{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:47:04Z","timestamp":1762004824133},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T00:00:00Z","timestamp":1476230400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s10916-016-0629-8","type":"journal-article","created":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T06:18:50Z","timestamp":1476253130000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":59,"title":["Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications"],"prefix":"10.1007","volume":"40","author":[{"given":"Xiong","family":"Li","sequence":"first","affiliation":[]},{"given":"Jianwei","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Marimuthu","family":"Karuppiah","sequence":"additional","affiliation":[]},{"given":"Saru","family":"Kumari","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,12]]},"reference":[{"issue":"2","key":"629_CR1","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia, Z., Wang, X., Sun, X., and Wang, Q., A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2):340\u2013352, 2016.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"9","key":"629_CR2","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., and Huang, F., Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9):2546\u20132559, 2016.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"629_CR3","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1587\/transcom.E98.B.190","volume":"98","author":"Z Fu","year":"2015","unstructured":"Fu, Z., Sun, X., Liu, Q., Zhou, L., and Shu, J., Achieving effocient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1):190\u2013200, 2015.","journal-title":"IEICE Trans. Commun."},{"issue":"2","key":"629_CR4","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren, Y., Shen, J., Wang, J., Han, J., and Lee, S., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2):317\u2013323, 2015.","journal-title":"J. Internet Technol."},{"issue":"4","key":"629_CR5","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/j.csi.2008.09.006","volume":"31","author":"J Xu","year":"2009","unstructured":"Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723\u2013728, 2009.","journal-title":"Comput. Stand. Interfaces"},{"issue":"4","key":"629_CR6","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"YY Wang","year":"2009","unstructured":"Wang, Y. Y., Liu, J. Y., Xiao, F. X., and Dan, J., A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32(4):583\u2013585, 2009.","journal-title":"Comput. Commun."},{"issue":"5","key":"629_CR7","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.csi.2010.03.008","volume":"32","author":"R Song","year":"2010","unstructured":"Song, R., Advanced smart card based password authentication protocol. Comput. Stand. Interfaces 32(5):321\u2013325, 2010.","journal-title":"Comput. Stand. Interfaces"},{"key":"629_CR8","doi-asserted-by":"crossref","unstructured":"Sood, S. K., Sarje, A. K., and Singh, K., An improvement of Xu et al.\u2019s authentication scheme using smart cards. In: Proceedings of the Third Annual ACM Bangalore Conference, p. 15. ACM, (2010)","DOI":"10.1145\/1754288.1754303"},{"issue":"3","key":"629_CR9","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"MK Khan","year":"2011","unstructured":"Khan, M. K., Kim, S. K., and Alghathbar, K., Cryptanalysis and security enhancement of a \u2018more efficient & secure dynamic ID-based remote user authentication scheme\u2019. Comput. Commun. 34(3):305\u2013309, 2011.","journal-title":"Comput. Commun."},{"issue":"2","key":"629_CR10","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1002\/dac.2368","volume":"27","author":"BL Chen","year":"2014","unstructured":"Chen, B. L., Kuo, W. C., and Wuu, L. C., Robust smart-card-based remote user password authentication scheme. Int. J. Commun. Syst. 27(2):377\u2013389, 2014.","journal-title":"Int. J. Commun. Syst."},{"issue":"12","key":"629_CR11","doi-asserted-by":"crossref","first-page":"3939","DOI":"10.1002\/dac.2590","volume":"27","author":"S Kumari","year":"2014","unstructured":"Kumari, S., and Khan, M. K., Cryptanalysis and improvement of \u2018a robust smart-card-based remote user password authentication scheme\u2019. Int. J. Commun. Syst. 27(12):3939\u20133955, 2014.","journal-title":"Int. J. Commun. Syst."},{"issue":"5","key":"629_CR12","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X., Niu, J., Khan, M. K., and Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365\u20131371, 2013.","journal-title":"J. Netw. Comput. Appl."},{"key":"629_CR13","unstructured":"An, Y. H., Security improvements of dynamic id-based remote user authentication scheme with session key agreement. In: 15th International Conference on Advanced Communication Technology (ICACT), 2013, pp. 1072\u20131076. IEEE (2013)"},{"issue":"11","key":"629_CR14","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Islam, S. H., Biswas, G., Khan, M. K., and Li, X., Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems. J. Med. Syst. 39(11):1\u201321, 2015.","journal-title":"J. Med. Syst."},{"issue":"2","key":"629_CR15","first-page":"67","volume":"20","author":"SK Sood","year":"2011","unstructured":"Sood, S. K., Secure dynamic identity-based authentication scheme using smart cards. Information Security Journal: A Global Perspective 20(2):67\u201377, 2011.","journal-title":"Information Security Journal: A Global Perspective"},{"issue":"1","key":"629_CR16","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s11277-012-0696-1","volume":"70","author":"D He","year":"2013","unstructured":"He, D., and Wu, S., Security flaws in a smart card based authentication scheme for multi-server environment. Wirel. Pers. Commun. 70(1):323\u2013329, 2013.","journal-title":"Wirel. Pers. Commun."},{"key":"629_CR17","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1016\/j.ins.2015.03.070","volume":"321","author":"D Wang","year":"2015","unstructured":"Wang, D., Wang, N., Wang, P., and Qing, S., Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321:162\u2013178, 2015.","journal-title":"Inf. Sci."