{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:16:35Z","timestamp":1766268995338,"version":"3.37.3"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,9,24]],"date-time":"2016-09-24T00:00:00Z","timestamp":1474675200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10916-016-0585-3","type":"journal-article","created":{"date-parts":[[2016,9,24]],"date-time":"2016-09-24T04:08:49Z","timestamp":1474690129000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems"],"prefix":"10.1007","volume":"40","author":[{"given":"Hamed","family":"Arshad","sequence":"first","affiliation":[]},{"given":"Abbas","family":"Rasoolzadegan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,24]]},"reference":[{"issue":"4","key":"585_CR1","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/MWC.2015.7224734","volume":"22","author":"K Zhang","year":"2015","unstructured":"Zhang, K, Yang, K, Liang, X, Su, Z, Shen, X, Luo, H H, Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wireless Communications 22(4):104\u2013112, 2015.","journal-title":"IEEE Wireless Communications"},{"issue":"1","key":"585_CR2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He, D, Kumar, N, Chen, J, Lee, CC, Chilamkurti, N, Yeo, SS, Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems 21(1):49\u201360, 2015.","journal-title":"Multimedia Systems"},{"key":"585_CR3","doi-asserted-by":"publisher","unstructured":"He, D, and Zeadally, S, Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, 2015. doi: http:\/\/dx.doi.org\/10.1109\/JSYST.2015.2428620 .","DOI":"10.1109\/JSYST.2015.2428620"},{"key":"585_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0408-1","volume-title":"Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks","author":"O Mir","year":"2015","unstructured":"Mir, O, Munilla, J, Kumari, S, Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks, 2015. doi: 10.1007\/s12083-015-0408-1 ."},{"issue":"4","key":"585_CR5","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1007\/s11277-015-2538-4","volume":"83","author":"O Mir","year":"2015","unstructured":"Mir, O, and Nikooghadam, M, A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services. Wirel Pers Commun 83(4):2439\u20132461, 2015.","journal-title":"Wirel Pers Commun"},{"key":"585_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2544805","volume-title":"Anonymous authentication for wireless body area networks with provable security","author":"D He","year":"2016","unstructured":"He, D, Zeadally, S, Kumar, N, Lee, JH, Anonymous authentication for wireless body area networks with provable security, 2016. doi: 10.1109\/JSYST.2016.2544805 ."},{"key":"585_CR7","doi-asserted-by":"publisher","unstructured":"Nikooghadam, M, Jahantigh, R, Arshad, H, A lightweight authentication and key agreement protocol preserving user anonymity. Multimedia Tools and Applications, 2016. doi: 10.1007\/s11042-016-3704-8 .","DOI":"10.1007\/s11042-016-3704-8"},{"issue":"8","key":"585_CR8","doi-asserted-by":"crossref","first-page":"3163","DOI":"10.1007\/s11227-015-1434-8","volume":"71","author":"H Arshad","year":"2015","unstructured":"Arshad, H, and Nikooghadam, M, Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. J Supercomput 71(8):3163\u20133180, 2015.","journal-title":"J Supercomput"},{"key":"585_CR9","doi-asserted-by":"publisher","unstructured":"Zhang, L, Zhu, S, Tang, S, Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE Journal of Biomedical and Health Informatics, 2016. doi: 10.1109\/JBHI.2016.2517146 .","DOI":"10.1109\/JBHI.2016.2517146"},{"issue":"1","key":"585_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40064-015-1659-2","volume":"5","author":"W Liu","year":"2016","unstructured":"Liu, W, Xie, Q, Wang, S, Hu, B, An improved authenticated key agreement protocol for telecare medicine information system. SpringerPlus 5(1):1\u201316, 2016.","journal-title":"SpringerPlus"},{"issue":"2","key":"585_CR11","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1002\/sec.967","volume":"8","author":"FT Bin Muhaya","year":"2015","unstructured":"Bin Muhaya, FT, Cryptanalysis and security enhancement of Zhu\u2019s authentication scheme for Telecare medicine information system. Security and Communication Networks 8(2):149\u2013158, 2015.","journal-title":"Security and Communication