{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:17:43Z","timestamp":1761401863613,"version":"3.37.3"},"reference-count":155,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T00:00:00Z","timestamp":1480464000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100006566","name":"National Plan for Science,Technology and Innovation","doi-asserted-by":"publisher","award":["12-INF2817-02"],"award-info":[{"award-number":["12-INF2817-02"]}],"id":[{"id":"10.13039\/501100006566","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s10916-016-0658-3","type":"journal-article","created":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T06:55:09Z","timestamp":1480488909000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["A Survey of Authentication Schemes in Telecare Medicine Information Systems"],"prefix":"10.1007","volume":"41","author":[{"given":"Muhammad Umair","family":"Aslam","sequence":"first","affiliation":[]},{"given":"Abdelouahid","family":"Derhab","sequence":"additional","affiliation":[]},{"given":"Kashif","family":"Saleem","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2437-4870","authenticated-orcid":false,"given":"Haider","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Mehmet","family":"Orgun","sequence":"additional","affiliation":[]},{"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Baber","family":"Aslam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,30]]},"reference":[{"key":"658_CR1","doi-asserted-by":"crossref","unstructured":"Khan, F.A., et al.: A cloud-based healthcare framework for security and patients data privacy using wireless body area networks. In: Procedia Computer Science, Vol. 34, pp. 511\u2013517 (2014)","DOI":"10.1016\/j.procs.2014.07.058"},{"key":"658_CR2","doi-asserted-by":"crossref","unstructured":"Sun, J., et al., Security and Privacy for Mobile Healthcare (m-Health) Systems, 2011.","DOI":"10.1016\/B978-0-12-415815-3.00027-3"},{"key":"658_CR3","unstructured":"Adamsk, T., and Winieck, W.: Entity identification algorithms for distributed measurement and control systems with asymmetry of computational power. In: PRZEGLAD ELEKTROTECHNICZNY, Vol. 84, pp. 216\u2013219 (2008)"},{"key":"658_CR4","unstructured":"Cheng, X.R., and Li, M.X.: The authentication of the grid monitoring system for wireless sensor networks. In: Prz Elektrotechniczn 01a (2013)"},{"key":"658_CR5","unstructured":"Peja\u015b, J., Fray, I.E., Ruci\u0144ski, A.: Authentication protocol for software and hardware components in distributed electronic signature creation system. In: Prz Elektrotechniczn 10b (2012)"},{"issue":"11","key":"658_CR6","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L., Password authentication with insecure communication. Commun. ACM 24(11):770\u2013772, 1981.","journal-title":"Commun. ACM"},{"key":"658_CR7","doi-asserted-by":"crossref","unstructured":"Hwang, T., Chen, Y., Laih, C.S.: Non-interactive password authentications without password tables. In: 1990 IEEE Region 10 Conference on Computer and Communication Systems, 1990, IEEE TENCON\u201990, pp. 429\u2013431 (1990)","DOI":"10.1109\/TENCON.1990.152647"},{"issue":"3","key":"658_CR8","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1007\/s11036-014-0537-4","volume":"20","author":"Y Zhang","year":"2015","unstructured":"Zhang, Y., et al., CADRE: Cloud-assisted drug recommendation service for online pharmacies. Mobile Networks and Applications 20(3):348\u2013355, 2015.","journal-title":"Mobile Networks and Applications"},{"key":"658_CR9","doi-asserted-by":"crossref","unstructured":"Li, X.-L., et al.: Offline password guessing attacks on smart-card-based remote user authentication schemes. In: Proceedings of the 6th International Asia Conference on Industrial Engineering and Management Innovation, pp. 81\u201389. Springer (2016)","DOI":"10.2991\/978-94-6239-145-1_9"},{"key":"658_CR10","unstructured":"Schechter, S.E., et al.: Utilization of a protected module to prevent offline dictionary attacks, US Patent App. 15\/048,989 (2016)"},{"issue":"1","key":"658_CR11","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/TDSC.2011.24","volume":"9","author":"M Alsaleh","year":"2012","unstructured":"Alsaleh, M., Mannan, M., van Oorschot, P.C., Revisiting defenses against large-scale online password guessing attacks. IEEE Transactions on dependable and secure computing 9(1):128\u2013141, 2012.","journal-title":"IEEE Transactions on dependable and secure computing"},{"issue":"2","key":"658_CR12","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"ML Das","year":"2004","unstructured":"Das, M.L., Saxena, A., Gulati, V.P., A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2):629\u2013631, 2004.","journal-title":"IEEE Trans. Consum. Electron."},{"key":"658_CR13","doi-asserted-by":"crossref","unstructured":"Syverson, P.: A taxonomy of replay attacks [cryptographic protocols]. In: Proceedings of the Computer Security Foundations Workshop VII, 1994, CSFW 7, pp. 187\u2013191. IEEE (1994)","DOI":"10.21236\/ADA463948"},{"issue":"2011","key":"658_CR14","first-page":"32","volume":"11","author":"P Goyal","year":"2011","unstructured":"Goyal, P., Parmar, V., Rishi, R., Manet: vulnerabilities, challenges, attacks, application. IJCEM International Journal of Computational Engineering & Management 11(2011):32\u201337, 2011.","journal-title":"IJCEM International Journal of Computational Engineering & Management"},{"issue":"12","key":"658_CR15","first-page":"11","volume":"9","author":"P Goyal","year":"2010","unstructured":"Goyal, P., Batra, S., Singh, A., A literature review of security attack in mobile ad-hoc networks. Int. J. Comput. Appl. 9(12):11\u201315, 2010.","journal-title":"Int. J. Comput. Appl."