{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:25:48Z","timestamp":1764174348959,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,2,15]],"date-time":"2017-02-15T00:00:00Z","timestamp":1487116800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s10916-017-0692-9","type":"journal-article","created":{"date-parts":[[2017,2,14]],"date-time":"2017-02-14T23:38:48Z","timestamp":1487115528000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A Selective Group Authentication Scheme for IoT-Based Medical Information System"],"prefix":"10.1007","volume":"41","author":[{"given":"YoHan","family":"Park","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9011-8410","authenticated-orcid":false,"given":"YoungHo","family":"Park","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,15]]},"reference":[{"key":"692_CR1","doi-asserted-by":"crossref","first-page":"9897","DOI":"10.1007\/s10916-012-9897-0","volume":"37","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.","journal-title":"J. Med. Syst."},{"issue":"9","key":"692_CR2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R Roman","year":"2011","unstructured":"Roman, R., Najera, P., and Lpoez, J., Securing the internet of things. Comput. 44(9):51\u201358, 2011.","journal-title":"Comput."},{"issue":"1","key":"692_CR3","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"Weber, R. H., Internet of Things\u2014New security and privacy challenges. Comput. Law Security Rev. 26(1): 23\u201330, 2010.","journal-title":"Comput. Law Security Rev."},{"issue":"3","key":"692_CR4","doi-asserted-by":"crossref","first-page":"1629","DOI":"10.1007\/s10916-010-9625-6","volume":"36","author":"SH Li","year":"2012","unstructured":"Li, S. H., Wang, C. Y., LuW, H., Lin, Y. Y., and Yen, D. C., Design and implementation of a telecare information platform. J. Med. Syst. 36(3):1629\u20131650, 2012.","journal-title":"J. Med. Syst."},{"issue":"3","key":"692_CR5","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1109\/TITB.2005.847498","volume":"9","author":"S Gritzalis","year":"2005","unstructured":"Gritzalis, S., Lambrinoudakis, C., Lekkas, D., and Deftereos, S., Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Trans. Inf. Technol. Biomed. 9(3):413\u2013423, 2005.","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"issue":"4","key":"692_CR6","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1005549330655","volume":"24","author":"C Lambrinoudakis","year":"2000","unstructured":"Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213\u2013234, 2000.","journal-title":"J. Med. Syst."},{"issue":"2","key":"692_CR7","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/s10916-010-9527-7","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z. Y., Chung, Y., Lai, F., and Chen, T. S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631\u2013638, 2012.","journal-title":"J. Med. Syst."},{"key":"692_CR8","doi-asserted-by":"crossref","first-page":"9952","DOI":"10.1007\/s10916-013-9952-5","volume":"37","author":"S Kumari","year":"2013","unstructured":"Kumari, S., Khan, M. K., and Kumar, R., Cryptanalysis and improvement of \u2019A privacy enhanced scheme for telecare medical information systems\u2019. J. Med. Syst. 37:9952, 2013.","journal-title":"J. Med. Syst."},{"key":"692_CR9","doi-asserted-by":"crossref","first-page":"9912","DOI":"10.1007\/s10916-012-9912-5","volume":"37","author":"T Cao","year":"2013","unstructured":"Cao, T., and Zhai, J., Improved dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 37:9912, 2013.","journal-title":"J. Med. Syst."},{"doi-asserted-by":"crossref","unstructured":"Turkanovic, M., Brumen, B., and H\u00f6lbl, M., A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Netw. 20:96\u2013112, 2014.","key":"692_CR10","DOI":"10.1016\/j.adhoc.2014.03.009"},{"issue":"10","key":"692_CR11","doi-asserted-by":"crossref","first-page":"3693","DOI":"10.1109\/JSEN.2013.2266116","volume":"13","author":"X Yao","year":"2013","unstructured":"Yao, X., Han, X., Du, X., and Zhou, X., A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sensors J. 13(10):3693\u20133701, 2013.","journal-title":"IEEE Sensors J."},{"issue":"8","key":"692_CR12","doi-asserted-by":"crossref","first-page":"14786","DOI":"10.3390\/s140814786","volume":"14","author":"B Ndibanje","year":"2014","unstructured":"Ndibanje, B., Lee, H. J., and Lee, S. G., Security analysis and improvements of authentication and access control in the internet of Things. Sensors 14(8):14786\u201314805, 2014.","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"Mahalle, P. N., Prasad, N. R., and Prasad, R., Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things (IoT), Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE) (2014)","key":"692_CR13","DOI":"10.1109\/VITAE.2014.6934425"},{"issue":"6","key":"692_CR14","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"HM Chen","year":"2012","unstructured":"Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907\u20133915, 2012.","journal-title":"J. Med. Syst."