{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T06:42:29Z","timestamp":1777099349051,"version":"3.51.4"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,29]],"date-time":"2015-10-29T00:00:00Z","timestamp":1446076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["Grant Nos.61272525"],"award-info":[{"award-number":["Grant Nos.61272525"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant Nos. 61370203"],"award-info":[{"award-number":["Grant Nos. 61370203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s10916-015-0362-8","type":"journal-article","created":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T15:31:26Z","timestamp":1447687886000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety"],"prefix":"10.1007","volume":"40","author":[{"given":"Chunhua","family":"Jin","sequence":"first","affiliation":[]},{"given":"Chunxiang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiaojun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fagen","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,29]]},"reference":[{"key":"362_CR1","unstructured":"Annual report. Technical report, London School of Hygiene and Tropical Medicine report, 2012"},{"key":"362_CR2","unstructured":"National Coordinating Council for Medication Error Reporting and Prevention, Recommendations to Enhance Accuracy of Administration of Medications. Retrieved from http:\/\/www.nccmerp.org\/council\/council1999-06-29.html"},{"key":"362_CR3","doi-asserted-by":"crossref","unstructured":"Juels, A., Yoking-proofs for RFID tags. In: First International Workshop on Pervasive Computing and Communication Security, 2004","DOI":"10.1109\/PERCOMW.2004.1276920"},{"key":"362_CR4","doi-asserted-by":"crossref","first-page":"2144","DOI":"10.1016\/j.jopan.2005.02.001","volume":"20","author":"D Sandlin","year":"2005","unstructured":"Sandlin, D., SurgiChip-new technology for prevention of wrong site, wrong procedure, wrong person surgery. J. Perianesth. Nurs. 20:2144\u20132146, 2005.","journal-title":"J. Perianesth. Nurs."},{"key":"362_CR5","unstructured":"Wu, F., Kuo"},{"key":"362_CR6","first-page":"4327","volume":"32","author":"PR Sun","year":"2008","unstructured":"Sun, P.R., Wang, B.H., Wu, F., A new method to guard inpatient medication safety by the implementation of RFID. J. Med. Syst. 32:4327\u20134332, 2008.","journal-title":"J. Med. Syst."},{"issue":"6","key":"362_CR7","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1007\/s10916-008-9207-z","volume":"33","author":"HH Huang","year":"2009","unstructured":"Huang, H.H., and Ku, C.Y., A rfid grouping proof protocol for medication safety of inpatient. J. Med. Syst. 33(6):467\u2013474, 2009.","journal-title":"J. Med. Syst."},{"issue":"4","key":"362_CR8","first-page":"1213","volume":"26","author":"N-W Lo","year":"2010","unstructured":"Lo, N.-W., and Yeh, K.-H., Anonymous coexistence proofs for RFID tags. J. Inf. Sci. Eng. 26(4):1213\u20131230, 2010.","journal-title":"J. Inf. Sci. Eng."},{"issue":"5","key":"362_CR9","doi-asserted-by":"crossref","first-page":"2769","DOI":"10.1007\/s10916-011-9753-7","volume":"36","author":"YC Yen","year":"2012","unstructured":"Yen, Y.C., Lo, N.W., Wu, T.C., Two rfid-based solutions for secure inpatient medication administration. J. Med. Syst. 36(5):2769\u20132778, 2012.","journal-title":"J. Med. Syst."},{"key":"362_CR10","unstructured":"Li, N., Mu, Y., Susilo, W., Guo, F., Varadharajan, V., Privacy-Preserving Authorized RFID Authentication Protocols, Radio Frequency Identification: Security and Privacy Issues, pp. 108\u2013122: Springer International Publishing, 2014."},{"key":"362_CR11","doi-asserted-by":"crossref","first-page":"2373","DOI":"10.1016\/j.comnet.2008.04.016","volume":"52","author":"Y Chen","year":"2008","unstructured":"Chen, Y., Chou, J.-S., Sun, H.-M., A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks 52:2373\u20132380, 2008.","journal-title":"Computer Networks"},{"issue":"7","key":"362_CR12","first-page":"20","volume":"3","author":"T Cao","year":"2008","unstructured":"Cao, T., and Shen, P., Cryptanalysis of some RFID authentication protocols. J. of Commu. 3(7):20\u201327, 2008.","journal-title":"J. of Commu."},{"key":"362_CR13","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/j.comcom.2010.05.011","volume":"34","author":"T-C Yeh","year":"2011","unstructured":"Yeh, T.-C., Wu, C.-H., Tseng, Y.-M., Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications 34:337\u2013341, 2011.","journal-title":"Computer Communications"},{"issue":"1","key":"362_CR14","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1016\/j.adhoc.2012.06.015","volume":"11","author":"R Doss","year":"2013","unstructured":"Doss, R., Sundaresan, S., Zhou, W., A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks 11(1):383\u2013396, 2013.","journal-title":"Ad Hoc Networks"},{"key":"362_CR15","doi-asserted-by":"crossref","unstructured":"Tuyls, P., and Batina, L.: RFID-tags for Anti-Counterfeiting. Topics in cryptology-CT-RSA 2006, 115-131 (2006)","DOI":"10.1007\/11605805_8"},{"key":"362_CR16","doi-asserted-by":"crossref","unstructured":"Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-key cryptography for RFID-tags. Fifth annual IEEE international conference on PerCom workshops\u2019 07, pp. 217\u2013222. IEEE (2007)","DOI":"10.1109\/PERCOMW.2007.98"},{"key":"362_CR17","doi-asserted-by":"crossref","unstructured":"Lee, Y., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. 