},{"key":"658_CR16","doi-asserted-by":"crossref","unstructured":"Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. In: Insider Attack and Cyber Security, pp. 69\u201390. Springer (2008)","DOI":"10.1007\/978-0-387-77322-3_5"},{"key":"658_CR17","doi-asserted-by":"crossref","unstructured":"Probst, C.W., Hansen, R.R., Nielson, F.: Where can an insider attack?. In: International Workshop on Formal Aspects in Security and Trust, pp. 127\u2013142. Springer (2006)","DOI":"10.1007\/978-3-540-75227-1_9"},{"key":"658_CR18","doi-asserted-by":"crossref","unstructured":"Jiang, S., Smith, S., Minami, K.: Securing web servers against insider attack. In: Proceedings 17th Annual Computer Security Applications Conference, 2001. ACSAC 2001, pp. 265\u2013276. IEEE (2001)","DOI":"10.1109\/ACSAC.2001.991542"},{"key":"658_CR19","doi-asserted-by":"crossref","unstructured":"Sarkar, A., et al.: Insider attack identification and prevention using a declarative approach. In: 2014 IEEE on Security and Privacy Workshops (SPW), pp. 265\u2013276. IEEE (2014)","DOI":"10.1109\/SPW.2014.41"},{"issue":"1","key":"658_CR20","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MIC.2006.5","volume":"10","author":"G Carl","year":"2006","unstructured":"Carl, G., et al., Denial-of-service attack-detection techniques. IEEE Internet Computing 10(1):82\u201389, 2006.","journal-title":"IEEE Internet Computing"},{"key":"658_CR21","doi-asserted-by":"crossref","unstructured":"Schuba, C.L., et al.: Analysis of a denial of service attack on TCP. In: Proceedings in the 1997 IEEE Symposium on Security and Privacy, 1997, pp. 208\u2013223. IEEE (1997)","DOI":"10.1109\/SECPRI.1997.601338"},{"issue":"10","key":"658_CR22","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MC.2002.1039518","volume":"35","author":"AD Wood","year":"2002","unstructured":"Wood, A.D., and Stankovic, J.A., Denial of service in sensor networks. computer 35(10):54\u201362, 2002.","journal-title":"computer"},{"key":"658_CR23","doi-asserted-by":"crossref","unstructured":"Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology, Vol. 2, p. 6. IEEE (2006)","DOI":"10.1109\/ICACT.2006.206151"},{"key":"658_CR24","doi-asserted-by":"crossref","unstructured":"Latif, R., et al., EVFDT: an Enhanced Very Fast Decision Tree algorithm for detecting distributed denial of service attack in cloud-assisted wireless body area network. Mob. Inf. Syst,1\u201313, 2015.","DOI":"10.1155\/2015\/260594"},{"key":"658_CR25","unstructured":"Burg, A.: Ad hoc network specific attacks. In: Seminar Ad hoc networking: Concepts, Applications, and Security. Technische Universitat Munchen,\u201903 (2003)"},{"issue":"7","key":"658_CR26","first-page":"2182","volume":"86","author":"T Tsuji","year":"2003","unstructured":"Tsuji, T., and Shimizu, A., An impersonation attack on one-time password authentication protocol OSPA. IEICE Trans. Commun. 86(7):2182\u20132185, 2003.","journal-title":"IEICE Trans. Commun."},{"issue":"3","key":"658_CR27","first-page":"118","volume":"7","author":"L Tamilselvan","year":"2007","unstructured":"Tamilselvan, L., and Sankaranarayanan, D.V., Prevention of impersonation attack in wireless mobile ad hoc networks. International Journal of Computer Science and Network Security (IJCSNS) 7(3):118\u2013123, 2007.","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"issue":"5","key":"658_CR28","doi-asserted-by":"crossref","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","volume":"32","author":"T-H Chen","year":"2010","unstructured":"Chen, T.-H., and Shih, W.-K., A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5):704\u2013712, 2010.","journal-title":"ETRI J."},{"issue":"1","key":"658_CR29","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s11042-014-2282-x","volume":"75","author":"H Arshad","year":"2016","unstructured":"Arshad, H., and Nikooghadam, M., An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC. Multimedia Tools and Applications 75(1):181\u2013197, 2016.","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"658_CR30","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1002\/dac.2644","volume":"28","author":"Q Jiang","year":"2015","unstructured":"Jiang, Q., et al., Improvement of robust smart-card-based password authentication scheme. Int. J. Commun. Syst. 28(2):383\u2013393, 2015.","journal-title":"Int. J. Commun. Syst."},{"issue":"5","key":"658_CR31","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"658_CR32","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigations of Power Analysis Attacks on Smartcards. In: Smartcard 99, pp. 151\u2013161 (1999)"},{"key":"658_CR33","doi-asserted-by":"crossref","unstructured":"Chari, S., et al.: Towards sound approaches to counteract power-analysis attacks. In: Annual International Cryptology Conference, pp. 398\u2013412. Springer (1999)","DOI":"10.1007\/3-540-48405-1_26"},{"key":"658_CR34","unstructured":"Messerges, T.S.: Power analysis attacks and countermeasures for cryptographic algorithms, University of Illinois at Chicago (2000)"},{"key":"658_CR35","doi-asserted-by":"crossref","unstructured":"Li, Y., Chen, M., Wang, J.: Introduction to side-channel attacks and fault attacks. In: 2016 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC), Vol. 1, pp. 573\u2013575. IEEE (2016)","DOI":"10.1109\/APEMC.2016.7522801"},{"issue":"1","key":"658_CR36","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TCE.2004.1277867","volume":"50","author":"J Zhu","year":"2004","unstructured":"Zhu, J., and Ma, J., A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consum. Electron. 