{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:45Z","timestamp":1761611385905},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T00:00:00Z","timestamp":1452124800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Korea government (MSIP)","award":["No.R0126-15-1111"],"award-info":[{"award-number":["No.R0126-15-1111"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s10916-015-0422-0","type":"journal-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T04:07:59Z","timestamp":1452139679000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":46,"title":["An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps"],"prefix":"10.1007","volume":"40","author":[{"given":"Jongho","family":"Moon","sequence":"first","affiliation":[]},{"given":"Younsung","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Jiye","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,7]]},"reference":[{"issue":"4","key":"422_CR1","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1005549330655","volume":"24","author":"C Lambrinoudakis","year":"2000","unstructured":"Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst 24(4):213\u2013234, 2000.","journal-title":"J. Med. Syst"},{"issue":"7","key":"422_CR2","doi-asserted-by":"crossref","first-page":"e102747","DOI":"10.1371\/journal.pone.0102747","volume":"9","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Hu, B., Dong, N., and Wong, D.S., Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems. PLoS ONE 9(7):e102747, 2014. doi: 10.1371\/journal.pone.0102747 .","journal-title":"PLoS ONE"},{"issue":"11","key":"422_CR3","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L., Password authentication with insecure communication. Commun. ACM. 24(11):770\u2013772, 1981.","journal-title":"Commun. ACM."},{"issue":"5","key":"422_CR4","doi-asserted-by":"crossref","first-page":"1819","DOI":"10.1587\/transcom.E95.B.1819","volume":"95","author":"K Son","year":"2012","unstructured":"Son, K., Han, D., and Won, D., A privacy-protecting authentication scheme for roaming services with smart cards. IEICE trans. 95(5):1819\u20131821, 2012.","journal-title":"IEICE trans."},{"issue":"7","key":"422_CR5","doi-asserted-by":"crossref","first-page":"2505","DOI":"10.1587\/transcom.E95.B.2505","volume":"95","author":"W Jeon","year":"2012","unstructured":"Jeon, W., Kim, J., Nam, J., Lee, Y., and Won, D., An enhanced secure authentication scheme with anonymity for wireless environments. IEICE trans. 95(7):2505\u20132508, 2012.","journal-title":"IEICE trans."},{"issue":"4","key":"422_CR6","doi-asserted-by":"crossref","first-page":"6443","DOI":"10.3390\/s140406443","volume":"14","author":"J Kim","year":"2014","unstructured":"Kim, J., Lee, D., Jeon, W., Lee, Y., and Won, D., Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sens. 14(4):6443\u20136462, 2014.","journal-title":"Sens."},{"issue":"6","key":"422_CR7","doi-asserted-by":"crossref","first-page":"10081","DOI":"10.3390\/s140610081","volume":"14","author":"Y Choi","year":"2014","unstructured":"Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., and Won, D., Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sens. 14(6):10081\u201310106, 2014.","journal-title":"Sens."},{"key":"422_CR8","author":"Y Choi","year":"2014","unstructured":"Choi, Y., Nam, J., Lee, D., Kim, J., Jung, J., and Won, D., Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics. Sci. Wor. J., 2014. doi: 10.1155\/2014\/281305 . Article ID 281305, 15p, 2015.","journal-title":"Sci. Wor. J."},{"key":"422_CR9","author":"YR Lu","year":"2015","unstructured":"Lu, Y.R., Li, L.X., Peng, H.P., Yang, X., and Yang, Y.X., A lightweight ID based authentication and key agreement protocol for multi-server architecture. Int. J. Distrib. Sens. N., 2015. doi: 10.1155\/2015\/635890 . Article ID 635890, 9p, 2015.","journal-title":"Int. J. Distrib. Sens. N."},{"issue":"3","key":"422_CR10","first-page":"1","volume":"39","author":"YR Lu","year":"2015","unstructured":"Lu, Y.R., Li, L.X., Peng, H.P., and Yang, Y.X., An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst 39(3):1\u20138, 2015.","journal-title":"J. Med. Syst"},{"issue":"5","key":"422_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0041-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., and Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5): 1\u201311, 2014. doi: 10.1007\/s10916-014-0041-1 .","journal-title":"J. Med. Syst."},{"issue":"12","key":"422_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0136-8","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12):1\u201312, 2014. doi: 10.1007\/s10916-014-0136-8 .","journal-title":"J. Med. Syst."},{"issue":"7","key":"422_CR13","first-page":"1","volume":"39","author":"H Arshad","year":"2015","unstructured":"Arshad, H., Teymoori, V., Nikooghadam, M., Abbassi, H., On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 39(7):1\u201310, 2015. doi: 10.1007\/s10916-015-0259-6 .","journal-title":"J. Med. Syst."