{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T11:08:55Z","timestamp":1762340935665,"version":"3.37.3"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,9,17]],"date-time":"2016-09-17T00:00:00Z","timestamp":1474070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s10916-016-0596-0","type":"journal-article","created":{"date-parts":[[2016,9,17]],"date-time":"2016-09-17T06:49:17Z","timestamp":1474094957000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Analysis of Security Protocols for Mobile Healthcare"],"prefix":"10.1007","volume":"40","author":[{"given":"Mohammad","family":"Wazid","sequence":"first","affiliation":[]},{"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5196-9589","authenticated-orcid":false,"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Vanga","family":"Odelu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,17]]},"reference":[{"key":"596_CR1","unstructured":"Asare, P.: Emerging health monitoring systems. https:\/\/pages.shanti.virginia.edu\/Science_Straight_Up . Accessed on June 2016"},{"issue":"4","key":"596_CR2","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/JSAC.2009.090504","volume":"27","author":"A Boukerche","year":"2009","unstructured":"Boukerche, A., and Ren, Y., A secure mobile healthcare system using trust-based multicast scheme. IEEE J. Selected Areas Commun. 27(4):387\u2013399, 2009.","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"1","key":"596_CR3","first-page":"143","volume":"36","author":"S Arora","year":"2014","unstructured":"Arora, S., Yttri, J., Nilsen, W., Privacy and security in mobile health (mHealth) research. Alcohol Res. Current Rev. 36(1):143, 2014.","journal-title":"Alcohol Res. Current Rev."},{"key":"596_CR4","unstructured":"Is Mobile Healthcare the Future. http:\/\/www.greatcall.com\/greatcall\/lp\/is-mobile-healthcare-the-future-infographic.aspx . Accessed on June 2016"},{"issue":"3","key":"596_CR5","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/j.dss.2011.03.003","volume":"51","author":"L Wu","year":"2011","unstructured":"Wu, L., Li, J. Y., Fu, C. Y., The adoption of mobile healthcare by hospital\u2019s professionals: an integrative perspective. Decis. Support Syst. 51(3):587\u2013596, 2011.","journal-title":"Decis. Support Syst."},{"issue":"24","key":"596_CR6","first-page":"1","volume":"10","author":"MN Kamel Boulos","year":"2011","unstructured":"Kamel Boulos, M. N., Wheeler, S., Tavares, C., Jones, R., How smartphones are changing the face of mobile and participatory healthcare: an overview, with example from eCAALYX. BioMed. Eng. OnLine 10(24):1\u201314, 2011.","journal-title":"BioMed. Eng. OnLine"},{"issue":"1","key":"596_CR7","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MWC.2010.5416351","volume":"17","author":"Y Ren","year":"2010","unstructured":"Ren, Y., Werner, R., Pazzi, N., Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wireless Commun. 17(1):59\u201365, 2010.","journal-title":"IEEE Wireless Commun."},{"issue":"9","key":"596_CR8","doi-asserted-by":"crossref","first-page":"1961","DOI":"10.1109\/TMC.2014.2365185","volume":"14","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Chen, Y., Chuah, M. C., Yang, J., User verification leveraging gait recognition for Smartphone enabled mobile healthcare systems. IEEE Trans. Mobile Comput. 14(9):1961\u20131974, 2015.","journal-title":"IEEE Trans. Mobile Comput."},{"key":"596_CR9","unstructured":"National Cancer Institute, Chemotherapy. http:\/\/www.cancer.gov\/about-cancer\/treatment\/types\/chemotherapy . Accessed on June 2016"},{"key":"596_CR10","unstructured":"Diana, A.: Securing Mobile Healthcare Devices: Best Practices. http:\/\/www.informationweek.com\/healthcare\/security-and-privacy\/securing-mobile-healthcare-devices-best-practices\/d\/d-id\/1269357 . Accessed on June 2016"},{"issue":"1","key":"596_CR11","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"53","author":"D He","year":"2015","unstructured":"He, D., and Zeadally, S., Authentication protocol for an ambient assisted living system. IEEE Commun. Mag. 53(1):71\u201377, 2015.","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"596_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-012-9920-5","volume":"37","author":"V Odelu","year":"2013","unstructured":"Odelu, V., Das, A. K., Goswami, A., An effective and secure key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst. 37(2):1\u201318, 2013.","journal-title":"J. Med. Syst."},{"key":"596_CR13","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N., Elliptic curves cryptosystems. Math. Comput. 48:203\u2013209, 1987.","journal-title":"Math. Comput."