{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:03Z","timestamp":1748751003330,"version":"3.41.0"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,11,7]],"date-time":"2015-11-07T00:00:00Z","timestamp":1446854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s10916-015-0360-x","type":"journal-article","created":{"date-parts":[[2015,11,7]],"date-time":"2015-11-07T11:08:32Z","timestamp":1446894512000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks"],"prefix":"10.1007","volume":"40","author":[{"given":"Young-Long","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ren-Hau","family":"Liau","sequence":"additional","affiliation":[]},{"given":"Liang-Yu","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,7]]},"reference":[{"key":"360_CR1","doi-asserted-by":"crossref","unstructured":"Peng, K., Yang, J., and Zheng, J., An identity authentication system based on mobile phone token. Proc. Netw. Infrastruct. Digit. Content Beijing. 570\u2013575, 2009.","DOI":"10.1109\/ICNIDC.2009.5360974"},{"key":"360_CR2","doi-asserted-by":"crossref","unstructured":"Van Thanh, D., Jonvik, T., Boning, F., Van Thuan, D., and Jorstad, I., Simple strong authentication for internet applications using mobile phones. Proc. Glob. Telecommun. Conf. New Orleans. 1\u20135, 2008.","DOI":"10.1109\/GLOCOM.2008.ECP.319"},{"key":"360_CR3","doi-asserted-by":"crossref","unstructured":"Jonvik, T., Jorstad, I., and van Thanh, D., Strong authentication with mobile phone as security token. Proc. Mob. Adhoc Sen. Syst. Macao. 777\u2013782, 2009.","DOI":"10.1109\/MOBHOC.2009.5336918"},{"key":"360_CR4","doi-asserted-by":"crossref","unstructured":"Me, G., Pirro, D., and Sarrecchia, R., A mobile based approach to strong authentication on Web. Proc. Comput. Glob. Inf. Technol. Bucharest. 67\u201372, 2006.","DOI":"10.1109\/ICCGI.2006.2"},{"issue":"3","key":"360_CR5","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., and Bu, J., A strong user authentication scheme with smart cards for wireless communications. Comput. Commun. 34(3):367\u2013374, 2011.","journal-title":"Comput. Commun."},{"issue":"2","key":"360_CR6","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1108\/EC-01-2013-0021","volume":"31","author":"YL Chen","year":"2014","unstructured":"Chen, Y. L., and Cheng, C. M., Combining a chaos system with an Arnold cat map for a secure authentication scheme in wireless communication networks. Eng. Comput. 31(2):317\u2013330, 2014.","journal-title":"Eng. Comput."},{"issue":"4","key":"360_CR7","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MC.2006.138","volume":"9","author":"AC Weaver","year":"2006","unstructured":"Weaver, A. C., Secure sockets layer. Computer. 9(4):88\u201390, 2006.","journal-title":"Computer."},{"issue":"2","key":"360_CR8","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MITP.2007.41","volume":"9","author":"LD Bisel","year":"2007","unstructured":"Bisel, L. D., The role of SSL in cybersecurity. IT Prof. 9(2):22\u201325, 2007.","journal-title":"IT Prof."},{"key":"360_CR9","doi-asserted-by":"crossref","unstructured":"Mizuno, S., Takahashi, K., and Yamada, K., Authentication using multiple communication channels. Proc. ACM Workshop Digit. Identity Manag. Fairfax. 54\u201362, 2005.","DOI":"10.1145\/1102486.1102496"},{"issue":"4","key":"360_CR10","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.comcom.2008.11.032","volume":"32","author":"CC Chang","year":"2009","unstructured":"Chang, C. C., Chiu, Y. C., and Lee, C. Y., Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput. Commun. 32(4):611\u2013618, 2009.","journal-title":"Comput. Commun."},{"issue":"1","key":"360_CR11","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2009.26","volume":"7","author":"W Enck","year":"2009","unstructured":"Enck, W., McDaniel, P., and Ongtang, M., Understanding Android security. Secur. Priv. 7(1):50\u201357, 2009.","journal-title":"Secur. Priv."},{"key":"360_CR12","unstructured":"PHP: Session Functions. The PHP Group. Available via http:\/\/php.net\/manual\/en\/function.session-id.php"},{"issue":"3","key":"360_CR13","doi-asserted-by":"crossref","first-page":"878","DOI":"10.1016\/j.eswa.2007.07.029","volume":"35","author":"CL Chen","year":"2008","unstructured":"Chen, C. L., A secure and traceable E-DRM system based on mobile device. Exp. Syst. Appl. 35(3):878\u2013886, 2008.","journal-title":"Exp. Syst. Appl."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0360-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0360-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0360-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T10:26:25Z","timestamp":1748687185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0360-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,7]]},"references-count":13,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["360"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0360-x","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2015,11,7]]},"article-number":"26"}}