Networks"},{"issue":"8","key":"585_CR12","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R, and Biswas, GP, An improved rsa based user authentication and session key agreement protocol usable in TMIS. Journal of Medical Systems 39(8):1\u201314, 2015.","journal-title":"Journal of Medical Systems"},{"issue":"1","key":"585_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2015","unstructured":"Giri, D, Maitra, T, Amin, R, Srivastava, PD, An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems. Journal of medical systems 39(1):1\u20139, 2015.","journal-title":"Journal of medical systems"},{"issue":"11","key":"585_CR14","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L, Password authentication with insecure communication. Commun ACM 24(11):770\u2013772, 1981.","journal-title":"Commun ACM"},{"key":"585_CR15","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1109\/TCOM.1981.1095067","volume":"6","author":"R Lennon","year":"1981","unstructured":"Lennon, R, Matyas, S, Mayer, C, Cryptographic authentication of time-invariant quantities. IEEE Trans Commun 6:773\u2013777, 1981.","journal-title":"IEEE Trans Commun"},{"key":"585_CR16","unstructured":"Yen, S, and Liao, K, Shared authentication token secure against replay and weak key attack. Inf Process Lett,78\u201380, 1997."},{"key":"585_CR17","doi-asserted-by":"publisher","unstructured":"He, D, Wang, H, Wang L, Shen, J, Yang, X, Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft Computing, 2016. doi: 10.1007\/s00500-016-2231-x .","DOI":"10.1007\/s00500-016-2231-x"},{"issue":"10","key":"585_CR18","doi-asserted-by":"crossref","first-page":"2507","DOI":"10.1093\/comjnl\/bxu097","volume":"58","author":"D He","year":"2015","unstructured":"He, D, Zhang, M, Xu, B, Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model. The Computer Journal 58(10):2507\u20132508, 2015.","journal-title":"The Computer Journal"},{"issue":"1","key":"585_CR19","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11042-014-2282-x","volume":"75","author":"H Arshad","year":"2016","unstructured":"Arshad, H, and Nikooghadam, M, An efficient and secure authentication and key agreement scheme for session protocol using ECC. Multimed Tools Appl 75(1):181\u2013197, 2016.","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"585_CR20","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s11276-015-0983-3","volume":"22","author":"D He","year":"2016","unstructured":"He, D, Kumar, N, Lee, JH, Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks 22(2):491\u2013502, 2016.","journal-title":"Wireless Networks"},{"key":"585_CR21","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1016\/j.cose.2014.10.006","volume":"49","author":"AA Ramaki","year":"2015","unstructured":"Ramaki, AA, Amini, M, Atani, RE, RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection. Computers & Security 49:206\u2013219, 2015.","journal-title":"Computers & Security"},{"issue":"5","key":"585_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-015-5469-5","volume":"59","author":"D He","year":"2016","unstructured":"He, D, Kumar, N, Shen, H, Lee, JH, One-to-many authentication for access control in mobile pay-TV systems. Science China-Information Sciences 59(5):1\u201314, 2016. doi: 10.1007\/s11432-015-5469-5 .","journal-title":"Science China-Information Sciences"},{"issue":"1","key":"585_CR23","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M Hwang","year":"2000","unstructured":"Hwang, M, and Li, L, A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28\u201330, 2000.","journal-title":"IEEE Trans Consum Electron"},{"key":"585_CR24","doi-asserted-by":"publisher","unstructured":"Sharif, A, Mollaeefar, M, Nazari, M, A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimedia Tools and Applications, 2016. doi: 10.1007\/s11042-016-3398-y .","DOI":"10.1007\/s11042-016-3398-y"},{"key":"585_CR25","doi-asserted-by":"publisher","unstructured":"Mollaeefar, M, Sharif, A, Nazari, M, A novel encryption scheme for colored image based on high level chaotic maps. Multimedia Tools and Applications, 2015. doi: 10.1007\/s11042-015-3064-9 .","DOI":"10.1007\/s11042-015-3064-9"},{"issue":"4","key":"585_CR26","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1109\/30.920451","volume":"46","author":"C-K Chan","year":"2000","unstructured":"Chan, C-K, and Cheng, L-M, Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(4):992\u2013993, 