{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T23:32:57Z","timestamp":1775086377558,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,10,3]],"date-time":"2015-10-03T00:00:00Z","timestamp":1443830400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002383","name":"King Saud University","doi-asserted-by":"publisher","award":["PRG-1436-16"],"award-info":[{"award-number":["PRG-1436-16"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006464","name":"BITS Pilani","doi-asserted-by":"crossref","award":["OPERA"],"award-info":[{"award-number":["OPERA"]}],"id":[{"id":"10.13039\/501100006464","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s10916-015-0351-y","type":"journal-article","created":{"date-parts":[[2015,10,3]],"date-time":"2015-10-03T08:21:57Z","timestamp":1443860517000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":85,"title":["An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography"],"prefix":"10.1007","volume":"39","author":[{"given":"Ruhul","family":"Amin","sequence":"first","affiliation":[]},{"given":"SK Hafizul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,3]]},"reference":[{"key":"351_CR1","doi-asserted-by":"crossref","unstructured":"Amin, R., and Biswas, G. P., Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment. Wirel. Pers. Commun. 1\u201324, 2015. doi: 10.1007\/s11277-015-2616-7 .","DOI":"10.1007\/s11277-015-2616-7"},{"issue":"8","key":"351_CR2","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s10916-015-0262-y","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G. P., An improved rsa based user authentication and session key agreement protocol usable in tmis. J. Med. Syst. 39(8):79, 2015. doi: 10.1007\/s10916-015-0262-y .","journal-title":"J. Med. Syst."},{"issue":"3","key":"351_CR3","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s10916-015-0217-3","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G. P., A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis. J. Med. Syst. 39(3):33, 2015. doi: 10.1007\/s10916-015-0217-3 .","journal-title":"J. Med. Syst."},{"key":"351_CR4","doi-asserted-by":"crossref","unstructured":"Amin, R., and Biswas, G. P.: Remote access control mechanism using rabin public key cryptosystem. In: Information Systems Design and Intelligent Applications, Advances in Intelligent Systems and Computing, vol. 339, pp. 525\u2013533. India: Springer, 2015. doi: 10.1007\/978-81-322-2250-7_52","DOI":"10.1007\/978-81-322-2250-7_52"},{"key":"351_CR5","doi-asserted-by":"crossref","unstructured":"Amin, R., and Biswas, G. P., A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks: Ad Hoc Networks, 2015.","DOI":"10.1016\/j.adhoc.2015.05.020"},{"issue":"8","key":"351_CR6","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/s10916-015-0258-7","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G. P., A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8):78, 2015. doi: 10.1007\/s10916-015-0258-7 .","journal-title":"J. Med. Syst."},{"key":"351_CR7","doi-asserted-by":"crossref","unstructured":"Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. In: 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1\u20137 (2015), doi: 10.1109\/CyberSA.2015.7166114","DOI":"10.1109\/CyberSA.2015.7166114"},{"key":"351_CR8","doi-asserted-by":"crossref","unstructured":"Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Li, X., Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems. J. Med. Syst. 2015. doi: 10.1007\/s10916-015-0318-z .","DOI":"10.1007\/s10916-015-0318-z"},{"issue":"11","key":"351_CR9","first-page":"137","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Obaidat, M. S., Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system. J. Med. Technol. 39(11):137, 2015. doi: 10.1007\/s10916-015-0307-2 .","journal-title":"J. Med. Technol."},{"key":"351_CR10","doi-asserted-by":"crossref","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Drielsma, P. H., H\u00e9am, P. C., Kouchnarenko, O., Mantovani, J., et al., The avispa tool for the automated validation of internet security protocols and applications. In: Computer Aided Verification, pp. 281\u2013285: Springer, 2005","DOI":"10.1007\/11513988_27"},{"issue":"2","key":"351_CR11","first-page":"1","volume":"37","author":"T Cao","year":"2013","unstructured":"Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1\u20137, 2013.","journal-title":"J. Med. Syst."},{"key":"351_CR12","doi-asserted-by":"crossref","unstructured":"Chaudhry, S. A., Farash, M. S., Naqvi, H., Kumari, S., Khan, M. K., An enhanced privacy preserving remote user authentication scheme with provable security. Security and Communication Networks, 2015. doi: 10.1002\/sec.1299 .","DOI":"10.1002\/sec.1299"},{"issue":"6","key":"351_CR13","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"HM Chen","year":"2012","unstructured":"Chen, H. M., Lo, J. W., Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907\u20133915, 2012.","journal-title":"J. Med. Syst."},{"issue":"2","key":"351_CR14","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A. C., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"351_CR15","doi-asserted-by":"crossref","unstructured":"Farash, M. S., Chaudhry, S. A., Heydari, M., Sajad Sadough, S. M., Kumari, S., Khan, M. K., A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst. 2015. doi: 10.1002\/dac.3019 .","DOI":"10.1002\/dac.3019"},{"issue":"1","key":"351_CR16","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2014","unstructured":"Giri, D., Maitra, T., Amin, R., Srivastava, P., An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1):145, 2014. doi: 10.1007\/s10916-014-0145-7 .","journal-title":"J. Med. Syst."