},{"key":"596_CR14","unstructured":"Stallings, W: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice Hall (2003)"},{"key":"596_CR15","unstructured":"Secure Hash Standard: FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (1995)"},{"key":"596_CR16","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology-Eurocrypt 2004","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Advances in Cryptology-Eurocrypt 2004, pp. 523\u2013540. Springer, Interlaken (2004)"},{"issue":"9","key":"596_CR17","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., Goswami, A., A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forens. Secur. 10(9):1953\u20131966, 2015.","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"11","key":"596_CR18","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jina","year":"2004","unstructured":"Jina, A. T. B., Linga, D. N. C., Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog. 37(11):2245\u20132255, 2004.","journal-title":"Pattern Recog."},{"issue":"3","key":"596_CR19","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern Recog. 40(3): 1057\u20131065, 2007.","journal-title":"Pattern Recog."},{"issue":"1","key":"596_CR20","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"50","author":"L Zhang","year":"2008","unstructured":"Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons and Fractals 50(1):669\u2013674, 2008.","journal-title":"Chaos, Solitons and Fractals"},{"key":"596_CR21","unstructured":"HIT Consultant, 5 Best Practices for Mobile Device Security in Healthcare. https:\/\/www.hitconsultant.net\/2015\/11\/03\/5-best-practices-for-mobile-device-security-in-healthcare\/ . Accessed on June 2016"},{"key":"596_CR22","unstructured":"Pittman, D.: 5 Problems With Mobile Health App Security. https:\/\/www.theguardian.com\/society\/2000\/jun\/25\/futureofthenhs.health . Accessed on June 2016"},{"key":"596_CR23","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1016\/j.chb.2016.03.065","volume":"62","author":"EC Nelson","year":"2016","unstructured":"Nelson, E. C., Verhagen, T., Noordzij, M. L., Health empowerment through activity trackers: an empirical smart wristband study. Comput. Human Behav. 62:364\u2013374, 2016.","journal-title":"Comput. Human Behav."},{"key":"596_CR24","first-page":"468","volume-title":"17th International Symposium on Quality Electronic Design (ISQED)","author":"TC Phang","year":"2016","unstructured":"Phang, T. C., Mokhtar, M. H., Mokhtar, M. N., Rokhani, F. Z.: Time-division multiple access based intra-body communication for wearable health tracker. In: 17th International Symposium on Quality Electronic Design (ISQED), pp. 468\u2013472. Santa Clara, USA (2016)"},{"key":"596_CR25","unstructured":"Sullivan, D.: My life with the Fitbvit One activity tracker. http:\/\/www.cnet.com\/news\/my-life-with-the-fitbit-one-activity-tracker . Accessed on June 2016"},{"key":"596_CR26","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.future.2014.02.001","volume":"35","author":"G Fortino","year":"2014","unstructured":"Fortino, G., and Pathan, M., Integration of cloud computing and body sensor networks. Future Gen. Comput. Syst. 35:57\u201361, 2014.","journal-title":"Future Gen. Comput. Syst."},{"key":"596_CR27","unstructured":"Advanced Encryption Standard (AES), National Institute of Standards and Technology (NIST). http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf . Accessed on June 2016"},{"issue":"1","key":"596_CR28","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/s13246-014-0315-4","volume":"38","author":"MM Baig","year":"2015","unstructured":"Baig, M. M., GholamHosseini, H., Connolly, M. J., Mobile healthcare applications: system design review, critical issues and challenges. Aust. Phys. Eng. Sci. Med. 38(1):23\u201338, 2015.","journal-title":"Aust. Phys. Eng. Sci. Med."},{"issue":"2","key":"596_CR29","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R. L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120\u2013126, 1978.","journal-title":"Commun. ACM"},{"issue":"8","key":"596_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0259-6","volume":"39","author":"H Arshad","year":"2015","unstructured":"Arshad, H., Teymoori, V., Nikooghadam, M., Abbassi, H., On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 39(8):1\u201310, 2015.","journal-title":"J. Med. Syst."},{"issue":"5","key":"596_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0041-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5): 1\u201311, 2014.","journal-title":"J. Med. Syst."},{"issue":"4","key":"596_CR32","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1007\/s11277-015-2538-4","volume":"83","author":"O Mir","year":"2015","unstructured":"Mir, O., and Nikooghadam, M., A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services. Wireless Person. Commun. 83(4):2439\u20132461, 2015.","journal-title":"Wireless Person. Commun."