{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:17:03Z","timestamp":1763389023918,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T00:00:00Z","timestamp":1464048000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s10916-016-0521-6","type":"journal-article","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T11:37:48Z","timestamp":1464089868000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments"],"prefix":"10.1007","volume":"40","author":[{"given":"Mohammad Sabzinejad","family":"Farash","sequence":"first","affiliation":[]},{"given":"Omer","family":"Nawaz","sequence":"additional","affiliation":[]},{"given":"Khalid","family":"Mahmood","sequence":"additional","affiliation":[]},{"given":"Shehzad Ashraf","family":"Chaudhry","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,24]]},"reference":[{"issue":"4","key":"521_CR1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1145\/1513601.1513603","volume":"12","author":"M Burmester","year":"2009","unstructured":"Burmester, M., Le, T. V., Medeiros, B. D., Tsudik, G., Universally composable RFID identification and authentication protocols. ACM Trans. Inf. Syst. Secur.(TISSEC) 12(4):21, 2009.","journal-title":"ACM Trans. Inf. Syst. Secur.(TISSEC)"},{"doi-asserted-by":"crossref","unstructured":"Juels, A., and Weis, S.: Defining Strong Privacy for RFID. Cryptology ePrint Archive Report 2006\/137 (2006)","key":"521_CR2","DOI":"10.1109\/PERCOMW.2007.37"},{"doi-asserted-by":"crossref","unstructured":"Cai, S., Li, Y., Li, T., Deng, R. H.: Attacks and improvements to an RIFD mutual authentication protocol and its extensions. In: Proceedings of the second ACM conference on wireless network security, pp 51-58 (2009)","key":"521_CR3","DOI":"10.1145\/1514274.1514282"},{"issue":"4","key":"521_CR4","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","volume":"34","author":"B Song","year":"2011","unstructured":"Song, B., and Mitchell C. J., Scalable RFID security protocols supporting tag ownership transfer. Comput. Commun. 34(4):556\u2013566, 2011.","journal-title":"Comput. Commun."},{"key":"521_CR5","author":"B Niu","year":"2014","unstructured":"Niu, B., Zhu, X., Chi, H., Li, H., Privacy and authentication protocol for mobile RFID systems. Wirel. Pers. Commun., 2014. doi: http:\/\/dx.doi.org\/10.1007\/s11277-014-1605-6 .","journal-title":"Wirel. Pers. Commun."},{"key":"521_CR6","author":"W Shao-hui","year":"2013","unstructured":"Shao-hui, W., Zhijie, H., Sujuan, L., Dan-wei, C., Security analysis of two lightweight RFID authentication protocols. annals of telecommunications-annales des tlcommunications, 2013. doi: 10.1007\/s12243-013-0361-z .","journal-title":"annals of telecommunications-annales des tlcommunications"},{"key":"521_CR7","author":"MH Dehkordi","year":"2013","unstructured":"Dehkordi, M. H., and Farzaneh, Y., Improvement of the hash-based RFID mutual authentication protocol. Wirel. Pers. Commun., 2013. doi: 10.1007\/s11277-013-1358-7 .","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"521_CR8","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.cam.2013.09.073","volume":"259","author":"M Safkhani","year":"2014","unstructured":"Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J. C., Bagheri, N., Cryptanalysis of the Cho others. protocol: A hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259(1):571\u2013577, 2014.","journal-title":"J. Comput. Appl. Math."},{"key":"521_CR9","author":"MR Alagheband","year":"2013","unstructured":"Alagheband, M. R., and Aref, M. R., Simulation-Based Traceability analysis of RFID authentication protocols. Wirel. Pers. Commun., 2013. doi: 10.1007\/s11277-013-1552-7 .","journal-title":"Wirel. Pers. Commun."},{"issue":"3","key":"521_CR10","first-page":"220","volume":"41","author":"CL Chen","year":"2012","unstructured":"Chen, C. L., Huang, Y. C., Shih, T. F., A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards. Information Technology And Control 41(3):220\u2013228, 2012.","journal-title":"Information Technology And Control"},{"issue":"2","key":"521_CR11","first-page":"124","volume":"42","author":"WC Kuo","year":"2013","unstructured":"Kuo, W. C., Chen, B. L., Wuu, L. C., Secure Indefinite-Index RFID Authentication scheme with Challenge-Response strategy. Information Technology And Control 42(2):124\u2013130, 2013.","journal-title":"Information Technology And Control"},{"issue":"8","key":"521_CR12","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1002\/sec.650","volume":"6","author":"MR Alagheband","year":"2013","unstructured":"Alagheband, M. R., and Aref, M. R., Unified privacy analysis of newfound RFID authentication protocols. Security and Communication Networks 6(8):999\u20131009, 2013.","journal-title":"Security and Communication Networks"},{"issue":"2","key":"521_CR13","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1007\/s11227-014-1272-0","volume":"70","author":"Farash M.S.","year":"2014","unstructured":"Farash M.S., Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. 