{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T23:20:22Z","timestamp":1773530422618,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,2,13]],"date-time":"2016-02-13T00:00:00Z","timestamp":1455321600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan (TW)","doi-asserted-by":"publisher","award":["104-2221-E-182-012"],"award-info":[{"award-number":["104-2221-E-182-012"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272306"],"award-info":[{"award-number":["61272306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s10916-016-0453-1","type":"journal-article","created":{"date-parts":[[2016,2,13]],"date-time":"2016-02-13T12:29:26Z","timestamp":1455366566000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":93,"title":["Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment"],"prefix":"10.1007","volume":"40","author":[{"given":"Shin-Yan","family":"Chiou","sequence":"first","affiliation":[]},{"given":"Zhaoqin","family":"Ying","sequence":"additional","affiliation":[]},{"given":"Junqiang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,13]]},"reference":[{"key":"453_CR1","doi-asserted-by":"crossref","unstructured":"He, C. H., Jin, X., Zhao, Z.X., and Xiang, T., A Cloud Computing Solution for Hospital Information System. Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on. 2:517\u2013520, 2010.","DOI":"10.1109\/ICICISYS.2010.5658278"},{"issue":"1\u20133","key":"453_CR2","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/S1386-5056(97)00110-X","volume":"48","author":"K Toyoda","year":"1998","unstructured":"Toyoda, K., Standardization and security for the EMR. Int. J. Med. Inform. 48(1\u20133):57\u201360, 1998.","journal-title":"Int. J. Med. Inform."},{"key":"453_CR3","doi-asserted-by":"crossref","unstructured":"Yeo, K., Lee, K., Kim, J. M., Kim, T. H., Choi, Y. H., Jeong, W. J., Hwang, H., Baek, R. M. and Yoo, S., Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities. Healthcare Inform. Res. 18(2):125\u2013135, 2012. doi: 10.4258\/hir.2012.18.2.125 .","DOI":"10.4258\/hir.2012.18.2.125"},{"issue":"1","key":"453_CR4","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/s10916-014-0154-6","volume":"39","author":"D Mishra","year":"2015","unstructured":"Mishra, D., On the security flaws in ID-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1):154, 2015.","journal-title":"J. Med. Syst."},{"issue":"3","key":"453_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0193-7","volume":"39","author":"D Mishra","year":"2015","unstructured":"Mishra, D., Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems. J. Med. Syst. 39(3):1\u20138, 2015.","journal-title":"J. Med. Syst."},{"issue":"3","key":"453_CR6","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"3","key":"453_CR7","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"DB He","year":"2012","unstructured":"He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"453_CR8","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"key":"453_CR9","doi-asserted-by":"crossref","first-page":"9897","DOI":"10.1007\/s10916-012-9897-0","volume":"37","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.","journal-title":"J. Med. Syst."},{"issue":"4","key":"453_CR10","doi-asserted-by":"crossref","first-page":"9952","DOI":"10.1007\/s10916-013-9952-5","volume":"37","author":"S Kumari","year":"2013","unstructured":"Kumari, S., Khan, M. K., and Kumar, R., Cryptanalysis and improvement of \u2018A privacy enhanced scheme for telecare medical information systems\u2019. J. Med. Syst. 37(4):9952, 2013. doi: 10.1007\/s10916-013-9952-5 .","journal-title":"J. Med. Syst."},{"issue":"2","key":"453_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Lu, X., et al., Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38(2):1\u20138, 2014.","journal-title":"J. Med. Syst."},{"issue":"10","key":"453_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Srinivas, J., and Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10):1\u201310, 2014.","journal-title":"J. Med. Syst."