50(1):231\u2013235, 2004.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"4","key":"658_CR37","first-page":"1","volume":"40","author":"S-Y Chiou","year":"2016","unstructured":"Chiou, S.-Y., Ying, Z., Liu, J., Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 40(4):1\u201315, 2016.","journal-title":"J. Med. Syst."},{"key":"658_CR38","unstructured":"Pfitzmann, A., and Hansen, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology. In: Version v0 31, p. 15 (2008)"},{"key":"658_CR39","unstructured":"Pfitzmann, A., and Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (2010)"},{"issue":"1","key":"658_CR40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1049\/el:20000132","volume":"36","author":"Y-M Tseng","year":"2000","unstructured":"Tseng, Y.-M., Weakness in simple authenticated key agreement protocol. Electron. Lett. 36(1):1, 2000.","journal-title":"Electron. Lett."},{"issue":"8","key":"658_CR41","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G.P., An improved rsa based user authentication and session key agreement protocol usable in tmis. J. Med. Syst. 39(8):1\u201314, 2015.","journal-title":"J. Med. Syst."},{"issue":"4","key":"658_CR42","doi-asserted-by":"crossref","first-page":"1246","DOI":"10.1109\/TCE.2003.1261225","volume":"49","author":"AK Awasthi","year":"2003","unstructured":"Awasthi, A.K., and Lal, S., A remote user authentication scheme using smart cards with forward secrecy. IEEE Trans. Consum. Electron. 49(4):1246\u20131248, 2003.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"2","key":"658_CR43","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1016\/j.amc.2004.06.124","volume":"167","author":"R-J Hwang","year":"2005","unstructured":"Hwang, R.-J., Lai, C.-H., Su, F.-F., An efficient signcryption scheme with forward secrecy based on elliptic curve. Appl. Math. Comput. 167(2):870\u2013881, 2005.","journal-title":"Appl. Math. Comput."},{"key":"658_CR44","doi-asserted-by":"crossref","unstructured":"Adrian, D., et al.: Imperfect forward secrecy: How Diffie-Hellman fails in practice. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 5\u201317. ACM (2015)","DOI":"10.1145\/2810103.2813707"},{"key":"658_CR45","unstructured":"Jau, J.: Password update systems and methods, US Patent App. 11\/289,029 (2005)"},{"issue":"11","key":"658_CR46","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1016\/j.mcm.2011.07.001","volume":"57","author":"SKH Islam","year":"2013","unstructured":"Islam, S.K.H., and Biswas, G.P., Design of improved password authentication and update scheme based on elliptic curve cryptography. Math. Comput. Model. 57(11):2703\u20132717 , 2013.","journal-title":"Math. Comput. Model."},{"key":"658_CR47","unstructured":"Watanabe, K., et al.: Biometric information processing apparatus and biometric information processing method, US Patent 7,899,21 (2011)"},{"key":"658_CR48","doi-asserted-by":"crossref","unstructured":"Uludag, U., et al.: cryptosystems: issues and challenges. In: Proceedings of the IEEE, Vol. 92, pp. 948\u2013960 (2004)","DOI":"10.1109\/JPROC.2004.827372"},{"issue":"11","key":"658_CR49","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin, A.T.B., Ling, D.N.C., Goh, A., Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recogn. 37(11):2245\u20132255, 2004.","journal-title":"Pattern recogn."},{"issue":"3","key":"658_CR50","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2006.05.030","volume":"40","author":"A Lumini","year":"2007","unstructured":"Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern recogn. 40(3): 1057\u20131065, 2007.","journal-title":"Pattern recogn."},{"issue":"11","key":"658_CR51","doi-asserted-by":"crossref","first-page":"1860","DOI":"10.1002\/sec.900","volume":"7","author":"L Leng","year":"2014","unstructured":"Leng, L., et al., A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion. Security and Communication Networks 7(11):1860\u20131871, 2014.","journal-title":"Security and Communication Networks"},{"issue":"7","key":"658_CR52","doi-asserted-by":"crossref","first-page":"2290","DOI":"10.1016\/j.patcog.2015.01.021","volume":"48","author":"L Leng","year":"2015","unstructured":"Leng, L., and Teoh, A.B.J., Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn. 48(7):2290\u20132303, 2015.","journal-title":"Pattern Recogn."},{"issue":"3","key":"658_CR53","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.patrec.2007.10.005","volume":"29","author":"L Nanni","year":"2008","unstructured":"Nanni, L., and Lumini, A., Random subspace for an improved biohashing for face authentication. Pattern Recogn. Lett. 29(3):295\u2013300, 2008.","journal-title":"Pattern Recogn. Lett."