{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:15:49Z","timestamp":1740122149110,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T00:00:00Z","timestamp":1473897600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Natural Science Foundation of China (CN)","award":["61003230, 61370026"],"award-info":[{"award-number":["61003230, 61370026"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10916-016-0590-6","type":"journal-article","created":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T07:37:09Z","timestamp":1473925029000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6137-6667","authenticated-orcid":false,"given":"Hu","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Junyi","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Yanan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,15]]},"reference":[{"issue":"2","key":"590_CR1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1049\/iet-com:20070361","volume":"2","author":"H Rashvand","year":"2008","unstructured":"Rashvand, H., Salcedo, V., Sanchez, E., Iliescu, D., Ubiquitous wireless telemedicine. Commun., IET 2(2):237\u2013254, 2008.","journal-title":"Commun., IET"},{"key":"590_CR2","doi-asserted-by":"crossref","unstructured":"Kumar, B., Singh, S. P., and Mohan, A., Emerging mobile communication technologies for health. Computer and Communication Technology (ICCCT), 2010 International Conference on. IEEE, 828\u2013832 (2010)","DOI":"10.1109\/ICCCT.2010.5640393"},{"key":"590_CR3","first-page":"1414","volume":"2","author":"RS Istepanian","year":"2003","unstructured":"Istepanian, R. S., and Lacal, J. C., Emerging mobile communication technologies for health: some imperative notes on m-health. Engineering in Medicine and Biology Society, 2003 Proceedings of the 25th Annual International Conference of the IEEE. IEEE 2:1414\u20131416, 2003.","journal-title":"IEEE"},{"issue":"7","key":"590_CR4","first-page":"1","volume":"2","author":"E Kyriacou","year":"2003","unstructured":"Kyriacou, E., Pavlopoulos, S., Berler, A., Neophytou, M., Bourka, A., Georgoulas, A., Anagnostaki, A., Karayiannis, D., Schizas, C., Pattichis, C., Andreou, A., Koutsouris, D., Multi-purpose HealthCare Telemedicine Systems with mobile communication link support. Biomed. Eng. Online 2(7):1\u201312, 2003.","journal-title":"Biomed. Eng. Online"},{"issue":"3","key":"590_CR5","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1089\/153056203322502632","volume":"9","author":"S Tachakra","year":"2003","unstructured":"Tachakra, S., Wang, X. H., Istepanian, R. S., Song, Y. H., Mobile e-health: the unwired evolution of telemedicine. Telemedicine J. E-health 9(3):247\u2013257, 2003.","journal-title":"Telemedicine J. E-health"},{"issue":"4","key":"590_CR6","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1089\/15305620260507530","volume":"8","author":"V Rialle","year":"2002","unstructured":"Rialle, V., Duchene, F., Noury, N., Bajolle, L., Demongeot, J., Health smart home: information technology for patients at home. Telemedicine J. E-Health 8(4):395\u2013409, 2002.","journal-title":"Telemedicine J. E-Health"},{"issue":"2","key":"590_CR7","first-page":"143","volume":"44","author":"CS Pattichis","year":"2002","unstructured":"Pattichis, C. S., Kyriacou, E., Voskaride, S., Pattichis, M., Istepanian, R., and Schizas, C., Wireless telemedicine systems: an overview. Antennas and Propagation Magazine. IEEE 44(2):143\u2013153, 2002.","journal-title":"IEEE"},{"issue":"4","key":"590_CR8","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1005549330655","volume":"24","author":"C Lambrinoudakis","year":"2000","unstructured":"Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213\u2013234, 2000.","journal-title":"J. Med. Syst."},{"issue":"11","key":"590_CR9","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"21","author":"L Lamport","year":"1981","unstructured":"Lamport, L., Password authentication with insecure communication. Commun. ACM 21(11):770\u2013772, 1981.","journal-title":"Commun. ACM"},{"issue":"2","key":"590_CR10","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1002\/dac.2644","volume":"28","author":"Q Jiang","year":"2015","unstructured":"Jiang, Q., Ma, J., Li, G., Li, X., Improvement of robust smart-card-based password authentication scheme. Int. J. Commun. Syst. 28(2):383\u2013393, 2015.","journal-title":"Int. J. Commun. Syst."},{"issue":"4","key":"590_CR11","doi-asserted-by":"crossref","first-page":"2085","DOI":"10.1007\/s11071-015-2467-5","volume":"83","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A., Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83(4):2085\u20132101, 2016.","journal-title":"Nonlinear Dyn."},{"issue":"6","key":"590_CR12","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang, Q., Ma, J., Lu, X., Tian, Y., An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8(6):1070\u20131081, 2015.","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"590_CR13","doi-asserted-by":"publisher","unstructured":"Jiang, Q., Ma, J., Wei, F.: On the security of a Privacy-Aware authentication scheme for distributed mobile cloud computing services IEEE systems journal. doi: 10.1109\/JSYST.2016.2574719 (2016)","DOI":"10.1109\/JSYST.2016.2574719"},{"issue":"9","key":"590_CR14","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., Goswami, A., A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 10(9):1953\u20131966, 2015.