{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T23:20:22Z","timestamp":1773530422831,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,2,17]],"date-time":"2017-02-17T00:00:00Z","timestamp":1487289600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s10916-017-0699-2","type":"journal-article","created":{"date-parts":[[2017,2,17]],"date-time":"2017-02-17T07:36:38Z","timestamp":1487316998000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":94,"title":["A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System"],"prefix":"10.1007","volume":"41","author":[{"given":"Prerna","family":"Mohit","sequence":"first","affiliation":[]},{"given":"Ruhul","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Arijit","family":"Karati","sequence":"additional","affiliation":[]},{"given":"G. P.","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,17]]},"reference":[{"issue":"1","key":"699_CR1","first-page":"172","volume":"18","author":"R Amin","year":"2016","unstructured":"Amin, R., Cryptanalysis and efficient dynamic id based remote user authentication scheme in multi-server environment using smart card. IJ Netw. Secur. 18(1):172\u2013181, 2016.","journal-title":"IJ Netw. Secur."},{"issue":"11","key":"699_CR2","doi-asserted-by":"crossref","first-page":"3135","DOI":"10.1007\/s13369-015-1743-5","volume":"40","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G. P, Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card. Arab. J. Sci. Eng. 40(11):3135\u20133149, 2015.","journal-title":"Arab. J. Sci. Eng."},{"issue":"8","key":"699_CR3","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G. P., A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8):1\u201319, 2015.","journal-title":"J. Med. Syst."},{"key":"699_CR4","doi-asserted-by":"publisher","unstructured":"Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Kumar, N.: A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Generation Computer Systems. doi: 10.1016\/j.future.2016.05.032 (2016)","DOI":"10.1016\/j.future.2016.05.032"},{"issue":"11","key":"699_CR5","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/s10916-015-0318-z","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Li, X., Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems. J. Med. Syst. 39(11):140 , 2015.","journal-title":"J. Med. Syst."},{"issue":"11","key":"699_CR6","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1007\/s10916-016-0592-4","volume":"40","author":"SA Chaudhry","year":"2016","unstructured":"Chaudhry, S. A., Khan, M. T., Khan, M. K., Shon, T., A multiserver biometric authentication scheme for tmis using elliptic curve cryptography. J. Med. Syst. 40(11):230, 2016.","journal-title":"J. Med. Syst."},{"issue":"6","key":"699_CR7","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s10916-015-0244-0","volume":"39","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., Farash, M. S., Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J. Med. Syst. 39(6):65\u201375, 2015.","journal-title":"J. Med. Syst."},{"issue":"11","key":"699_CR8","first-page":"1","volume":"38","author":"CL Chen","year":"2014","unstructured":"Chen, C. L., Yang, T. T., Chiang, M. L., Shih, T. F., A privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 38(11):1\u201316, 2014.","journal-title":"J. Med. Syst."},{"issue":"9","key":"699_CR9","first-page":"1","volume":"38","author":"CL Chen","year":"2014","unstructured":"Chen, C. L., Yang, T. T., Shih, T. F., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38(9):1\u201312, 2014.","journal-title":"J. Med. Syst."},{"issue":"4","key":"699_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-016-0453-1","volume":"40","author":"SY Chiou","year":"2016","unstructured":"Chiou, S. Y., Ying, Z., Liu, J., Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 40(4):1\u201315, 2016.","journal-title":"J. Med. Syst."},{"issue":"3","key":"699_CR11","doi-asserted-by":"crossref","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"H Debiao","year":"2012","unstructured":"Debiao, H., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989\u20131995, 2012.","journal-title":"J. Med. Syst."},{"issue":"4","key":"699_CR12","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/TCE.2015.7389804","volume":"61","author":"D Giri","year":"2015","unstructured":"Giri, D., Sherratt, R. S., Maitra, T., Amin, R., Efficient biometric and password based mutual authentication for consumer usb mass storage devices. IEEE Trans. Consum. Electron. 