},{"issue":"3","key":"422_CR14","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"3","key":"422_CR15","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"DB He","year":"2012","unstructured":"He, D.B., Chen, J.H., and Zhang, R., A More Secure Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"422_CR16","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"422_CR17","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833\u20133838 , 2012.","journal-title":"J. Med. Syst."},{"issue":"3","key":"422_CR18","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1007\/s11071-013-0987-4","volume":"74","author":"F \u00d6zkaynak","year":"2013","unstructured":"\u00d6zkaynak, F., and Yavuz, Designing chaotic S-boxes based on time-delay chaotic system. Nonlinear Dyn. 74(3):551\u2013557, 2013.","journal-title":"Nonlinear Dyn."},{"key":"422_CR19","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1007\/s11071-012-0675-9","volume":"71","author":"M Khan","year":"2013","unstructured":"Khan, M., Shah, T., Mahmood, H., and Gondal, M.A., An efficient method for the construction of block cipher with multichaotic systems. Nonlinear Dyn. 71:489\u2013492, 2013.","journal-title":"Nonlinear Dyn."},{"issue":"10","key":"422_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information. J. Med. Syst. 38(10):1\u201310, 2014. doi: 10.1007\/s10916-014-0120-3 .","journal-title":"J. Med. Syst."},{"key":"422_CR21","unstructured":"Gao, B., Shi, Y.F., Yang, C.L., Li, L.X., Wang, L.C., and Yang, Y.X., STP-LWE: A variant of learning with error for a flexible encryption. Vol. 341490, pp. 1\u20137, 2014. Article ID 2014."},{"key":"422_CR22","doi-asserted-by":"crossref","first-page":"1327","DOI":"10.1016\/S0960-0779(04)00387-X","volume":"23","author":"D Xiao","year":"2005","unstructured":"Xiao, D., Liao, X.F., and Wong, K.W., An efficient entire chaos based scheme for deniable authentication. Chaos Soliton Fract. 23:1327\u20131331, 2005.","journal-title":"Chaos Soliton Fract."},{"key":"422_CR23","doi-asserted-by":"crossref","unstructured":"Tseng, H., Jan, R., and Yang, W., A chaotic maps-based key agreement protocol that preserves user anonymity. IEEE Int. Conf. Commun.,1\u20136, 2009. ICC09.","DOI":"10.1109\/ICC.2009.5198581"},{"issue":"4","key":"422_CR24","doi-asserted-by":"crossref","first-page":"1986","DOI":"10.1016\/j.cnsns.2010.08.015","volume":"16","author":"Y Niu","year":"2011","unstructured":"Niu, Y., and Wang, X., An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16(4):1986\u20131992, 2011.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"7","key":"422_CR25","doi-asserted-by":"crossref","first-page":"2969","DOI":"10.1016\/j.cnsns.2011.11.025","volume":"17","author":"K Xue","year":"2012","unstructured":"Xue, K., and Hong, P., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7):2969\u20132977, 2012.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"6","key":"422_CR26","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1016\/j.cnsns.2012.09.032","volume":"18","author":"C Guo","year":"2013","unstructured":"Guo, C., and Chang, C., Chaotic maps-based passwordauthenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6):1433\u20131440, 2013.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"2","key":"422_CR27","doi-asserted-by":"crossref","first-page":"9919","DOI":"10.1007\/s10916-012-9919-y","volume":"37","author":"X Hao","year":"2013","unstructured":"Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):9919, 2013.","journal-title":"J. Med. Syst."},{"key":"422_CR28","author":"HY Lin","year":"2014","unstructured":"Lin, H.Y., Improved chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer, Simul., 2014. doi: 10.1016\/j.cnsns.2014.05.027 .","journal-title":"Commun. Nonlinear Sci. Numer, Simul."},{"issue":"2","key":"422_CR29","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Lu, X., and Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):12, 2014.","journal-title":"J. Med. Syst."},{"issue":"6","key":"422_CR30","doi-asserted-by":"crossref","first-page":"9985","DOI":"10.1007\/s10916-013-9985-9","volume":"37","author":"TF Lee","year":"2013","unstructured":"Lee, T.F., An efficient chaotic map-based authentication and key agreement scheme using smart cards for telecare medicine information systems. J. Med. Syst. 37(6):9985, 2013.","journal-title":"J. Med. Syst."},{"issue":"9","key":"422_CR31","first-page":"1","volume":"38","author":"CT Li","year":"2014","unstructured":"Li, C.T., Lee, C.C, and Weng, C.Y., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9):1\u201311, 2014.","journal-title":"J. Med. Syst."