},{"issue":"3","key":"596_CR33","first-page":"1","volume":"39","author":"AK Das","year":"2015","unstructured":"Das, A. K., A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems. J. Med. Syst. 39(3):1\u201320, 2015.","journal-title":"J. Med. Syst."},{"key":"596_CR34","doi-asserted-by":"publisher","unstructured":"Liu, C. H., and Chung, Y. F.: Secure user authentication scheme for wireless healthcare sensor networks. Computers & Electrical Engineering. doi: 10.1016\/j.compeleceng.2016.01.002 2016","DOI":"10.1016\/j.compeleceng.2016.01.002"},{"issue":"9","key":"596_CR35","first-page":"1","volume":"39","author":"AK Das","year":"2015","unstructured":"Das, A. K., Odelu, V., Goswami, A., A secure and robust user authenticated key agreement scheme for hierarchical multi-medical server environment in TMIS. J. Med. Syst. 39(9):1\u201324, 2015.","journal-title":"J. Med. Syst."},{"issue":"13","key":"596_CR36","doi-asserted-by":"crossref","first-page":"1983","DOI":"10.1002\/sec.1452","volume":"9","author":"M Wazid","year":"2016","unstructured":"Wazid, M., Das, A. K., Kumari, S., Li, X., Wu, F., Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. Secur. Commun. Netw. 9(13):1983\u20132001, 2016.","journal-title":"Secur. Commun. Netw."},{"key":"596_CR37","doi-asserted-by":"crossref","unstructured":"David, D. B., Mutual authentication scheme for multimedia medical information systems. Multimed. Tools Appl.,1\u201319, 2016.","DOI":"10.1007\/s11042-016-3268-7"},{"issue":"1","key":"596_CR38","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11277-015-2736-0","volume":"85","author":"DB David","year":"2015","unstructured":"David, D. B., Rajappa, M., Karupuswamy, T., Iyer, S. P., A dynamic-identity based multimedia server client authentication scheme for tele-care multimedia medical information system. Wireless Person. Commun. 85(1): 241\u2013261, 2015.","journal-title":"Wireless Person. Commun."},{"issue":"11","key":"596_CR39","first-page":"1","volume":"39","author":"CT Li","year":"2015","unstructured":"Li, C. T., Weng, C. Y., Lee, C. C., Wang, C. C., A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system. J. Med. Syst. 39(11):1\u201311, 2015.","journal-title":"J. Med. Syst."},{"issue":"3","key":"596_CR40","doi-asserted-by":"crossref","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M. L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 8 (3):1086\u20131090 , 2009.","journal-title":"IEEE Trans. Wireless Commun."},{"key":"596_CR41","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.cmpb.2016.07.028","volume":"135","author":"AK Sutrala","year":"2016","unstructured":"Sutrala, A. K., Das, A. K., Odelu, V., Wazid, M., Kumari, S., Secure anonymity-preserving password-based user authentication and session key agreement protocol for telecare medicine information systems. Comput. Methods Programs Biomed. 135:167\u2013185, 2016.","journal-title":"Comput. Methods Programs Biomed."},{"issue":"1","key":"596_CR42","first-page":"1","volume":"38","author":"Z Siddiqui","year":"2013","unstructured":"Siddiqui, Z., Abdullah, A. H., Khan, M. K., Alghamdi, A. S., Smart environment as a service: three factor cloud based user authentication for telecare medical information system. J. Med. Syst. 38(1):1\u201314, 2013.","journal-title":"J. Med. Syst."},{"key":"596_CR43","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Khan, M. K., Lu, X., Ma, J., He, D., A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput.,1\u201324, 2016.","DOI":"10.1007\/s11227-015-1610-x"},{"key":"596_CR44","doi-asserted-by":"publisher","unstructured":"Zhang, L., Zhu, S., and Tang, S.: Privacy protection for telecare medicine information systems using a chaotic mapbased three-factor authenticated key agreement scheme. IEEE Journal of Biomedical and Health Informatics. doi: 10.1109\/JBHI.2016.2517146 2016","DOI":"10.1109\/JBHI.2016.2517146"},{"issue":"3","key":"596_CR45","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2011","unstructured":"Das, A. K., Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3):145\u2013151, 2011.","journal-title":"IET Inf. Secur."},{"key":"596_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C. T., and Hwang, M. S., An efficient biometric-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33:1\u20135, 2010.","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"596_CR47","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1002\/dac.2676","volume":"28","author":"X Li","year":"2015","unstructured":"Li, X., Niu, J., Liao, J., Liang, W., Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst. 28(2):374\u2013382, 2015.","journal-title":"Int. J. Commun. Syst."},{"issue":"1","key":"596_CR48","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/s11277-014-2002-x","volume":"80","author":"X Li","year":"2015","unstructured":"Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., An enhancement of a smart card authentication scheme for multi-server architecture. Wireless Person. Commun. 