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., and Farash, M. S., Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J. Med. Syst. 39(6).","DOI":"10.1007\/s10916-015-0244-0"},{"key":"335_CR27","doi-asserted-by":"crossref","unstructured":"Kumari, S., Khan, M. K., and Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37(4), 2013. doi: 10.1007\/s10916-013-9952-5 .","DOI":"10.1007\/s10916-013-9952-5"},{"issue":"2","key":"335_CR28","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1002\/sec.791","volume":"7","author":"MK Khan","year":"2014","unstructured":"Khan, M. K., and Kumari, S., Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Secur. Commun. Netw. 7(2):399\u2013408, 2014. doi: 10.1002\/sec.791 .","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"335_CR29","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"335_CR30","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. In: Advances in Cryptology CRYPTO 99, Springer, pp. 388\u2013397 (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"1","key":"335_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C-T Li","year":"2010","unstructured":"Li, C.-T., and Hwang, M.-S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1\u20135, 2010.","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"335_CR32","first-page":"253","volume":"4","author":"D He","year":"2014","unstructured":"He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 4(1):253\u2013264, 2014.","journal-title":"IEEE Syst. J."},{"issue":"6","key":"335_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., and Khan, M. K., Cryptanalysis and improvement of Yan et al.\u2019s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38 (6):1\u201312, 2014.","journal-title":"J. Med. Syst."},{"issue":"11","key":"335_CR34","first-page":"1","volume":"38","author":"X Li","year":"2014","unstructured":"Li, X., Wen, Q., Li, W., Zhang, H., and Jin, Z., Secure privacy-preserving biometric authentication scheme for telecare medicine information systems. J. Med. Syst. 38(11):1\u20138, 2014.","journal-title":"J. Med. Syst."},{"issue":"3","key":"335_CR35","doi-asserted-by":"crossref","first-page":"191","DOI":"10.4103\/0256-4602.50703","volume":"26","author":"MK Khan","year":"2009","unstructured":"Khan, M. K., Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world. IETE Tech. Rev. 26(3):191\u2013195, 2009.","journal-title":"IETE Tech. Rev."},{"key":"335_CR36","doi-asserted-by":"crossref","unstructured":"Khan, M. K., and Zhang, J., An efficient and practical fingerprint-based remote user authentication scheme with smart cards. In: Information Security Practice and Experience, Springer, pp. 260\u2013268 (2006)","DOI":"10.1007\/11689522_24"},{"issue":"8","key":"335_CR37","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G., A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8):1\u201319, 2015.","journal-title":"J. Med. Syst."},{"issue":"8","key":"335_CR38","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G., An improved RSA based user authentication and session key agreement protocol usable in TMIS. J. Med. Syst. 39(8):1\u201314, 2015.","journal-title":"J. Med. Syst."},{"issue":"3","key":"335_CR39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0217-3","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G., A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. J. Med. Syst. 39(3):1\u201317, 2015.","journal-title":"J. Med. Syst."},{"issue":"5","key":"335_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9964-1","volume":"37","author":"AK Awasthi","year":"2013","unstructured":"Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1\u20134, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"335_CR41","first-page":"1","volume":"38","author":"Z Tan","year":"2014","unstructured":"Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 38(3):1\u20139, 2014.","journal-title":"J. Med. Syst."},{"issue":"12","key":"335_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0136-8","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12):1\u201312, 2014.","journal-title":"J. Med. Syst."},{"issue":"3","key":"335_CR43","first-page":"1","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Peng, H., and Yang, Y., An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3):1\u20138, 2015.","journal-title":"J. Med. Syst."},{"issue":"11","key":"335_CR44","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin, A. T. B., Ling, D. N. C., and Goh, A., Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11):2245\u20132255, 2004.","journal-title":"Pattern Recogn."