},{"key":"692_CR15","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/s10916-015-0351-y","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Islam, S. K. H., Biswas, G. P., Khan, M. K., and Kumar, N., An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography. J. Med. Syst. 39:180, 2015.","journal-title":"J. Med. Syst."},{"doi-asserted-by":"crossref","unstructured":"Peng, S., An ID-based multiple authentication scheme against attacks in wireless sensor networks, CCIS 2012 (2012)","key":"692_CR16","DOI":"10.1109\/CCIS.2012.6664540"},{"doi-asserted-by":"crossref","unstructured":"Shi, W., and Gong, P., A new user authentication protocol for wireless sensor networks usign elliptic curves cryptography. International Journal of Distributed Sensor Networks, 2013. Article ID 730831.","key":"692_CR17","DOI":"10.1155\/2013\/730831"},{"issue":"10","key":"692_CR18","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.ins.2015.01.037","volume":"321","author":"HM Sun","year":"2015","unstructured":"Sun, H. M., He, B. Z., Chen, C. M., Wu, T. Y., Lin, C. H., and Wang, H., A provable authenticated group key agreement protocol for mobile environment. Information Sciences 321(10):224\u2013237, 2015.","journal-title":"Information Sciences"},{"issue":"2","key":"692_CR19","doi-asserted-by":"crossref","first-page":"1578","DOI":"10.1109\/TII.2014.2306382","volume":"10","author":"B Xu","year":"2014","unstructured":"Xu, B., Xu, L. D., Cai, H., Xie, C., Hu, J., and Bu, F., Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Trans. on Industrial Informatics 10(2):1578\u20131586, 2014.","journal-title":"IEEE Trans. on Industrial Informatics"},{"doi-asserted-by":"crossref","unstructured":"Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., Ylianttila, M., and Pauthkey, A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. International Journal of Distributed Sensor Networks 2014, 2014. Article ID 357430.","key":"692_CR20","DOI":"10.1109\/WCNC.2014.6952860"},{"doi-asserted-by":"crossref","unstructured":"Hou, J. L., and Yeh, K. H., Novel authentication schemes for IoT based healthcare systems. International Journal of Distributed Sensor Networks 2015, 2015. Article ID 183659.","key":"692_CR21","DOI":"10.1155\/2015\/183659"},{"issue":"6","key":"692_CR22","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1109\/TC.2010.40","volume":"59","author":"L Harn","year":"2010","unstructured":"Harn, L., and Lin, C., Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. Computers 59(6):842\u2013846, 2010.","journal-title":"IEEE Trans. Computers"},{"issue":"11","key":"692_CR23","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A., How to share a secret. Comm. ACM. 22(11):612\u2013613, 1979.","journal-title":"Comm. ACM."},{"doi-asserted-by":"crossref","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., and Yung, M., Proactive secret sharing or: how to cope with perpetual leakage. CRYPTO 95,339\u2013352, 1995.","key":"692_CR24","DOI":"10.1007\/3-540-44750-4_27"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., and Lee, W., Intrusion detection in wireless ad-hoc networks. Mobicom 2000,275\u2013283, 2000.","key":"692_CR25","DOI":"10.1145\/345910.345958"},{"doi-asserted-by":"crossref","unstructured":"Bechler, M., Hof, H. J., Kraft, D., Pahlke, F., and Wolf, L., A cluster-based security architecture for ad hoc networks. Infocom, 2004,2393\u20132403, 2004.","key":"692_CR26","DOI":"10.1109\/INFCOM.2004.1354661"},{"issue":"10","key":"692_CR27","doi-asserted-by":"crossref","first-page":"3072","DOI":"10.1109\/TWC.2010.080610.090759","volume":"9","author":"L-C Li","year":"2010","unstructured":"Li, L.-C., and Liu, R.-S., Securing cluster-based ad hoc networks with distributed authorities. IEEE Trans. on Wireless Communications 9(10):3072\u20133081, 2010.","journal-title":"IEEE Trans. on Wireless Communications"},{"unstructured":"Menezes, A. J., van Oorschot, P. C., and Vanstone, S. A., Handbook of Applied Cryptography, pp. 524\u2013526: CRC Press.","key":"692_CR28"}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0692-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-017-0692-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0692-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T13:55:59Z","timestamp":1568814959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-017-0692-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,15]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["692"],"URL":"https:\/\/doi.org\/10.1007\/s10916-017-0692-9","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"type":"print","value":"0148-5598"},{"type":"electronic","value":"1573-689X"}],"subject":[],"published":{"date-parts":[[2017,2,15]]},"article-number":"48"}}