80(1):175\u2013192, 2015.","journal-title":"Wireless Person. Commun."},{"issue":"10","key":"596_CR49","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1002\/sec.767","volume":"7","author":"X Li","year":"2014","unstructured":"Li, X., Niu, J., Wang, Z., Chen, C., Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur. Commun. Netw. 7(10):1488\u20131497, 2014.","journal-title":"Secur. Commun. Netw."},{"key":"596_CR50","unstructured":"Browne, A.: Lives ruined as NHS leaks patients\u2019 notes. http:\/\/www.medpagetoday.com\/practicemanagement\/informationtechnology\/44161 . Accessed on June 2016"},{"key":"596_CR51","unstructured":"Ohri, A.: Denial of service attacks against hospitals and emergency rooms. https:\/\/decisionstats.com\/2011\/09\/21\/denial-of-service-attacks-against-hospitals-and-emergency-rooms . Accessed on June 2016"},{"key":"596_CR52","unstructured":"White, J.: How hospitals can fight back against new hacker attacks. http:\/\/www.healthcarebusinesstech.com\/ddos-attacks-hospitals . Accessed on June 2016"},{"key":"596_CR53","unstructured":"Ouellette, P.: DDoS attack considerations for healthcare organizations. http:\/\/healthitsecurity.com\/news\/ddos-attack-considerations-for-healthcare-organizations . Accessed on June 2016"},{"issue":"11","key":"596_CR54","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jina","year":"2004","unstructured":"Jina, A. T. B., Linga, D. N. C., Goh, A., Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog. 37(11):2245\u20132255, 2004.","journal-title":"Pattern Recog."},{"issue":"3","key":"596_CR55","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern Recog. 40(3): 1057\u20131065, 2007.","journal-title":"Pattern Recog."},{"issue":"1","key":"596_CR56","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/S0960-0779(04)00456-4","volume":"24","author":"D Xiao","year":"2005","unstructured":"Xiao, D., Liao, X., Deng, S., One-way hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons & Fractals 24(1):65\u201371, 2005.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"3","key":"596_CR57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0422-0","volume":"40","author":"J Moon","year":"2016","unstructured":"Moon, J., Choi, Y., Kim, J., Won, D., An improvement of robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps. J. Med. Syst. 40(3): 1\u201311, 2016.","journal-title":"J. Med. Syst."},{"issue":"9","key":"596_CR58","first-page":"1","volume":"39","author":"O Mir","year":"2015","unstructured":"Mir, O., van der Weide, T., Lee, C. C., A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. J. Med. Syst. 39(9):1\u201316, 2015.","journal-title":"J. Med. Syst."},{"issue":"12","key":"596_CR59","doi-asserted-by":"crossref","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He, D., Zeadally, S., Xu, B., Huang, X., An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forens. Secur. 10(12):2681\u20132691, 2015.","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"1","key":"596_CR60","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He, D., Kumar, N., Lee, J. H., Sherratt, R. S., Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans. Consum. Electron. 60(1):30\u201337, 2014.","journal-title":"IEEE Trans. Consum. Electron."},{"key":"596_CR61","doi-asserted-by":"crossref","unstructured":"Lee, T. F.: Provably secure anonymous single-sign-on authentication mechanisms using extended Chebyshev chaotic maps for distributed computer networks. IEEE Syst. J. (2015)","DOI":"10.1109\/JSYST.2015.2471095"},{"issue":"7","key":"596_CR62","first-page":"50","volume":"35","author":"S Vanstone","year":"1992","unstructured":"Vanstone, S., Responses to NIST\u2019s proposal. Commun. ACM 35(7):50\u201352, 1992.","journal-title":"Commun. ACM"},{"issue":"1","key":"596_CR63","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MWC.2004.1269719","volume":"11","author":"K Lauter","year":"2004","unstructured":"Lauter, K., The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Commun. 11 (1):62\u201367, 2004.","journal-title":"IEEE Wireless Commun."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0596-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0596-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0596-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T12:07:26Z","timestamp":1718798846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0596-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,17]]},"references-count":63,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["596"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0596-0","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2016,9,17]]},"article-number":"229"}}