2000.","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"585_CR27","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H-M Sun","year":"2000","unstructured":"Sun, H-M, An efficient remote use authentication scheme using smart cards. IEEE Trans Consum Electron 46(4):958\u2013961, 2000.","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"585_CR28","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/S0167-4048(02)00415-7","volume":"21","author":"H-Y Chien","year":"2002","unstructured":"Chien, H-Y, Jan, J-K, Tseng, Y-M, An efficient and practical solution to remote authentication: smart card. Comput Secur 21(4):372\u2013375, 2002.","journal-title":"Comput Secur"},{"issue":"5","key":"585_CR29","first-page":"1682","volume":"E86-B","author":"W Ku","year":"2003","unstructured":"Ku, W, Chen, C, Lee, H, Cryptanalysis of a variant of peyravian-zunic\u2019s password authentication scheme. IEICE Trans Commun E86-B(5):1682\u20131684, 2003.","journal-title":"IEICE Trans Commun"},{"issue":"2","key":"585_CR30","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TCE.2004.1309437","volume":"50","author":"E Yoon","year":"2004","unstructured":"Yoon, E, Ryu, E, Yoo, K, Further improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans Consum Electron 50(2):612\u2013614, 2004.","journal-title":"IEEE Trans Consum Electron"},{"issue":"5","key":"585_CR31","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/j.csi.2006.11.005","volume":"29","author":"X Wang","year":"2007","unstructured":"Wang, X, Zhang, W, Zhang, J, Khan, M, Cryptanalysis and improvement on two efficient remote user authentication scheme using cards. Comput Stand Interfaces 29(5):507\u2013512, 2007.","journal-title":"Comput Stand Interfaces"},{"issue":"6","key":"585_CR32","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1016\/j.cose.2012.06.001","volume":"31","author":"W Hsieh","year":"2012","unstructured":"Hsieh, W, and Leu, J, Exploiting hash functions to intensify the remote user authentication scheme. Comput Secur 31(6):791\u2013798, 2012.","journal-title":"Comput Secur"},{"key":"585_CR33","doi-asserted-by":"crossref","unstructured":"Wang, D, Ma, C, Wang, P, Chen, Z. , Robust smart card based password authentication scheme against smart card security breach. IACR Cryptology ePrint Archive. Retrieved from eprint.iacr.org\/2012\/439.eps (2012)","DOI":"10.4304\/jnw.8.1.148-155"},{"key":"585_CR34","doi-asserted-by":"publisher","unstructured":"Chang, Y, Tai, W, Chang H, Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. Int J Commun Syst, 2013. doi: 10.1002\/dac.2552 .","DOI":"10.1002\/dac.2552"},{"issue":"11","key":"585_CR35","doi-asserted-by":"crossref","first-page":"1921","DOI":"10.1002\/sec.906","volume":"7","author":"S Kumari","year":"2014","unstructured":"Kumari, S, Gupta, MK, Khan, MK, Li, X, An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement. Secur Commun Netw 7(11):1921\u20131932, 2014.","journal-title":"Secur Commun Netw"},{"issue":"12","key":"585_CR36","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D, Zeadally, S, Xu, B, Huang, X, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security 10 (12):2681\u20132691, 2015.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"585_CR37","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/TCE.2015.7064111","volume":"61","author":"D He","year":"2015","unstructured":"He, D, Kumar, N, Lee, J H, Secure pseudonym-based near field communication protocol for the consumer internet of things. IEEE Transactions on Consumer Electronics 61(1):56\u201362, 2015.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"585_CR38","doi-asserted-by":"crossref","unstructured":"Kocher, P, Jaffe, J, Jun, B: Differential power analysis. In: Proceedings of Advances in Cryptology, Santa Barbara, CA, USA, 1666, pp. 788\u2013797 (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"585_CR39","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, TS, Dabbish, EA, Sloan, RH, Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 51(5):541\u2013552, 2002.","journal-title":"IEEE Transactions on Computers"},{"key":"585_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.adhoc.2014.03.003","volume":"20","author":"D Wang","year":"2014","unstructured":"Wang, D, and Wang, P, Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Networks 