},{"issue":"10","key":"629_CR18","doi-asserted-by":"crossref","first-page":"2215","DOI":"10.1002\/dac.2468","volume":"27","author":"CG Ma","year":"2014","unstructured":"Ma, C. G., Wang, D., and Zhao, S. D., Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst. 27(10):2215\u20132227, 2014.","journal-title":"Int. J. Commun. Syst."},{"issue":"4","key":"629_CR19","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang, D., He, D., Wang, P., and Chu, C. H., Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Dependable Secure Comput. 12(4):428\u2013442, 2015.","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"6","key":"629_CR20","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Geng, X. H., Kim, C. S., and Kim, J. U., A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6):929\u2013935, 2014.","journal-title":"J. Internet Technol."},{"issue":"3","key":"629_CR21","doi-asserted-by":"crossref","first-page":"2055","DOI":"10.1007\/s11277-015-2524-x","volume":"84","author":"M Karuppiah","year":"2015","unstructured":"Karuppiah, M., and Saravanan, R., A secure authentication scheme with user anonymity for roaming service in global mobility networks. Wirel. Pers. Commun. 84(3):2055\u20132078, 2015.","journal-title":"Wirel. Pers. Commun."},{"issue":"10","key":"629_CR22","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1002\/sec.767","volume":"7","author":"X Li","year":"2014","unstructured":"Li, X., Niu, J., Wang, Z., and Chen, C., Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks 7(10):1488\u20131497, 2014.","journal-title":"Security and Communication Networks"},{"issue":"6","key":"629_CR23","doi-asserted-by":"crossref","first-page":"1997","DOI":"10.1016\/j.compeleceng.2014.05.007","volume":"40","author":"S Kumari","year":"2014","unstructured":"Kumari, S., Khan, M. K., and Li, X., An improved remote user authentication scheme with key agreement. Comput. Electr. Eng. 40(6):1997\u20132012, 2014.","journal-title":"Comput. Electr. Eng."},{"issue":"9","key":"629_CR24","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1002\/dac.3126","volume":"29","author":"S Islam","year":"2016","unstructured":"Islam, S., Obaidat, M. S., and Amin, R., An anonymous and provably secure authentication scheme for mobile user. Int. J. Commun. Syst. 29(9):1529\u20131544, 2016.","journal-title":"Int. J. Commun. Syst."},{"issue":"8","key":"629_CR25","doi-asserted-by":"crossref","first-page":"e0131368","DOI":"10.1371\/journal.pone.0131368","volume":"10","author":"SH Islam","year":"2015","unstructured":"Islam, S. H., Khan, M. K., and Li, X., Security analysis and improvement of \u2018a more secure anonymous user authentication scheme for the integrated EPR information system\u2019. PloS one 10(8):e0131368, 2015.","journal-title":"PloS one"},{"issue":"2","key":"629_CR26","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1002\/dac.2676","volume":"28","author":"X Li","year":"2015","unstructured":"Li, X., Niu, J., Liao, J., and Liang, W., Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst. 28(2):374\u2013382, 2015.","journal-title":"Int. J. Commun. Syst."},{"issue":"3","key":"629_CR27","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3):816\u2013823, 2015.","journal-title":"IEEE Syst. J."},{"key":"629_CR28","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.ins.2015.02.010","volume":"321","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., and Chilamkurti, N., A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321:263\u2013277, 2015.","journal-title":"Inf. Sci."},{"key":"629_CR29","doi-asserted-by":"publisher","unstructured":"Jiang, Q., Ma, J., and Wei, F., On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services. IEEE Syst. J., 2016. doi: 10.1109\/JSYST.2016.2574719 .","DOI":"10.1109\/JSYST.2016.2574719"},{"issue":"4","key":"629_CR30","doi-asserted-by":"crossref","first-page":"2085","DOI":"10.1007\/s11071-015-2467-5","volume":"83","author":"Q Jiang","year":"2016","unstructured":"Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., and Alelaiwi, A., Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83(4):2085\u20132101, 2016.","journal-title":"Nonlinear Dyn."},{"issue":"6","key":"629_CR31","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang, Q., Ma, J., Lu, X., and Tian, Y., An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 8(6):1070\u20131081, 2015.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"1","key":"629_CR32","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li, X., Niu, J. W., Ma, J., Wang, W. D., and Liu, C. L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1):73\u201379, 2011.","journal-title":"J. Netw. Comput. Appl."},{"key":"629_CR33","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B., Differential power analysis. In: Advances in Cryptology\u2014CRYPTO\u2019 99, pp. 388\u2013397. Springer (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"629_CR34","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E., Sloan, R. H., et al., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"629_CR35","first-page":"442","volume":"2008","author":"A Kargl","year":"2008","unstructured":"Kargl, A., Pyka, S., and Seuschek, H., Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography. IACR Cryptology ePrint Archive 2008:442, 2008.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"629_CR36","unstructured":"Burrows, J. H., Secure hash standard. DTIC Document, 16, 1995."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0629-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0629-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0629-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T21:51:53Z","timestamp":1718833913000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0629-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,12]]},"references-count":36,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["629"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0629-8","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,12]]},"article-number":"268"}}