},{"issue":"6","key":"422_CR32","first-page":"1","volume":"39","author":"YR Lu","year":"2015","unstructured":"Lu, Y.R., Li, L.X., Peng, H.P., Xie, D., and Yang, Y.X., Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J. Med. Syst. 39(6): 1\u201310, 2015.","journal-title":"J. Med. Syst."},{"key":"422_CR33","unstructured":"Stallings, W., Cryptography and Network Security: Principles and Practices. 3rd edn: Prentice Hall, 2003."},{"key":"422_CR34","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1007\/s11071-013-1029-y","volume":"74","author":"CT Li","year":"2013","unstructured":"Li, C.T., Lee, C.C., and Weng, C.Y., An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74:1133\u20131143, 2013.","journal-title":"Nonlinear Dyn."},{"key":"422_CR35","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11071-012-0652-3","volume":"71","author":"CC Lee","year":"2013","unstructured":"Lee, C.C., and Hsu, C.W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71:201\u2013211, 2013.","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"422_CR36","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1016\/j.camwa.2011.12.067","volume":"64","author":"DW Zhao","year":"2012","unstructured":"Zhao, D.W., Peng, H.P., Wang, C., and Yang, Y.X., A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Comput. Math. Appl. 64(4):611\u2013615 , 2012.","journal-title":"Comput. Math. Appl."},{"issue":"5","key":"422_CR37","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., and Sloan, R.H., Examining smartcard security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"issue":"52","key":"422_CR38","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"I","author":"P Bergamo","year":"2005","unstructured":"Bergamo, P., Arco, P., Santis, A., and Kocarev, L., Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. I(52):1382\u20131393, 2005.","journal-title":"IEEE. Trans. Circ. Syst."},{"issue":"3","key":"422_CR39","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recogn. 40(3): 1057\u20131065, 2007.","journal-title":"Pattern Recogn."},{"issue":"6","key":"422_CR40","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/s10916-014-0027-z","volume":"38","author":"AK Das","year":"2014","unstructured":"Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst 38(6):27, 2014.","journal-title":"J. Med. Syst"},{"key":"422_CR41","unstructured":"Stallings, W., Cryptography and network security:principles and practices, 3th edition: Prentice Hall, 2003."},{"issue":"18","key":"422_CR42","doi-asserted-by":"crossref","first-page":"8129","DOI":"10.1016\/j.eswa.2014.07.004","volume":"41","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Das, A.K., and Mukhopadhyay, S., A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards, A. Expert Sys. Appl. 41(18):8129\u20138143, 2014.","journal-title":"Expert Sys. Appl."},{"key":"422_CR43","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A.K., Paul, N.R., and Tripathy, L., Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sci. 209:80\u201392 , 2012.","journal-title":"Information Sci."},{"issue":"1-2","key":"422_CR44","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/s13119-012-0009-8","volume":"2","author":"AK Das","year":"2013","unstructured":"Das, A.K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Networking Sci. 2(1-2):12\u201327, 2013.","journal-title":"Networking Sci."},{"key":"422_CR45","first-page":"18","volume":"8","author":"M Burrow","year":"1990","unstructured":"Burrow, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans. Compu. Syst. 8:18\u201336, 1990.","journal-title":"Compu. Syst."},{"key":"422_CR46","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11277-014-1750-y","volume":"78","author":"DW Zhao","year":"2013","unstructured":"Zhao, D.W., Peng, H.P., Li, L.X., and Yang, Y.X., A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun. 78:247\u2013269, 2013.","journal-title":"Wireless Pers. Commun."},{"issue":"1","key":"422_CR47","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1007\/s11071-013-1174-3","volume":"76","author":"CC Lee","year":"2014","unstructured":"Lee, C.C., Lou, D.C., Li, C.T., and Hsu, C.W., An extended chaotic maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn. 76(1):853\u2013866, 2014.","journal-title":"Nonlinear Dyn."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0422-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0422-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0422-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T08:51:01Z","timestamp":1559465461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0422-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,7]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["422"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0422-0","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,7]]},"article-number":"70"}}