20:1\u201315, 2014.","journal-title":"Ad Hoc Networks"},{"issue":"10","key":"585_CR41","doi-asserted-by":"crossref","first-page":"2215","DOI":"10.1002\/dac.2468","volume":"27","author":"CG Ma","year":"2014","unstructured":"Ma, CG, Wang, D, Zhao, SD, Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems 27(10):2215\u20132227, 2014.","journal-title":"International Journal of Communication Systems"},{"key":"585_CR42","unstructured":"Klein, DV: Foiling the cracker: a survey of, and improvements to, password security. In: Proceedings of the 2 n d USENIX Security Workshop, Anaheim, CA, USA, August, pp. 5\u201314 (1990)"},{"key":"585_CR43","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.future.2016.04.016","volume":"63","author":"S Kumari","year":"2016","unstructured":"Kumari, S, Li, X, Wu, F, Das, AK, Arshad, H, Khan, MK, A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems 63:56\u201375, 2016.","journal-title":"Future Generation Computer Systems"},{"key":"585_CR44","doi-asserted-by":"crossref","unstructured":"Bonneau, J: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: 33 t h IEEE Symposium on Security and Privacy (S&P 2012), IEEE Computer Society, San Francisco, CA, USA, May, pp. 538\u2013552 (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"585_CR45","doi-asserted-by":"publisher","unstructured":"Islam, SH, Design and analysis of an improved smartcard-based remote user password authentication scheme. International Journal of Communication Systems, 2014. doi: 10.1002\/dac.2793 .","DOI":"10.1002\/dac.2793"},{"key":"585_CR46","doi-asserted-by":"crossref","unstructured":"Gong, L, Needham, R, Yahalom, R: Reasoning about belief in cryptographic protocols. In: Proc 1990 IEEE Computer Society Symp. Research in Security and Privacy, pp. 234\u2013246 (1990)","DOI":"10.1109\/RISP.1990.63854"},{"key":"585_CR47","doi-asserted-by":"crossref","unstructured":"Armando, A, Basin, D, Cuellar, J, Rusinowitch, M, Vigan, L, AVISPA: Automated Validation of Internet Security Protocols and Applications. ERCIM News,64, 2006.","DOI":"10.1007\/11513988_27"},{"key":"585_CR48","unstructured":"Chevalier, Y, Compagna, L, Cuellar, J, Hankes, DP, Mantovani, J, Modersheim, S, Vigneron, L: A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. In: Proc. SAPS\u201904. Austrian Computer Society (2004)"},{"issue":"3","key":"585_CR49","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D Basin","year":"2005","unstructured":"Basin, D, Modersheim, S, Vigano, L, OFMC: A symbolic model checker for security protocols. International Journal of Information Security 4(3):181\u2013208, 2005.","journal-title":"International Journal of Information Security"},{"key":"585_CR50","volume-title":"Guide to elliptic curve cryptography","author":"D Hankerson","year":"2004","unstructured":"Hankerson, D, Menezes, A, Vanstone, S, Guide to elliptic curve cryptography. New York: Springer, 2004."},{"issue":"4","key":"585_CR51","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/TCE.2013.6689693","volume":"59","author":"D He","year":"2013","unstructured":"He, D, Kumar, N, Khan, MK, Lee, JH, Anonymous Two-factor Authentication for Consumer Roaming Service in Global Mobility Networks. IEEE Transactions on Consumer Electronics 59(4):811\u2013817, 2013.","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"2","key":"585_CR52","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.1007\/s11277-013-1594-x","volume":"77","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q, Ma, J, Li, G, Yang, L, An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks. Wireless Personal Communications 77(2):1489\u20131506, 2014.","journal-title":"Wireless Personal Communications"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0585-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0585-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0585-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T20:00:53Z","timestamp":1568404853000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0585-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,24]]},"references-count":52,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["585"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0585-3","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2016,9,24]]},"article-number":"237"}}