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"590_CR15","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1109\/TPDS.2013.230","volume":"25","author":"X Huang","year":"2014","unstructured":"Huang, X., Chen, X., Li, J., Xiang, Y., Xu, L., Further observations on smart-card-based password-authenticated key agreement in distributed systems. IEEE Trans. Parallel Distrib. Syst. 25(7):1767\u20131775, 2014.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"590_CR16","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"M Das","year":"2009","unstructured":"Das, M., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3): 1086\u20131090, 2009.","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"6","key":"590_CR17","doi-asserted-by":"crossref","first-page":"568","DOI":"10.1109\/TDSC.2013.2297110","volume":"11","author":"X Huang","year":"2014","unstructured":"Huang, X., Xiang, Y., Bertino, E., Zhou, J., Xu, L., Robust multi-factor authentication for fragile communications. IEEE Trans. Dependable Secure Comput. 11(6):568\u2013581, 2014.","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"590_CR18","doi-asserted-by":"publisher","unstructured":"He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security, IEEE Systems Journal. doi: 10.1109\/JSYST.2016.2544805 (2016)","DOI":"10.1109\/JSYST.2016.2544805"},{"key":"590_CR19","doi-asserted-by":"publisher","unstructured":"He, D., Zeadally, S., Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks, IEEE Systems Journal. doi: 10.1109\/JSYST.2015.2428620 (2015)","DOI":"10.1109\/JSYST.2015.2428620"},{"key":"590_CR20","doi-asserted-by":"publisher","unstructured":"He, D., Kumar, N., Wang, H., Wang, L., Choo, K. R., Vinel, A., A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network, IEEE Transactions on Dependable and Secure Computing. doi: 10.1109\/TDSC.2016.2596286 (2016)","DOI":"10.1109\/TDSC.2016.2596286"},{"issue":"6","key":"590_CR21","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1109\/72.963786","volume":"12","author":"H Li","year":"2001","unstructured":"Li, H., Lin, I., Hwang, M., A remote password authentication scheme for multiserver architecture using neural networks. IEEE Trans. Neural Netw. 12(6):1498\u20131504, 2001.","journal-title":"IEEE Trans. Neural Netw."},{"issue":"1","key":"590_CR22","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S0167-739X(02)00093-6","volume":"19","author":"I Lin","year":"2003","unstructured":"Lin, I., Hwang, M., Li, H., A new remote user authentication scheme for multi-server architecture. Futur. Gener. Comput. Syst. 19(1):13\u201322, 2003.","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"590_CR23","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1109\/TCE.2004.1277870","volume":"50","author":"M Juang","year":"2004","unstructured":"Juang, M., Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. Consum. Electron. 50(1):251\u2013255, 2004.","journal-title":"IEEE Trans. Consum. Electron."},{"key":"590_CR24","doi-asserted-by":"crossref","unstructured":"Chang, C. C., and Lee, J. S., An Efficient and Secure Multi-server Password Authentication Scheme Using Smart Cards. Proceedings of the 2004 International Conference on Cyberworlds, 417\u2013422","DOI":"10.1109\/CW.2004.17"},{"issue":"1","key":"590_CR25","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.csi.2004.03.004","volume":"27","author":"WJ Tsaur","year":"2004","unstructured":"Tsaur, W. J., Wu, C. C., Lee, W. B., A smart card-based remote scheme for password authentication in multi-server Internet services. Comput. Standards Interfaces 27(1):39\u201351, 2004.","journal-title":"Comput. Standards Interfaces"},{"issue":"3","key":"590_CR26","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.cose.2008.04.001","volume":"27","author":"JL Tsai","year":"2008","unstructured":"Tsai, J. L., Efficient multi-server authentication scheme based on one-way hash function without verification table. Comput. Secur. 27(3):115\u2013121, 2008.","journal-title":"Comput. Secur."},{"key":"590_CR27","unstructured":"Chen, Y., Huang, C. H., and Chou, J. S., Comments on two multi-server authentication protocols. IACR Cryptology ePrint Archive, 2008(544) (2008)"},{"issue":"4","key":"590_CR28","doi-asserted-by":"crossref","first-page":"431","DOI":"10.6109\/jicce.2011.9.4.431","volume":"9","author":"SG Lee","year":"2011","unstructured":"Lee, S. G., Cryptanalysis of Multiple-Server Password-Authenticated key agreement schemes using smart cards. J. Inf. Commun. Convergence Eng. 9(4):431\u2013434 , 2011.","journal-title":"J. Inf. Commun. Convergence Eng."},{"issue":"5","key":"590_CR29","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1016\/j.pmcj.2011.06.007","volume":"8","author":"F Zhu","year":"2012","unstructured":"Zhu, F., Carpenter, S., Kulkarni, A., Understanding identity exposure in pervasive computing environments. Pervasive Mob. Comput. 