70(2):987\u20131001, 2014.","journal-title":"J. Supercomput."},{"doi-asserted-by":"crossref","unstructured":"Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is ready for RFID - a proof in silicon. In: Selected areas in cryptography, LNCS 5381, pp 401413 (2009)","key":"521_CR14","DOI":"10.1007\/978-3-642-04159-4_26"},{"issue":"11","key":"521_CR15","doi-asserted-by":"crossref","first-page":"1514","DOI":"10.1109\/TC.2008.148","volume":"57","author":"YK Lee","year":"2008","unstructured":"Lee, Y. K., Sakiyama, K., Batina, L., Verbauwhede, I., Elliptic curve based security processor for RFID. IEEE Trans. Comput. 57(11):1514\u20131527, 2008.","journal-title":"IEEE Trans. Comput."},{"unstructured":"of Standards, N.N.I.: Technology: Cryptographic Hash Algorithm Competition. http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/index.html","key":"521_CR16"},{"issue":"12","key":"521_CR17","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1049\/iet-com.2010.0625","volume":"5","author":"H Ning","year":"2011","unstructured":"Ning, H., Liu, H., Mao, J., Zhang, Y., Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Commun. 5(12):1755\u20131768, 2011.","journal-title":"IET Commun."},{"issue":"8","key":"521_CR18","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.1109\/TPDS.2011.290","volume":"23","author":"B Alomair","year":"2012","unstructured":"Alomair, B., Clark, A., Cuellar, J., Poovendran, R., Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans. Parallel Distrib. Syst. 23(8):1536\u20131550, 2012.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"18","key":"521_CR19","doi-asserted-by":"crossref","first-page":"2155","DOI":"10.1016\/j.comcom.2010.08.006","volume":"33","author":"B Alomair","year":"2010","unstructured":"Alomair, B., and Poovendran, R., Privacy versus scalability in radio frequency identification systems. Comput. Commun. 33(18):2155\u20132163, 2010.","journal-title":"Comput. Commun."},{"issue":"4","key":"521_CR20","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1016\/j.comcom.2010.02.027","volume":"34","author":"B Song","year":"2011","unstructured":"Song, B., and Mitchell, C. J., Scalable RFID Security protocols supporting tag ownership transfer. Comput. Commun. 34(4):556\u2013566, 2011.","journal-title":"Comput. Commun."},{"issue":"3","key":"521_CR21","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s00779-011-0392-2","volume":"16","author":"L Batina","year":"2012","unstructured":"Batina, L., Lee, Y. K., Seys, S., Singele, D., Verbauwhede, I., Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Pers. Ubiquit. Comput. 16(3):323\u2013335, 2012.","journal-title":"Pers. Ubiquit. Comput."},{"key":"521_CR22","author":"J Chou","year":"2013","unstructured":"Chou, J., S.,an efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput., 2013. doi: 10.1007\/s11227-013-1073-x .","journal-title":"J. Supercomput."},{"doi-asserted-by":"crossref","unstructured":"Tuyls, P., and Batina, L.: RFID-Tags for Anti-Counterfeiting. In: Topics in cryptology (CT-RSA\u201906), LNCS 3860, pp 115-131 (2006)","key":"521_CR23","DOI":"10.1007\/11605805_8"},{"doi-asserted-by":"crossref","unstructured":"Schnorr, C. P., Efficient identification and signatures for smart cards. In Advances in Cryptology (CRYPTO\u201989), 239\u2013252 , 1990.","key":"521_CR24","DOI":"10.1007\/0-387-34805-0_22"},{"doi-asserted-by":"crossref","unstructured":"Batina, L, Guajardo, J, Kerins, T, Mentens, N, Tuyls, P, Verbauwhede, I.: Public-key cryptography for RFID-tags. In: Fifth annual IEEE 2007. International Conference on Pervasive Computing and Communications Workshops, (PerCom Workshops\u201907), pp 217-222 (2007)","key":"521_CR25","DOI":"10.1109\/PERCOMW.2007.98"},{"doi-asserted-by":"crossref","unstructured":"Okamoto, T.: Provably secure and practical identification schemes and corresponding signature schemes. In: Advances in Cryptology (CRYPTO\u201992), pp 31-53 (1993)","key":"521_CR26","DOI":"10.1007\/3-540-48071-4_3"},{"doi-asserted-by":"crossref","unstructured":"Lee, Y. K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP Based randomized access control): provably secure RFID authentication protocol. In: IEEE International conference on RFID, pp. 97-104 (2008)","key":"521_CR27","DOI":"10.1109\/RFID.2008.4519370"},{"issue":"1","key":"521_CR28","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1049\/iet-cdt.2008.0165","volume":"4","author":"M