{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T17:03:37Z","timestamp":1765040617473,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T00:00:00Z","timestamp":1474243200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10916-016-0592-4","type":"journal-article","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T06:29:11Z","timestamp":1474266551000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9321-6956","authenticated-orcid":false,"given":"Shehzad Ashraf","family":"Chaudhry","sequence":"first","affiliation":[]},{"given":"Muhammad Tawab","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Taeshik","family":"Shon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,19]]},"reference":[{"issue":"11","key":"592_CR1","doi-asserted-by":"crossref","first-page":"e0142716","DOI":"10.1371\/journal.pone.0142716","volume":"10","author":"M Alizadeh","year":"2015","unstructured":"Alizadeh, M., Zamani, M., Baharun, S., Manaf, A. A., Sakurai, K., Anada, H., Keshavarz, H., Chaudhry, S. A., Khan, M. K., Cryptanalysis and improvement of a secure password authentication mechanism for seamless handover in proxy mobile ipv6 networks. PloS one 10(11):e0142716, 2015.","journal-title":"PloS one"},{"key":"592_CR2","unstructured":"Mir, O., and Nikooghadam, M.: A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services"},{"issue":"1","key":"592_CR3","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2013","unstructured":"He, D., Kumar, N., Chen, J., Lee, C.-C., Chilamkurti, N., Yeo, S.-S., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21(1): 49\u201360, 2013.","journal-title":"Multimed. Syst."},{"key":"592_CR4","doi-asserted-by":"publisher","unstructured":"Maitra, T., Obaidat, M. S., Islam, S. H., Giri, D., Amin, R.: Security analysis and design of an efficient ecc-based two-factor password authentication scheme. Security and Communication Networks (2016) n\/a\u2013n\/aSec 1596 doi: 10.1002\/sec.1596","DOI":"10.1002\/sec.1596"},{"key":"592_CR5","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","volume":"73","author":"D Wang","year":"2014","unstructured":"Wang, D., and Wang, P., On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions. Comput. Netw. 73:41\u201357, 2014.","journal-title":"Comput. Netw."},{"key":"592_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TDSC.2014.2355850","volume":"99","author":"D Wang","year":"2014","unstructured":"Wang, D., He, D., Wang, P., Chu, C., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Depend Secur Comput 99:1\u20131, 2014. doi: 10.1109\/TDSC.2014.2355850 .","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"592_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2016.2544805","volume":"99","author":"D He","year":"2016","unstructured":"He, D., Zeadally, S., Kumar, N., Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst J 99:1\u201312, 2016. doi: 10.1109\/JSYST.2016.2544805 .","journal-title":"IEEE Syst J"},{"issue":"3","key":"592_CR8","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816\u2013823, 2015. doi: 10.1109\/JSYST.2014.2301517 .","journal-title":"IEEE Syst J"},{"key":"592_CR9","first-page":"393","volume":"2012","author":"MS Farash","year":"2012","unstructured":"Farash, M. S., Ahmadian-Attari, M., Bayat, M., A certificateless multiple-key agreement protocol based on bilinear pairings. IACR Crypt ePrint Arch 2012:393, 2012.","journal-title":"IACR Crypt ePrint Arch"},{"issue":"2","key":"592_CR10","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1016\/j.compeleceng.2012.09.004","volume":"39","author":"MS Farash","year":"2013","unstructured":"Farash, M. S., Attari, M. A., Atani, R. E., Jami, M., A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput Elect Eng 39(2):530\u2013541, 2013.","journal-title":"Comput Elect Eng"},{"issue":"11","key":"592_CR11","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Islam, S. H., Biswas, G., Khan, M. K., Kumar, N., An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography. J Med Syst 39 (11):1\u201318, 2015.","journal-title":"J Med Syst"},{"key":"592_CR12","doi-asserted-by":"crossref","unstructured":"Alizadeh, M., Baharun, S., Zamani, M., Khodadadi, T., Darvishi, M., Gholizadeh, S., Ahmadi, H., Anonymity and untraceability assessment of authentication protocols in proxy mobile ipv6. Jurnal Teknologi 72(5).","DOI":"10.11113\/jt.v72.3936"},{"key":"592_CR13","unstructured":"He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci."},{"key":"592_CR14","doi-asserted-by":"crossref","unstructured":"Arshad, H., and Nikooghadam, M., An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimed Tools Appl.,1\u201317, 2014.","DOI":"10.1007\/s11042-014-2282-x"},{"key":"592_CR15","doi-asserted-by":"crossref","unstructured":"He, D., Kumar, N., Shen, H., Lee, J.-H., One-to-many authentication for access control in mobile pay-tv systems. Sci. Chin. Inf. Sci.,1\u201314, 2015.","DOI":"10.1007\/s11432-015-5469-5"},{"key":"592_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSYST.2015.2428620","volume":"99","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Wu, L., Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 99:1\u201310, 2015. doi: 10.1109\/JSYST.2015.2428620 .","journal-title":"IEEE Syst. J."