8(5):777\u2013794, 2012.","journal-title":"Pervasive Mob. Comput."},{"issue":"1","key":"590_CR30","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"YP Liao","year":"2009","unstructured":"Liao, Y. P., and Wang, S. S., A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Standards and Interfaces 31(1):24\u201329, 2009.","journal-title":"Comput. Standards and Interfaces"},{"issue":"6","key":"590_CR31","doi-asserted-by":"crossref","first-page":"1118","DOI":"10.1016\/j.csi.2008.11.002","volume":"31","author":"HC Hsiang","year":"2009","unstructured":"Hsiang, H. C., and Shih, W. K., Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Comput. Standards and Interfaces 31(6):1118\u20131123, 2009.","journal-title":"Comput. Standards and Interfaces"},{"issue":"2","key":"590_CR32","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.jnca.2010.11.011","volume":"34","author":"SK Sood","year":"2011","unstructured":"Sood, S. K., Sarje, A. K., Singh, K. A., A secure dynamic identity based authentication protocol for multi-server architecture. J. Netw. Comput. Appl. 34(2):609\u2013618, 2011.","journal-title":"J. Netw. Comput. Appl."},{"issue":"11","key":"590_CR33","first-page":"13863","volume":"38","author":"CC Lee","year":"2011","unstructured":"Lee, C. C., Lin, T. H., Chang, R. X., A secure dynamic ID based remote user authentication scheme for multi-server environment using smart cards. Expert Syst. Appl. 38(11):13863\u201313870, 2011.","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"590_CR34","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1016\/j.jss.2011.10.049","volume":"85","author":"WJ Tsaur","year":"2012","unstructured":"Tsaur, W. J., Li, J. H., Lee, W. B., An efficient and secure multi-server authentication scheme with key agreement. J. Syst. Softw. 85(4):876\u2013882, 2012.","journal-title":"J. Syst. Softw."},{"issue":"1","key":"590_CR35","first-page":"876","volume":"76","author":"CC Lee","year":"2014","unstructured":"Lee, C. C., Lou, D. C., Li, C. T., Hsu, C. W., An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn. 76(1):876\u2013882, 2014.","journal-title":"Nonlinear Dyn."},{"key":"590_CR36","doi-asserted-by":"crossref","unstructured":"Li, X., Niu, J., Kumari, S., Islam, S. H., Wu, F., Khan, M. K., and Das, A. K., A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security, Wireless Personal Communications, 1\u201329 (2016)","DOI":"10.1007\/s11277-016-3293-x"},{"issue":"4","key":"590_CR37","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang, D., He, D., Wang, P., Chu, C., Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4):428\u2013442, 2015.","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"12","key":"590_CR38","doi-asserted-by":"crossref","first-page":"2899","DOI":"10.1016\/j.jss.2012.06.063","volume":"85","author":"TH Kim","year":"2012","unstructured":"Kim, T. H., Kim, C., Park, I., Side channel analysis attacks using am demodulation on commercial smart cards with seed. J. Syst. Softw. 85(12):2899\u20132908, 2012.","journal-title":"J. Syst. Softw."},{"issue":"11","key":"590_CR39","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi, A., Breveglieri, L., Naccache, D., Fault injection attacks on cryptographic devices: theory, practice, and countermeasures. Proc. IEEE 100(11):3056\u20133076, 2012.","journal-title":"Proc. IEEE"},{"key":"590_CR40","unstructured":"Cheng, Z., Nistazakis, M., Comley, R., and Vasiu, L., On the Indistinguishability-Based security model of key agreement Protocols-Simple cases. IACR Cryptology ePrint Archive, 129 (2005)"},{"key":"590_CR41","doi-asserted-by":"crossref","unstructured":"Bonneau, J., The science of guessing: Analyzing an anonymized corpus of 70 million passwords. 2012 IEEE Symposium on Security and Privacy 538-552 (2012)","DOI":"10.1109\/SP.2012.49"},{"key":"590_CR42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.adhoc.2014.03.003","volume":"20","author":"D Wang","year":"2014","unstructured":"Wang, D., and Wang, P., Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Netw. 20:1\u201315, 2014.","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"590_CR43","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 8(1):18\u201336, 1990.","journal-title":"ACM Trans. Comput. Syst."},{"issue":"1","key":"590_CR44","doi-asserted-by":"crossref","first-page":"2969","DOI":"10.1016\/j.cnsns.2011.11.025","volume":"17","author":"K Xue","year":"2012","unstructured":"Xue, K., and Hong, P., Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(1):2969\u20132977, 2012.","journal-title":"Commun. Nonlinear Sci. Numer. Simul."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0590-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0590-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0590-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T10:48:16Z","timestamp":1568371696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0590-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,15]]},"references-count":44,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["590"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0590-6","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2016,9,15]]},"article-number":"228"}}