O\u2019Neill","year":"2010","unstructured":"O\u2019Neill, M, and Robshaw, M J, Low-cost digital signature architecture suitable for radio frequency identification tags. Comput. Digital Tech. IET 4(1):14\u201326, 2010.","journal-title":"Comput. Digital Tech. IET"},{"doi-asserted-by":"crossref","unstructured":"Godor, G., Giczi, N., Imre, S.: Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In: IEEE International conference on wireless communications, networking and information security (WCNIS), pp 650-657 (2010)","key":"521_CR29","DOI":"10.1109\/WCINS.2010.5541860"},{"key":"521_CR30","author":"Y Liao","year":"2013","unstructured":"Liao, Y., and Hsiao, C., A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw., 2013. doi: 10.1016\/j.adhoc.2013.02.004 .","journal-title":"Ad Hoc Netw."},{"unstructured":"Peeters, R., and Hermans, J.: Attack on Liao and Hsiao\u2019s Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol. http:\/\/eprint.iacr.org\/2013\/399 (2013)","key":"521_CR31"},{"issue":"5","key":"521_CR32","first-page":"47","volume":"38","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., and Qi, Q., An Efficient RFID Authentication protocol to enhance patient medication safety using elliptic curve cryptography. J. Med. Syst. 38(5):47, 2014. doi: 10.1007\/s10916-014-0047-8 .","journal-title":"J. Med. Syst."},{"issue":"5","key":"521_CR33","first-page":"46","volume":"38","author":"Z Zhao","year":"2014","unstructured":"Zhao, Z., A Secure RFID Authentication protocol for healthcare environments using elliptic curve cryptosystem. J. Med. Syst. 38(5):46, 2014. doi: 10.1007\/s10916-014-0046-9 .","journal-title":"J. Med. Syst."},{"issue":"6","key":"521_CR34","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Li, B., Lee, S., A variable threshold value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929\u2013936, 2014.","journal-title":"J. Internet Technol."},{"issue":"1","key":"521_CR35","first-page":"171","volume":"16","author":"J Shen","year":"2015","unstructured":"Shen, J., Tan, H., Wang, J., et al., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16(1):171\u2013178, 2015.","journal-title":"J. Internet Technol."},{"issue":"3","key":"521_CR36","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., and Wang, D., Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3):816\u2013823, 2015.","journal-title":"IEEE Syst. J."},{"issue":"1","key":"521_CR37","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"53","author":"D He","year":"2015","unstructured":"He, D., and Zeadally, S., Authentication protocol for an ambient assisted living system. IEEE Commun. Mag. 53(1):71\u201377, 2015.","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"521_CR38","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1016\/j.adhoc.2012.01.002","volume":"10","author":"D He","year":"2012","unstructured":"He, D., An efficient remote user authentication and key agreement protocol for mobile clientserver environment from pairings. Ad Hoc Netw. 10(6):1009\u20131016, 2012.","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"521_CR39","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1002\/nem.1883","volume":"25","author":"Farash M.S.","year":"2015","unstructured":"Farash M.S., Cryptanalysis and improvement of \u2018an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks\u2019. International Journal of Network Management 25(1):31\u201351, 2015.","journal-title":"International Journal of Network Management"},{"issue":"8","key":"521_CR40","first-page":"1","volume":"39","author":"CT Li","year":"2015","unstructured":"Li, C T, Weng, C Y, Lee, C. C., A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system. J. Med. Syst. 39(8):1\u20138, 2015.","journal-title":"J. Med. Syst."},{"issue":"1","key":"521_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0153-7","volume":"39","author":"K Srivastava","year":"2015","unstructured":"Srivastava, K, Awasthi, A K, Kaul, S D, Mittal, R. C., A hash based mutual RFID tag authentication protocol in telecare medicine information system. J. Med. Syst. 39(1):1\u20135, 2015.","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0521-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0521-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0521-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T15:20:01Z","timestamp":1567956001000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0521-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,24]]},"references-count":41,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["521"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0521-6","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2016,5,24]]},"article-number":"165"}}