61(4):491\u2013499, 2015.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"11","key":"699_CR13","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s10916-016-0620-4","volume":"40","author":"P Gope","year":"2016","unstructured":"Gope, P., and Amin, R., A novel reference security model with the situation based access policy for accessing ephr data. J. Med. Syst. 40(11):41\u201353, 2016.","journal-title":"J. Med. Syst."},{"issue":"11","key":"699_CR14","doi-asserted-by":"crossref","first-page":"7124","DOI":"10.1109\/TIE.2016.2585081","volume":"63","author":"P Gope","year":"2016","unstructured":"Gope, P., and Hwang, T., A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11):7124\u20137132, 2016.","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"5","key":"699_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-015-5284-z","volume":"59","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Shen, H., Lee, J. H., One-to-many authentication for access control in mobile pay-tv systems. Sci. China Inf. Sci. 59(5):1\u201314, 2015.","journal-title":"Sci. China Inf. Sci."},{"key":"699_CR16","doi-asserted-by":"publisher","unstructured":"He, D., Kumar, N., Wang, H., Wang, L., Choo, K. K. R., Vinel, A.: A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Transactions on Dependable and Secure Computing (99), 1\u20131. doi: 10.1109\/TDSC.2016.2596286 (2016)","DOI":"10.1109\/TDSC.2016.2596286"},{"issue":"3","key":"699_CR17","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3):816\u2013823, 2015.","journal-title":"IEEE Syst. J."},{"key":"699_CR18","doi-asserted-by":"publisher","unstructured":"He, D., Zeadally, S., Kumar, N., Lee, J. H.: Anonymous authentication for wireless body area networks with provable security (99) 1\u201312. doi: 10.1109\/JSYST.2016.2544805 (2016)","DOI":"10.1109\/JSYST.2016.2544805"},{"key":"699_CR19","doi-asserted-by":"publisher","unstructured":"Islam, S., Obaidat, M. S., Amin, R.: An anonymous and provably secure authentication scheme for mobile user. International Journal of Communication Systems. doi: 10.1002\/dac.3126 (2016)","DOI":"10.1002\/dac.3126"},{"key":"699_CR20","doi-asserted-by":"publisher","unstructured":"Islam, S. H., Amin, R., Biswas, G. P., Farash, M. S., Li, X., Kumari, S.: An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments Journal of King Saud University-Computer and Information Sciences. doi: 10.1016\/j.jksuci.2015.08.002 (2015)","DOI":"10.1016\/j.jksuci.2015.08.002"},{"issue":"1","key":"699_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-012-9897-0","volume":"37","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1\u20138, 2013.","journal-title":"J. Med. Syst."},{"issue":"8","key":"699_CR22","doi-asserted-by":"crossref","first-page":"3201","DOI":"10.1007\/s13369-016-2156-9","volume":"41","author":"A Karati","year":"2016","unstructured":"Karati, A., Amin, R., Biswas, G. P., Provably secure threshold-based abe scheme without bilinear map. Arab. J. Sci. Eng. 41(8):3201\u20133213, 2016.","journal-title":"Arab. J. Sci. Eng."},{"issue":"4","key":"699_CR23","first-page":"1","volume":"37","author":"MK Khan","year":"2013","unstructured":"Khan, M. K., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):1\u201312, 2013.","journal-title":"J. Med. Syst."},{"key":"699_CR24","doi-asserted-by":"crossref","unstructured":"Kumar, R., Amin, R., Karati, A., Biswas, G. P.: Secure remote login scheme with password and smart card update facilities. In: Proceedings of the 4th international conference on frontiers in intelligent computing: Theory and applications (FICTA) 2015, pp. 495\u2013505. Springer (2016)","DOI":"10.1007\/978-81-322-2695-6_41"},{"issue":"4","key":"699_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-013-9952-5","volume":"37","author":"S Kumari","year":"2013","unstructured":"Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of \u2019a privacy enhanced scheme for telecare medical information systems\u2019. J. Med. Syst. 37(4):1\u201311, 2013.","journal-title":"J. Med. Syst."},{"issue":"5","key":"699_CR26","first-page":"1","volume":"37","author":"CC Lee","year":"2013","unstructured":"Lee, C. C., Hsu, C. W., Lai, Y. M., Vasilakos, A., An enhanced mobile-healthcare emergency system based on extended chaotic maps. J. Med. Syst. 37(5):1\u201312, 2013.","journal-title":"J. Med. Syst."