},{"issue":"2","key":"658_CR54","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120\u2013126, 1978.","journal-title":"Commun. ACM"},{"key":"658_CR55","doi-asserted-by":"crossref","unstructured":"Mainanwal, V., Gupta, M., Upadhayay, S.K.: Zero Knowledge Protocol with RSA Cryptography Algorithm for Authentication in Web Browser Login System (Z-RSA). In: 5th International Conference on Communication Systems and Network Technologies (CSNT), 2015, pp. 776\u2013780. IEEE (2015)","DOI":"10.1109\/CSNT.2015.90"},{"issue":"2","key":"658_CR56","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"658_CR57","doi-asserted-by":"crossref","unstructured":"Malone-Lee, J., and Mao, W.: Two birds one stone: signcryption using RSA. In: Cryptographers\u2019 Track at the RSA Conference, pp. 211\u2013226. Springer (2003)","DOI":"10.1007\/3-540-36563-X_14"},{"key":"658_CR58","doi-asserted-by":"crossref","unstructured":"Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1. In: Annual International Cryptology Conference, pp. 1\u201312. Springer (1998)","DOI":"10.1007\/BFb0055716"},{"key":"658_CR59","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: Elliptic curve cryptosystems, Vol. 48 (1987)","DOI":"10.2307\/2007884"},{"key":"658_CR60","doi-asserted-by":"crossref","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Advances in CryptologyCRYPTO\u201985 Proceedings, pp. 417\u2013426. Springer (1985)","DOI":"10.1007\/3-540-39799-X_31"},{"key":"658_CR61","doi-asserted-by":"crossref","unstructured":"Aydos, M., Yantk, T., Koc, C.K.: A high-speed ECC-based wireless authentication on an ARM microprocessor. In: 16th Annual Conference on Computer Security Applications, 2000. ACSAC\u201900, pp. 401\u2013409. IEEE (2000)","DOI":"10.1109\/ACSAC.2000.898895"},{"key":"658_CR62","doi-asserted-by":"crossref","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 119\u2013132. Springer (2004)","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"658_CR63","unstructured":"Gupta, K., and Silakari, S., Ecc over rsa for asymmetric encryption: A review. IJCSI International Journal of Computer Science Issues 8(3), 2011."},{"key":"658_CR64","doi-asserted-by":"crossref","unstructured":"Bafandehkar, M.: Comparison of ecc and rsa algorithm in resource constrained devices. In: 2013 International Conference on IT Convergence and Security (ICITCS), pp. 1\u20133. IEEE (2013)","DOI":"10.1109\/ICITCS.2013.6717816"},{"key":"658_CR65","doi-asserted-by":"crossref","unstructured":"Savari, M., Montazerolzohour, M., Thiam, Y.E.: Comparison of ECC and RSA algorithm in multipurpose smart card application. In: International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012, pp. 49\u201353. IEEE (2012)","DOI":"10.1109\/CyberSec.2012.6246121"},{"issue":"3","key":"658_CR66","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/182110.182113","volume":"28","author":"TYC Woo","year":"1994","unstructured":"Woo, T.Y.C., and Lam, S.S., A lesson on authentication protocol design. ACM SIGOPS Operating Systems Review 28(3):24\u201337, 1994.","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"658_CR67","doi-asserted-by":"crossref","unstructured":"Harbitter, A., and Menasce, D.A.: A methodology for analyzing the performance of authentication protocols, Vol. 5 (2002)","DOI":"10.1145\/581271.581275"},{"issue":"1","key":"658_CR68","doi-asserted-by":"crossref","first-page":"515","DOI":"10.21917\/ijct.2012.0072","volume":"3","author":"K Thilagavathi","year":"2012","unstructured":"Thilagavathi, K., and Rajeswari, P.G., Efficiency and Effectiveness Analysis over ECC-Based Direct and Indirect Authentication Protocols: An Extensive Comparative Study. ICTACT Journal on Communication Technology 3(1):515\u2013524, 2012.","journal-title":"ICTACT Journal on Communication Technology"},{"key":"658_CR69","unstructured":"Prasanna, S., and Gobi, M., PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM. ICTACT Journal on Communication Technology 5(1), 2014."},{"key":"658_CR70","doi-asserted-by":"crossref","unstructured":"Agarwal, A.K., and Wang, W.: Measuring performance impact of security protocols in wireless local area networks. In: 2nd International Conference on Broadband Networks, 2005, pp. 581\u2013590. IEEE (2005)","DOI":"10.1109\/ICBN.2005.1589663"},{"key":"658_CR71","unstructured":"Zhang, Y.: Health-CPS: healthcare cyber-physical system assisted by cloud and big data (2015)"},{"issue":"3","key":"658_CR72","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"Z-Y Wu","year":"2012","unstructured":"Wu, Z.-Y., et al., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"658_CR73","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"4","key":"658_CR74","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/JSAC.2009.090505","volume":"27","author":"Y-M Huang","year":"2009","unstructured":"Huang, Y.-M., Hsieh, M.-Y., Chao, H.-C., Hung, S.-H., Park, J.H., Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE journal on selected areas in communications 27(4):400\u2013411, 2009.","journal-title":"IEEE journal on selected areas in communications"},{"issue":"4","key":"658_CR75","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1109\/TITB.2010.2104326","volume":"15","author":"S Gonz\u00e1lez-Valenzuela","year":"2011","unstructured":"Gonz\u00e1lez-Valenzuela, S., Chen, M., Leung, V.C.M., Mobility support for health monitoring at home using wearable sensors. IEEE Trans. Inf. Technol. Biomed. 