2008 I.E. international conference on RFID, pp. 97\u2013104. IEEE (2008)","DOI":"10.1109\/RFID.2008.4519370"},{"key":"362_CR18","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. International Conference on Cryptology and Network Security-CANS\u201908, Lecture Notes in Computer Science. Springer-Verlag (2008)","DOI":"10.1007\/978-3-540-89641-8_11"},{"key":"362_CR19","author":"J-S Chou","year":"2014","unstructured":"Chou, J.-S., A secure RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography. J. Supercomput., 2014. doi: 10.1007\/s11227-013-1073-x .","journal-title":"J. Supercomput."},{"issue":"5","key":"362_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0047-8","volume":"38","author":"ZZ Zhang","year":"2014","unstructured":"Zhang, Z. Z., and Qi, Q. Q., An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography. J. Med. Syst. 38(5):1\u20137, 2014.","journal-title":"J. Med. Syst."},{"key":"362_CR21","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.adhoc.2013.02.004","volume":"18","author":"Y Liao","year":"2014","unstructured":"Liao, Y., and Hsiao, C., A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks 18:133\u2013146, 2014.","journal-title":"Ad Hoc Networks"},{"key":"362_CR22","unstructured":"Peeters, R., and Hermans, J., Attack on Liao and Hsiao\u2019s Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol. Cryptology ePrint Archive, Report 2013\/399, 2013"},{"issue":"5","key":"362_CR23","first-page":"1","volume":"38","author":"Zg Zhao","year":"2014","unstructured":"Zhao, Z.g., A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem. J. Med. Syst. 38(5):1\u20137, 2014.","journal-title":"J. Med. Syst."},{"issue":"10","key":"362_CR24","first-page":"1","volume":"38","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Chilamkurti, N., Lee, J.-H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10):1\u20136, 2014.","journal-title":"J. Med. Syst."},{"issue":"1","key":"362_CR25","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2013","unstructured":"He, D., Kumar, N., Khan, M.K., Robustanonymous authentication protocol for healthcare applications using wirelessmedical sensor networks. Multimedia Systems 21(1):49\u201360, 2013.","journal-title":"Multimedia Systems"},{"issue":"6","key":"362_CR26","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Li, B., Lee, S., A Variable Threshold-value Authentication Architecture for Wireless Mesh Networks. Journal of Internet Technology 15(6):929\u2013936, 2014.","journal-title":"Journal of Internet Technology"},{"issue":"2","key":"362_CR27","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Shen, J., Wang, J., Han, J., Lee, S., Mutual Verifiable Provable Data Auditing in Public Cloud Storage. Journal of Internet Technology 16(2):317\u2013323, 2015.","journal-title":"Journal of Internet Technology"},{"issue":"1","key":"362_CR28","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Wang, J., Wang, J., Lee, S., A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks. Journal of Internet Technology 16(1):171\u2013178, 2015.","journal-title":"Journal of Internet Technology"},{"issue":"8","key":"362_CR29","doi-asserted-by":"crossref","first-page":"1173","DOI":"10.1002\/dac.2405","volume":"27","author":"W Han","year":"2014","unstructured":"Han, W., and Zhu, Z., An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem. Int. J. Commun. Syst. 27(8):1173\u20131185, 2014.","journal-title":"Int. J. Commun. Syst."},{"key":"362_CR30","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, 2015. doi: 10.1016\/j.ins.2015.02.010 .","journal-title":"Information Sciences"},{"issue":"1","key":"362_CR31","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"35","author":"D He","year":"2015","unstructured":"He, D., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Communications Magazine 35(1):71\u201377, 2015.","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"362_CR32","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chen, J., et al., Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Systems 21(1):49\u201360, 2015.","journal-title":"Multimedia Systems"},{"key":"362_CR33","doi-asserted-by":"crossref","unstructured":"Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. doi: 10.1007\/s10916-012-9919-y , 2013","DOI":"10.1007\/s10916-012-9919-y"},{"key":"362_CR34","unstructured":"He, D., and Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Systems Journal,1\u20138, 2014."},{"issue":"2","key":"362_CR35","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s11277-013-1282-x","volume":"74","author":"D He","year":"2014","unstructured":"He, D., Zhang, Y., Chen, J., Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wireless Personal Communications 74(2):229\u2013243, 2014.","journal-title":"Wireless Personal Communications"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0362-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0362-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0362-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T11:52:29Z","timestamp":1567338749000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0362-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,29]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["362"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0362-8","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,29]]},"article-number":"12"}}