},{"issue":"3","key":"335_CR45","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recogn. 40(3): 1057\u20131065 , 2007.","journal-title":"Pattern Recogn."},{"issue":"11","key":"335_CR46","doi-asserted-by":"crossref","first-page":"1860","DOI":"10.1002\/sec.900","volume":"7","author":"L Leng","year":"2014","unstructured":"Leng, L., Teoh, A. B. J., Li, M., and Khan, M. K., A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur. Commun. Netw. 7(11):1860\u20131871, 2014.","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"335_CR47","doi-asserted-by":"crossref","first-page":"2290","DOI":"10.1016\/j.patcog.2015.01.021","volume":"48","author":"L Leng","year":"2015","unstructured":"Leng, L., and Teoh, A. B. J., Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn. 48(7):2290\u20132303, 2015.","journal-title":"Pattern Recogn."},{"issue":"5","key":"335_CR48","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0041-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., and Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5):1\u201311, 2014.","journal-title":"J. Med. Syst."},{"key":"335_CR49","first-page":"203","volume-title":"Advances in Cryptology, CRYPTO 2008, Vol. 5157 of Lecture Notes in Computer Science","author":"T Eisenbarth","year":"2008","unstructured":"Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., and Shalmani, M., On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Wagner, D. (Ed.) Advances in Cryptology, CRYPTO 2008, Vol. 5157 of Lecture Notes in Computer Science, pp. 203\u2013220. Berlin Heidelberg: Springer, 2008. doi: 10.1007\/978-3-540-85174-5_12"},{"key":"335_CR50","doi-asserted-by":"crossref","unstructured":"Chaudhry, S. A., Naqvi, H., Sher, M., Farash, M. S., and ul Hassan, M., An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Networking and Applications, 2015. doi: 10.1007\/s12083-015-0400-9 .","DOI":"10.1007\/s12083-015-0400-9"},{"key":"335_CR51","doi-asserted-by":"crossref","unstructured":"Kumari, S., Chaudhry, S. A., Wu, F., Li, X., Farash, M. S., and Khan, M. K., An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Networking and Applications, 2015. doi: 10.1007\/s12083-015-0409-0 .","DOI":"10.1007\/s12083-015-0409-0"},{"issue":"2","key":"335_CR52","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A. C., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"8","key":"335_CR53","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/LCOMM.2006.1665116","volume":"10","author":"X Cao","year":"2006","unstructured":"Cao, X., and Zhong, S., Breaking a remote user authentication scheme for multi-server architecture. IEEE Commun. Lett. 10(8):580\u2013581, 2006.","journal-title":"IEEE Commun. Lett."},{"key":"335_CR54","doi-asserted-by":"crossref","unstructured":"Abadi, M., Blanchet, B., and Comon-Lundh, H., Models and proofs of protocol security: A progress report. In: Computer Aided Verification, Springer, pp. 35\u201349, 2009.","DOI":"10.1007\/978-3-642-02658-4_5"},{"key":"335_CR55","doi-asserted-by":"crossref","unstructured":"Chaudhry, S. A., Farash, M. S., Naqvi, H., and Sher, M., A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res., 1\u201327, 2015. doi: 10.1007\/s10660-015-9192-5 .","DOI":"10.1007\/s10660-015-9192-5"},{"key":"335_CR56","doi-asserted-by":"crossref","unstructured":"Chaudhry, S. A., Farash, M. S., Naqvi, H., Kumari, S., and Khan, M. K., An enhanced privacy preserving remote user authentication scheme with provable security. Secur. Commun. Netw., 1\u201313, 2015. doi: 10.1002\/sec.1299 .","DOI":"10.1002\/sec.1299"},{"issue":"7","key":"335_CR57","doi-asserted-by":"crossref","first-page":"e102747","DOI":"10.1371\/journal.pone.0102747","volume":"9","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Hu, B., Dong, N., and Wong, D. S., Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems. PloS one 9(7):e102747, 2014.","journal-title":"PloS one"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0335-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0335-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0335-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T18:13:04Z","timestamp":1567188784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0335-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,23]]},"references-count":57,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["335"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0335-y","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,23]]},"article-number":"175"}}