15(4):539\u2013549, 2011.","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"658_CR76","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.jnca.2014.07.026","volume":"46","author":"O Hamdi","year":"2014","unstructured":"Hamdi, O., Chalouf, M.A., Ouattara, D., Krief, F., eHealth: Survey on research projects, comparative study of telemonitoring architectures and main issues. J. Netw. Comput. Appl. 46:100\u2013112, 2014.","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"658_CR77","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/CC.2015.7084383","volume":"12","author":"A Sawand","year":"2015","unstructured":"Sawand, A., et al., Toward energy-efficient and trustworthy eHealth monitoring system. China Communications 12(1):46\u201365, 2015.","journal-title":"China Communications"},{"issue":"2","key":"658_CR78","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/s10550-006-0051-8","volume":"24","author":"HS Ng","year":"2006","unstructured":"Ng, H.S., Sim, M.L., Tan, C.M., Security issues of wireless sensor networks in healthcare applications. BT Technol. J. 24(2):138\u2013144, 2006.","journal-title":"BT Technol. J."},{"key":"658_CR79","doi-asserted-by":"crossref","unstructured":"Egbogah, E.E., and Fapojuwo, A.O.: A survey of system architecture requirements for health care-based wireless sensor networks, Vol. 11 (2011)","DOI":"10.3390\/s110504875"},{"key":"658_CR80","doi-asserted-by":"crossref","unstructured":"Jemal, H., et al., Mobile Cloud Computing in Healthcare System, pp. 408\u2013417: Springer, 2015.","DOI":"10.1007\/978-3-319-24306-1_40"},{"key":"658_CR81","doi-asserted-by":"crossref","first-page":"1375","DOI":"10.1109\/ACCESS.2016.2549047","volume":"4","author":"A Sajid","year":"2016","unstructured":"Sajid, A., Abbas, H., Saleem, K., Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges. IEEE Access 4:1375\u20131384, 2016.","journal-title":"IEEE Access"},{"issue":"3","key":"658_CR82","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1016\/j.chaos.2006.05.061","volume":"35","author":"MK Khan","year":"2008","unstructured":"Khan, M.K., Zhang, J., Wang, X., Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons & Fractals 35(3):519\u2013524, 2008.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"4","key":"658_CR83","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MWC.2013.6590046","volume":"20","author":"J Zhou","year":"2013","unstructured":"Zhou, J., et al., Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wirel. Commun. 20(4):12\u201321, 2013.","journal-title":"IEEE Wirel. Commun."},{"key":"658_CR84","unstructured":"Wu, M., Garfinkel, S., Miller, R., Secure web authentication with mobile phones. DIMACS workshop on usable privacy and security software 2010, 2004."},{"key":"658_CR85","doi-asserted-by":"crossref","unstructured":"Kumar, T.R., and Raghavan, S.V.: PassPattern System (PPS): a pattern-based user authentication scheme. In: International Conference on Research in Networking, pp. 162\u2013169. Springer (2008)","DOI":"10.1007\/978-3-540-79549-0_14"},{"issue":"4","key":"658_CR86","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1016\/j.cose.2010.12.001","volume":"30","author":"N Gunson","year":"2011","unstructured":"Gunson, N., et al., User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Computers & Security 30(4):208\u2013220, 2011.","journal-title":"Computers & Security"},{"issue":"12","key":"658_CR87","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., and Sasse, M.A., Users are not the enemy. Commun. ACM 42(12):40\u201346, 1999.","journal-title":"Commun. ACM"},{"issue":"1","key":"658_CR88","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.cose.2008.09.008","volume":"28","author":"CS Weir","year":"2009","unstructured":"Weir, C.S., User perceptions of security, convenience and usability for ebanking authentication tokens. Computers & Security 28(1):47\u201362, 2009.","journal-title":"Computers & Security"},{"key":"658_CR89","doi-asserted-by":"crossref","unstructured":"Braz, C., and Robert, J.-M.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th Conference on l\u2019Interaction Homme-Machine, pp. 199\u2013203. ACM (2006)","DOI":"10.1145\/1132736.1132768"},{"key":"658_CR90","unstructured":"Koved, L., and Zhang, B.: Improving Usability of Complex Authentication Schemes Via Queue Management and Load Shedding. In: Symposium on Usable Privacy and Security (SOUPS). Citeseer (2014)"},{"key":"658_CR91","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al., iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization. Futur. Gener. Comput. Syst., 2016.","DOI":"10.1016\/j.future.2015.12.001"},{"key":"658_CR92","doi-asserted-by":"crossref","unstructured":"Zhang, Y., GroRec: a group-centric intelligent recommender system integrating social, mobile and big data technologies. IEEE Trans. Serv. Comput., 2016.","DOI":"10.1109\/TSC.2016.2592520"},{"issue":"7","key":"658_CR93","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1002\/scj.4690220704","volume":"22","author":"A Shimizu","year":"1991","unstructured":"Shimizu, A., A dynamic password authentication method using a one-way function. Systems and computers in Japan 22(7):32\u201340, 1991.","journal-title":"Systems and computers in Japan"},{"key":"658_CR94","doi-asserted-by":"crossref","unstructured":"Harn, L.: A public-key