},{"issue":"3","key":"453_CR13","first-page":"200","volume":"2","author":"Z Tan","year":"2013","unstructured":"Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200\u2013204, 2013.","journal-title":"Network"},{"issue":"5","key":"453_CR14","first-page":"537","volume":"37","author":"P Yan","year":"2013","unstructured":"Yan, P., Li, W., Li, P., et al., A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37(5):537\u2013550, 2013.","journal-title":"J. Med. Syst."},{"issue":"6","key":"453_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., et al., Cryptanalysis and improvement of Yan et al.\u2019s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):1\u201312, 2014.","journal-title":"J. Med. Syst."},{"issue":"1","key":"453_CR16","first-page":"149","volume":"2","author":"RP Padhy","year":"2012","unstructured":"Padhy, R. P., Patra, M. R., and Satapathy, S. C., Design and Implementation of a Cloud based Rural Healthcare Information System Model. Univ. J. Appl. Comput. Sci. Technol. 2(1):149\u2013157, 2012.","journal-title":"Univ. J. Appl. Comput. Sci. Technol."},{"key":"453_CR17","unstructured":"Banerjee, A., Agrawal, P., and Rajkumar, R., Design of a Cloud Based Emergency Healthcare Service Model. Int. J. Appl. Eng. Res. 8(19):2013, (2013)."},{"issue":"3","key":"453_CR18","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1080\/10798587.2014.888243","volume":"20","author":"CL Chen","year":"2014","unstructured":"Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365\u2013379, 2014.","journal-title":"Intell. Autom. Soft. Comput."},{"key":"453_CR19","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/s10916-014-0112-3","volume":"38","author":"CL Chen","year":"2014","unstructured":"Chen, C. L., and Yang, T. T., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38:112, 2014. doi: 10.1007\/s10916-014-0112-3 .","journal-title":"J. Med. Syst."},{"key":"453_CR20","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s10916-014-0143-9","volume":"38","author":"CL Chen","year":"2014","unstructured":"Chen, C. L., Yang, T. T., Chiang, M. L., and Shih, T. F., A Privacy Authentication Scheme Based on Cloud for Medical Environment. J. Med. Syst. 38:143, 2014. doi: 10.1007\/s10916-014-0143-9 .","journal-title":"J. Med. Syst."},{"issue":"3","key":"453_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0217-3","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G. P., A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. J. Med. Syst. 39(3):1\u201317, 2015.","journal-title":"J. Med. Syst."},{"key":"453_CR22","first-page":"28","volume":"23","author":"D Mishra","year":"2015","unstructured":"Mishra, D., Das, A. K., Chaturvedi, A., et al., A secure password-based authentication and key agreement scheme using smart cards. J. Inform. Secur. Appl. 23:28\u201343, 2015. doi: 10.1016\/j.jisa.2015.06.003 .","journal-title":"J. Inform. Secur. Appl."},{"key":"453_CR23","doi-asserted-by":"crossref","unstructured":"Bellare, M., and Rogaway, P., Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the First ACM conference on Computer and communications security. 62\u201373, 1993.","DOI":"10.1145\/168588.168596"},{"key":"453_CR24","doi-asserted-by":"crossref","unstructured":"Mishra D., Das A. K., and Mukhopadhyay S., A secure and efficient ECC-based user anonymitypreserving session initiation authentication protocol using smart card. Peer-to-peer networking and applications. 9(1):171\u2013192, 2016.","DOI":"10.1007\/s12083-014-0321-z"},{"key":"453_CR25","unstructured":"SHA-256, website: http:\/\/www.cnblogs.com\/elaron\/archive\/2013\/04\/09\/3010375.html . (Chinese)"},{"key":"453_CR26","unstructured":"AES, website: http:\/\/blog.csdn.net\/hbcui1984\/article\/details\/5201247 . (Chinese)"},{"key":"453_CR27","unstructured":"ECC, website: http:\/\/snowolf.iteye.com\/blog\/383412 . (Chinese)"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0453-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0453-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0453-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T11:06:49Z","timestamp":1748776009000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0453-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,13]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["453"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0453-1","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,13]]},"article-number":"101"}}