},{"issue":"11","key":"592_CR17","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin, A. T. B., Ling, D. N. C., Goh, A., Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog. 37(11):2245\u20132255, 2004.","journal-title":"Pattern Recog."},{"issue":"3","key":"592_CR18","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recog. 40(3): 1057\u20131065, 2007.","journal-title":"Pattern Recog."},{"issue":"11","key":"592_CR19","doi-asserted-by":"crossref","first-page":"1860","DOI":"10.1002\/sec.900","volume":"7","author":"L Leng","year":"2014","unstructured":"Leng, L., Teoh, A. B. J., Li, M., Khan, M. K., A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur. Commun. Netw. 7(11):1860\u20131871, 2014.","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"592_CR20","doi-asserted-by":"crossref","first-page":"2290","DOI":"10.1016\/j.patcog.2015.01.021","volume":"48","author":"L Leng","year":"2015","unstructured":"Leng, L., and Teoh, A. B. J., Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recog. 48(7):2290\u20132303, 2015.","journal-title":"Pattern Recog."},{"key":"592_CR21","doi-asserted-by":"publisher","unstructured":"Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.: On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Wagner, D. (Ed.) Advances in Cryptology, CRYPTO 2008, Vol. 5157 of Lecture Notes in Computer Science, pp. 203\u2013220. Springer, Berlin (2008), 10.1007\/978-3-540-85174-5_12","DOI":"10.1007\/978-3-540-85174-5_12"},{"issue":"2","key":"592_CR22","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A. C., On the security of public key protocols. IEEE Trans. Inform. Theory 29(2): 198\u2013208, 1983. doi: 10.1109\/TIT.1983.1056650 .","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"8","key":"592_CR23","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/LCOMM.2006.1665116","volume":"10","author":"X Cao","year":"2006","unstructured":"Cao, X., and Zhong, S., Breaking a remote user authentication scheme for multi-server architecture. IEEE Commun. Lett. 10(8):580\u2013581, 2006. doi: 10.1109\/LCOMM.2006.1665116 .","journal-title":"IEEE Commun. Lett."},{"issue":"5","key":"592_CR24","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"592_CR25","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology CRYPTO 99, pp. 388\u2013397. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"1","key":"592_CR26","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1002\/dac.1286","volume":"25","author":"Q Xie","year":"2012","unstructured":"Xie, Q., A new authenticated key agreement for session initiation protocol. Int. J. Commun. Syst. 25(1):47\u201354, 2012.","journal-title":"Int. J. Commun. Syst."},{"issue":"7","key":"592_CR27","doi-asserted-by":"crossref","first-page":"e102747","DOI":"10.1371\/journal.pone.0102747","volume":"9","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Hu, B., Dong, N., Wong, D. S., Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems. PloS one 9(7):e102747, 2014.","journal-title":"PloS one"},{"key":"592_CR28","doi-asserted-by":"crossref","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X., An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl.,1\u201320, 2016.","DOI":"10.1007\/s12083-016-0485-9"},{"key":"592_CR29","doi-asserted-by":"publisher","unstructured":"Chaudhry, S. A., Farash, M. S., Naqvi, H., Kumari, S., Khan, M. K., An enhanced privacy preserving remote user authentication scheme with provable security. Secur. Commun. Netw., 1\u201313, 2015. doi: 10.1002\/sec.1299 .","DOI":"10.1002\/sec.1299"},{"issue":"2","key":"592_CR30","first-page":"98","volume":"18","author":"S Kalra","year":"2013","unstructured":"Kalra, S., and Sood, S., Advanced remote user authentication protocol for multi-server architecture based on ecc. J. Inf. Secur. Appl. 18(2):98\u2013107, 2013.","journal-title":"J. Inf. Secur. Appl."},{"key":"592_CR31","doi-asserted-by":"crossref","unstructured":"Kim, H., Jeon, W., Lee, K., Lee, Y., Won, D.: Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. In: Computational Science and Its Applications\u2013ICCSA 2012, pp. 391\u2013406. Springer (2012)","DOI":"10.1007\/978-3-642-31137-6_30"},{"issue":"1","key":"592_CR32","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s11227-010-0512-1","volume":"63","author":"E-J Yoon","year":"2013","unstructured":"Yoon, E.-J., and Yoo, K.-Y., Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J. Supercomput. 63(1):235\u2013255, 2013.","journal-title":"J. Supercomput."},{"issue":"2","key":"592_CR33","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1109\/SURV.2013.091513.00050","volume":"16","author":"HH Kilinc","year":"2014","unstructured":"Kilinc, H. H., and Yanik, T., A survey of sip authentication and key agreement schemes. IEEE Commun. Surveys Tutor. 16(2):1005\u20131023, 2014.","journal-title":"IEEE Commun. Surveys Tutor."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0592-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0592-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0592-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T14:49:09Z","timestamp":1568386149000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0592-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,19]]},"references-count":33,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["592"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0592-4","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2016,9,19]]},"article-number":"230"}}