based dynamic password scheme. In: [Proceedings of the 1991] Symposium on Applied Computing, 1991, pp. 430\u2013435. IEEE (1991)","DOI":"10.1109\/SOAC.1991.143914"},{"key":"658_CR95","unstructured":"Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos: An Authentication Service for Open Network Systems. In: USENIX Winter, pp. 191\u2013202 (1988)"},{"key":"658_CR96","unstructured":"Bellovin, S.M., and Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992. Proceedings, pp. 72\u201384. IEEE (1992)"},{"key":"658_CR97","doi-asserted-by":"crossref","unstructured":"Haller, N.: The S\/KEY one-time password system (1995)","DOI":"10.17487\/rfc1760"},{"issue":"5","key":"658_CR98","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/0020-0190(95)00087-S","volume":"55","author":"H Gwoboa","year":"1995","unstructured":"Gwoboa, H., Password authentication without using a password table. Inf. Process. Lett. 55(5):247\u2013250, 1995.","journal-title":"Inf. Process. Lett."},{"key":"658_CR99","unstructured":"Chang, C.C., and Wu, T.C.: A password authentication scheme without verification tables. In: 8th IASTED International Symposium of Applied Informatics. Innsbruck, Austria, pp. 202\u2013204 (1990)"},{"issue":"4","key":"658_CR100","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.comcom.2008.11.008","volume":"32","author":"Y-Y Wang","year":"2009","unstructured":"Wang, Y.-Y., et al., A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32(4):583\u2013585, 2009.","journal-title":"Comput. Commun."},{"issue":"4","key":"658_CR101","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1109\/30.920451","volume":"46","author":"C-K Chan","year":"2000","unstructured":"Chan, C.-K., and Cheng, L.-M., Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):992\u2013993, 2000.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"2","key":"658_CR102","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/69.991728","volume":"14","author":"M-S Hwang","year":"2002","unstructured":"Hwang, M.-S., Chang, C.-C., Hwang, K.-F., An ElGamal-like cryptosystem for enciphering large messages. IEEE Trans. Knowl. Data Eng. 14(2):445\u2013446, 2002.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"658_CR103","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/567331.567335","volume":"36","author":"C-C Lee","year":"2002","unstructured":"Lee, C.-C., Hwang, M.-S., Yang, W.-P., A flexible remote user authentication scheme using smart cards. ACM SIGOPS Operating Systems Review 36(3):46\u201352, 2002.","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"4","key":"658_CR104","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/583800.583803","volume":"36","author":"C-C Lee","year":"2002","unstructured":"Lee, C.-C., Li, L.-H., Hwang, M.-S., A remote user authentication scheme using hash functions. ACM SIGOPS Operating Systems Review 36(4):23\u201329, 2002.","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"2","key":"658_CR105","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1109\/TCE.2003.1209534","volume":"49","author":"J-J Shen","year":"2003","unstructured":"Shen, J.-J., Lin, C.-W., Hwang, M.-S., A modified remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 49(2):414\u2013416, 2003.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"4","key":"658_CR106","doi-asserted-by":"crossref","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"H-M Sun","year":"2000","unstructured":"Sun, H.-M., An efficient remote use authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):958\u2013961, 2000.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"3","key":"658_CR107","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"MK Khan","year":"2011","unstructured":"Khan, M.K., Kim, S.-K., Alghathbar, K., Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme. Comput. Commun. 34(3):305\u2013309, 2011.","journal-title":"Comput. Commun."},{"issue":"6","key":"658_CR108","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"H-M Chen","year":"2012","unstructured":"Chen, H.-M., Lo, J.-W., Yeh, C.-K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907\u20133915 , 2012.","journal-title":"J. Med. Syst."},{"issue":"1","key":"658_CR109","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-012-9897-0","volume":"37","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., et al., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1\u20138, 2013.","journal-title":"J. Med. Syst."},{"issue":"4","key":"658_CR110","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9952-5","volume":"37","author":"S Kumari","year":"2013","unstructured":"Kumari, S., Khan, M.K., Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37(4):1\u201311, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"658_CR111","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"H Debiao","year":"2012","unstructured":"Debiao, H., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"658_CR112","first-page":"1","volume":"37","author":"T-F Lee","year":"2013","unstructured":"Lee, T.-F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J. Med. Syst. 37(6):1\u20139, 2013.","journal-title":"J. Med. Syst."},{"issue":"6","key":"658_CR113","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833\u20133838, 2012.","journal-title":"J. Med. Syst."