},{"issue":"6","key":"351_CR17","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Li, B., Lee, S., A variable thresholdvalue authentication architecture for wireless mesh networks. Journal of Internet Technology 15(6):929\u2013936, 2014.","journal-title":"Journal of Internet Technology"},{"issue":"3","key":"351_CR18","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"D He","year":"2012","unstructured":"He, D., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"1","key":"351_CR19","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chen, J., Lee, C. C., Chilamkurti, N., Yeo, S. S., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems 21(1):49\u201360, 2015. doi: 10.1007\/s00530-013-0346-9 .","journal-title":"Multimedia Systems"},{"key":"351_CR20","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263\u2013277, 2015. doi: 10.1016\/j.ins.2015.02.010 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025515001012 .","journal-title":"Inf. Sci."},{"issue":"3","key":"351_CR21","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3):816\u2013823, 2015. doi: 10.1109\/JSYST.2014.2301517 .","journal-title":"IEEE Syst. J."},{"key":"351_CR22","doi-asserted-by":"crossref","unstructured":"Hsu, C. L., Chuang, Y. H., Kuo, C.l., A novel remote user authentication scheme from bilinear pairings via internet. Wirel. Pers. Commun. 1\u201312, 2015.","DOI":"10.1007\/s11277-015-2386-2"},{"issue":"0","key":"351_CR23","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.ins.2015.03.050","volume":"312","author":"SH Islam","year":"2015","unstructured":"Islam, SH, Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf. Sci. 312(0):104\u2013130, 2015. doi: 10.1016\/j.ins.2015.03.050 .","journal-title":"Inf. Sci."},{"issue":"3\u20134","key":"351_CR24","doi-asserted-by":"crossref","first-page":"425","DOI":"10.14317\/jami.2013.425","volume":"31","author":"SH Islam","year":"2013","unstructured":"Islam, S. H., and Biswas, G. P., An efficient and secure strong designated verifier signature scheme without bilinear pairings. Journal of Applied Mathematics and Informatics 31(3\u20134):425\u2013441, 2013.","journal-title":"Journal of Applied Mathematics and Informatics"},{"key":"351_CR25","doi-asserted-by":"crossref","unstructured":"Islam, S. H., Khan, M. K., Obaidat, M. S., Muhaya, F.T.B., Provably secure and anonymous password authentication protocol for roaming service in global mobility networks using extended chaotic maps. Wirel. Pers. Commun. 1\u201322, 2015. doi: 10.1007\/s11277-015-2542-8 .","DOI":"10.1007\/s11277-015-2542-8"},{"issue":"2","key":"351_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):1\u20138, 2014.","journal-title":"J. Med. Syst."},{"issue":"2","key":"351_CR27","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.jisa.2013.07.005","volume":"18","author":"S Kalra","year":"2013","unstructured":"Kalra, S., and Sood, S., Advanced remote user authentication protocol for multi-server architecture based on ecc. Journal of Information Security and Applications 18(2):98\u2013107, 2013.","journal-title":"Journal of Information Security and Applications"},{"key":"351_CR28","doi-asserted-by":"crossref","unstructured":"Kim, H., Jeon, W., Lee, K., Lee, Y., Won, D., Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. In: Computational Science and Its Applications\u2013ICCSA 2012, pp. 391\u2013406: Springer, 2012.","DOI":"10.1007\/978-3-642-31137-6_30"},{"key":"351_CR29","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B., Differential power analysis. In: Advances in Cryptology CRYPTO 99, Lecture Notes in Computer Science, vol. 1666, pp. 388\u2013397 (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"351_CR30","first-page":"1","volume":"37","author":"CC Lee","year":"2013","unstructured":"Lee, C. C., Hsu, C. W., Lai, Y. M., Vasilakos, A., An enhanced mobile-healthcare emergency system based on extended chaotic maps. J. Med. Syst. 37(5):1\u201312, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"351_CR31","first-page":"1","volume":"37","author":"TF Lee","year":"2013","unstructured":"Lee, T. F., Chang, I. P., Lin, T. H., Wang, C. C., A secure and efficient password-based user authentication scheme using smart cards for the integrated epr information system. J. Med. Syst. 37(3):1\u20137, 2013.","journal-title":"J. Med. Syst."},{"issue":"9","key":"351_CR32","first-page":"1","volume":"38","author":"CT Li","year":"2014","unstructured":"Li, C. T., Lee, C. C., Weng, C. Y., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9):1\u201311, 2014.","journal-title":"J. Med. Syst."},{"issue":"1","key":"351_CR33","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.mcm.2012.06.033","volume":"58","author":"X Li","year":"2013","unstructured":"Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J., A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58(1):85\u201395, 2013.","journal-title":"Math. Comput. Model."},{"issue":"5","key":"351_CR34","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X., Niu, J., Khan, M. K., Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365\u20131371, 2013.","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"351_CR35","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J. W., Ma, J., Wang, W. D., Liu, C. L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1):73\u201379, 2011.","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"351_CR36","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jnca.2011.11.009","volume":"35","author":"X Li","year":"2012","unstructured":"Li, X., Xiong, Y., Ma, J., Wang, W., An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. J. Netw. Comput. Appl. 35(2):763\u2013769, 2012.","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"351_CR37","doi-asserted-by":"crossref","first-page":"9929","DOI":"10.1007\/s10916-013-9929-4","volume":"37","author":"HY Lin","year":"2013","unstructured":"Lin, H. Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9929, 2013. doi: 10.1007\/s10916-013-9929-4 .","journal-title":"J. Med. Syst."},{"issue":"2","key":"351_CR38","doi-asserted-by":"crossref","first-page":"1487","DOI":"10.1007\/s11277-014-1829-5","volume":"78","author":"HY Lin","year":"2014","unstructured":"Lin, H. Y., Chaotic map based mobile dynamic id authenticated key agreement scheme. Wirel. Pers. Commun. 78(2):1487\u20131494, 2014.","journal-title":"Wirel. Pers. Commun."},{"issue":"5","key":"351_CR39","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"351_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and improvement of yan et al.s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):1\u201312, 2014.","journal-title":"J. Med. Syst."},{"issue":"10","key":"351_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10):1\u201310, 2014.","journal-title":"J. Med. Syst."},{"key":"351_CR42","unstructured":"Odelu, V., Das, A. K., Goswami, A., Cryptanalysis on robust biometrics-based authentication scheme for multiserver environment. Tech. rep., Cryptology ePrint Archive, eprint. iacr.org\/2014\/715.pdf (2014)"},{"issue":"1","key":"351_CR43","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Wang, J., Wang, J., Lee, S., A novel routing protocol providing good transmission reliability in underwater sensor networks. Journal of Internet Technology 16(1):171\u2013178, 2015.","journal-title":"Journal of Internet Technology"},{"issue":"3","key":"351_CR44","first-page":"200","volume":"2","author":"Z Tan","year":"2013","unstructured":"Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200\u2013204, 2013.","journal-title":"Network"},{"issue":"1","key":"351_CR45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-023-02023-1","volume":"39","author":"Z Wang","year":"2015","unstructured":"Wang, Z., Huo, Z., Shi, W., A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems. Journal of medical systems 39(1):1\u20138, 2015.","journal-title":"Journal of medical systems"},{"issue":"6","key":"351_CR46","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(6):3597\u20133604, 2012.","journal-title":"Journal of Medical Systems"},{"issue":"3","key":"351_CR47","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., Chung, Y., A secure authentication scheme for telecare medicine information systems. Journal of medical systems 36(3):1529\u20131535, 2012.","journal-title":"Journal of medical systems"},{"issue":"9","key":"351_CR48","first-page":"1","volume":"38","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Liu, W., Wang, S., Han, L., Hu, B., Wu, T., Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care. Journal of medical systems 38(9):1\u201310, 2014.","journal-title":"Journal of medical systems"},{"issue":"2","key":"351_CR49","first-page":"1","volume":"37","author":"Q Xie","year":"2013","unstructured":"Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. Journal of medical systems 37(2):1\u20138, 2013.","journal-title":"Journal of medical systems"},{"issue":"2","key":"351_CR50","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0182-2","volume":"39","author":"L Xu","year":"2015","unstructured":"Xu, L., and Wu, F., Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. Journal of medical systems 39(2):1\u20139, 2015.","journal-title":"Journal of medical systems"},{"issue":"5","key":"351_CR51","doi-asserted-by":"crossref","first-page":"9972","DOI":"10.1007\/s10916-013-9972-1","volume":"37","author":"X Yan","year":"2013","unstructured":"Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. Journal of Medical Systems 37(5):9972, 2013. doi: 10.1007\/s10916-013-9972-1 .","journal-title":"Journal of Medical Systems"},{"issue":"2","key":"351_CR52","first-page":"317","volume":"16","author":"Y Ren","year":"2014","unstructured":"Ren, Y., Shen, J., Wang, J., Han, J., and Lee, S., Mutual verifiable provable data auditing in public cloud storage. Journal of Internet Technology 16(2):317\u2013323, 2014.","journal-title":"Journal of Internet Technology"},{"issue":"1","key":"351_CR53","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s11227-010-0512-1","volume":"63","author":"EJ Yoon","year":"2013","unstructured":"Yoon, EJ, and Yoo, KY, Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. The Journal of Supercomputing 63(1):235\u2013255, 2013.","journal-title":"The Journal of Supercomputing"},{"issue":"6","key":"351_CR54","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z, An efficient authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(6):3833\u20133838, 2012. doi: 10.1007\/s10916-012-9856-9 .","journal-title":"Journal of Medical Systems"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0351-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0351-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0351-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T15:06:09Z","timestamp":1718118369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0351-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,3]]},"references-count":54,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["351"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0351-y","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,3]]},"article-number":"180"}}