},{"issue":"5","key":"658_CR114","first-page":"1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A.K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1\u201317, 2013.","journal-title":"J. Med. Syst."},{"issue":"1","key":"658_CR115","first-page":"1","volume":"38","author":"X Xu","year":"2013","unstructured":"Xu, X., et al., A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems. J. Med. Syst. 38(1):1\u20137, 2013. issn: 1573-689X.","journal-title":"J. Med. Syst."},{"issue":"10","key":"658_CR116","first-page":"1","volume":"38","author":"SKH Islam","year":"2014","unstructured":"Islam, S.K.H., and Khan, M.K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):1\u201316 , 2014.","journal-title":"J. Med. Syst."},{"issue":"6","key":"658_CR117","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0244-0","volume":"39","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, S.A., Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J. Med. Syst. 39(6):1\u201311, 2015.","journal-title":"J. Med. Syst."},{"issue":"11","key":"658_CR118","doi-asserted-by":"crossref","first-page":"2691","DOI":"10.1002\/dac.2499","volume":"27","author":"L Zhang","year":"2014","unstructured":"Zhang, L., Tang, S., Cai, Z., Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. Int. J. Commun. Syst. 27(11):2691\u20132702, 2014.","journal-title":"Int. J. Commun. Syst."},{"issue":"2","key":"658_CR119","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., et al., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):1\u20138 , 2014.","journal-title":"J. Med. Syst."},{"issue":"10","key":"658_CR120","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10):1\u201310, 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"658_CR121","doi-asserted-by":"crossref","first-page":"903","DOI":"10.1007\/s12083-014-0248-4","volume":"8","author":"H Tu","year":"2014","unstructured":"Tu, H., et al., An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Networking and Applications 8(5):903\u2013910, 2014. issn: 1936-6450.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"658_CR122","doi-asserted-by":"crossref","unstructured":"Chaudhry, S.A., et al., An improved and provably secure privacy preserving authentication protocol for SIP. Peer-to-Peer Networking and Applications,1\u201315, 2015.","DOI":"10.1007\/s12083-015-0400-9"},{"issue":"1","key":"658_CR123","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s12083-014-0315-x","volume":"9","author":"MS Farash","year":"2016","unstructured":"Farash, M.S., Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications 9(1):82\u201391, 2016.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"658_CR124","doi-asserted-by":"crossref","unstructured":"Kumari, S., et al., An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Networking and Applications,1\u201314, 2015.","DOI":"10.1007\/s12083-015-0409-0"},{"issue":"5","key":"658_CR125","first-page":"1","volume":"38","author":"F Wen","year":"2014","unstructured":"Wen, F., and Guo, D., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 38(5):1\u201311, 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"658_CR126","first-page":"1","volume":"38","author":"F Wen","year":"2014","unstructured":"Wen, F., A more secure anonymous user authentication scheme for the integrated EPR information system. J. Med. Syst. 38(5):1\u20137, 2014.","journal-title":"J. Med. Syst."},{"issue":"9","key":"658_CR127","first-page":"1","volume":"38","author":"Q Xie","year":"2014","unstructured":"Xie, Q., Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care. J. Med. Syst. 38(9):1\u201310, 2014.","journal-title":"J. Med. Syst."},{"key":"658_CR128","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Advances in Cryptology\u2014CRYPTO\u201999,388\u2013397, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"658_CR129","doi-asserted-by":"crossref","unstructured":"Brier, E., Clavier, C., Olivier, F., Correlation power analysis with a leakage model, pp. 16\u201329: Springer, 2004.","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"658_CR130","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F., Electromagnetic analysis: Concrete results, pp. 251\u2013261: Springer, 2001."},{"key":"658_CR131","doi-asserted-by":"crossref","unstructured":"Gierlichs, B., et al., Mutual information analysis, pp. 426\u2013442: Springer, 2008.","DOI":"10.1007\/978-3-540-85053-3_27"},{"issue":"1","key":"658_CR132","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"P Kocher","year":"2011","unstructured":"Kocher, P., et al., Introduction to differential power analysis. Journal of Cryptographic Engineering 1(1):5\u201327, 2011.","journal-title":"Journal of Cryptographic Engineering"},{"key":"658_CR133","doi-asserted-by":"crossref","unstructured":"Standaert, F.-X., Malkin, T.G., Yung, M., A unified framework for the analysis of side-channel key recovery attacks, pp. 443\u2013461: Springer, 2009.","DOI":"10.1007\/978-3-642-01001-9_26"},{"key":"658_CR134","doi-asserted-by":"crossref","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H., Power analysis attacks of modular exponentiation in smartcards, pp. 144\u2013157: Springer, 1999.","DOI":"10.1007\/3-540-48059-5_14"},{"key":"658_CR135","unstructured":"Shiao, D.-R., Chang, Y.-F., Yu, S.-H., A uniqueness-and anonymity- preserving remote user authentication scheme for connected health care. J. Med. Syst.,1\u201309, 2013."},{"issue":"3","key":"658_CR136","first-page":"1","volume":"37","author":"AK Das","year":"2013","unstructured":"Das, A.K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1\u201316 , 2013.","journal-title":"J. Med. Syst."},{"issue":"5","key":"658_CR137","first-page":"1","volume":"38","author":"K-W Kim","year":"2014","unstructured":"Kim, K.-W., and Lee, J.-D., On the security of two remote user authentication schemes for telecare medical information systems. J. Med. Syst. 38(5):1\u201311, 2014.","journal-title":"J. Med. Syst."},{"key":"658_CR138","doi-asserted-by":"crossref","unstructured":"Wen, F., A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. J. Med. Syst.,1\u201309, 2013.","DOI":"10.1007\/s10916-013-9980-1"},{"issue":"2","key":"658_CR139","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0182-2","volume":"39","author":"L Xu","year":"2015","unstructured":"Xu, L., and Wu, F., Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J. Med. Syst. 39(2):1\u20139, 2015.","journal-title":"J. Med. Syst."},{"issue":"8","key":"658_CR140","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G.P., A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8):1\u201319, 2015.","journal-title":"J. Med. Syst."},{"issue":"5","key":"658_CR141","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9964-1","volume":"37","author":"AK Awasthi","year":"2013","unstructured":"Awasthi, A.K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1\u20134, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"658_CR142","first-page":"1","volume":"38","author":"Z Tan","year":"2014","unstructured":"Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 38(3):1\u20139, 2014.","journal-title":"J. Med. Syst."},{"issue":"12","key":"658_CR143","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0136-8","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12):1\u201312 , 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"658_CR144","first-page":"1","volume":"37","author":"X Yan","year":"2014","unstructured":"Yan, X., et al., A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37(5):1\u20136, 2014.","journal-title":"J. Med. Syst."},{"issue":"3","key":"658_CR145","first-page":"1","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu, Y., et al., An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3):1\u20138, 2015.","journal-title":"J. Med. Syst."},{"issue":"11","key":"658_CR146","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0335-y","volume":"39","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, S.A., et al., An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. J. Med. Syst. 39(11):1\u201312, 2015.","journal-title":"J. Med. Syst."},{"issue":"6","key":"658_CR147","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., et al., Cryptanalysis and improvement of Yan et al.\u2019s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):1\u201312, 2014.","journal-title":"J. Med. Syst."},{"issue":"1","key":"658_CR148","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2015","unstructured":"Giri, D., et al., An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1):1\u20139, 2015.","journal-title":"J. Med. Syst."},{"issue":"4","key":"658_CR149","first-page":"1","volume":"37","author":"MK Khan","year":"2013","unstructured":"Khan, M.K., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):1\u201312, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"658_CR150","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0217-3","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G.P., A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis. J. Med. Syst. 39(3):1\u201317, 2015.","journal-title":"J. Med. Syst."},{"key":"658_CR151","doi-asserted-by":"crossref","unstructured":"Amin, Ruhul and Biswas, GP, Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card. Arab. J. Sci. Eng. 40(11):3135\u20133149, 2015.","DOI":"10.1007\/s13369-015-1743-5"},{"key":"658_CR152","unstructured":"Does HIPAA require two-factor authentication? http:\/\/hipaapoliciesandprocedures.com\/f-a-q\/does-hipaa-require-two-factor-authentication"},{"key":"658_CR153","unstructured":"Authentication, Access Control, and Authorization. https:\/\/www.healthit.gov\/facas\/FACAS\/sites\/faca\/files\/Baker_HITSC_PSWG_revisions.pdf , Accessed: 2014-04-24"},{"key":"658_CR154","unstructured":"Identity and Access Management for Health Information Exchange. https:\/\/www.healthit.gov\/sites\/default\/files\/identitymanagementfinal.pdf , Accessed: 2013-12-15"},{"key":"658_CR155","unstructured":"State and National Trends of Two-Factor Authentication for Non-Federal Acute Care Hospitals. https:\/\/www.healthit.gov\/sites\/default\/files\/briefs\/oncdatabrief32_two-factor_authent_trends.pdf , Accessed: 2015-11-15"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0658-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0658-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0658-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T21:57:01Z","timestamp":1718920621000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0658-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,30]]},"references-count":155,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["658"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0658-3","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2016,11,30]]},"article-number":"14"}}