},{"issue":"9","key":"699_CR27","first-page":"1","volume":"38","author":"CT Li","year":"2014","unstructured":"Li, C. T., Lee, C. C., Weng, C. Y., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9):1\u201311, 2014.","journal-title":"J. Med. Syst."},{"key":"699_CR28","doi-asserted-by":"publisher","unstructured":"Li, X., Kumari, S., Shen, J., Wu, F., Chen, C., Islam, S. H.: Secure data access and sharing scheme for cloud storage. Wireless Personal Communications pp.1\u201320. doi: 10.1007\/s11277-016-3742-6 (2016)","DOI":"10.1007\/s11277-016-3742-6"},{"issue":"12","key":"699_CR29","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/s10916-016-0595-1","volume":"40","author":"X Li","year":"2016","unstructured":"Li, X., Niu, J., Karuppiah, M., Kumari, S., Wu, F., Secure and efficient two-factor user authentication scheme with user anonymity for network based e-health care applications. J. Med. Syst. 40(12):267\u2013277, 2016.","journal-title":"J. Med. Syst."},{"issue":"5","key":"699_CR30","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X., Niu, J., Khan, M. K., Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365\u20131371, 2013.","journal-title":"J. Netw. Comput. Appl."},{"key":"699_CR31","doi-asserted-by":"publisher","unstructured":"Maitra, T., Obaidat, M. S., Amin, R., Islam, S., Chaudhry, S. A., Giri, D.: A robust elgamal-based password-authentication protocol using smart card for client-server communication International Journal of Communication Systems. doi: 10.1002\/dac.3242 (2016)","DOI":"10.1002\/dac.3242"},{"issue":"6","key":"699_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and improvement of yan others.\u2019s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):1\u201312, 2014.","journal-title":"J. Med. Syst."},{"issue":"10","key":"699_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10): 1\u201310, 2014.","journal-title":"J. Med. Syst."},{"issue":"3","key":"699_CR34","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1109\/TVT.2015.2405853","volume":"65","author":"J Shao","year":"2016","unstructured":"Shao, J., Lin, X., Lu, R., Zuo, C., A threshold anonymous authentication protocol for vanets. IEEE Trans. Veh. Technol. 65(3):1711\u20131720, 2016.","journal-title":"IEEE Trans. Veh. Technol."},{"key":"699_CR35","doi-asserted-by":"publisher","unstructured":"Sureshkumar, V., Anitha, R., Rajamanickam, N., Amin, R.: A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity Computers & Electrical Engineering. doi: 10.1016\/j.compeleceng.2016.07.014 (2016)","DOI":"10.1016\/j.compeleceng.2016.07.014"},{"key":"699_CR36","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.cmpb.2016.07.028","volume":"135","author":"AK Sutrala","year":"2016","unstructured":"Sutrala, A. K., Das, A. K., Odelu, V., Wazid, M., Kumari, S., Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Comput. Methods Prog. Biomed. 135:167\u2013185, 2016.","journal-title":"Comput. Methods Prog. Biomed."},{"issue":"3","key":"699_CR37","first-page":"200","volume":"2","author":"Z Tan","year":"2013","unstructured":"Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200\u2013204, 2013.","journal-title":"Network"},{"issue":"13","key":"699_CR38","doi-asserted-by":"crossref","first-page":"1983","DOI":"10.1002\/sec.1452","volume":"9","author":"M Wazid","year":"2016","unstructured":"Wazid, M., Das, A. K., Kumari, S., Li, X., Wu, F., Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for tmis. Secur. Commun. Netw. 9(13):1983\u20132001, 2016.","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"699_CR39","doi-asserted-by":"crossref","first-page":"3597","DOI":"10.1007\/s10916-012-9835-1","volume":"36","author":"J Wei","year":"2012","unstructured":"Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597\u20133604, 2012.","journal-title":"J. Med. Syst."},{"issue":"2","key":"699_CR40","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/s10916-010-9527-7","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z. Y., Chung, Y., Lai, F., Chen, T. S., A password-based user authentication scheme for the integrated epr information system. J. Med. Syst. 36(2):631\u2013638, 2012.","journal-title":"J. Med. Syst."},{"issue":"3","key":"699_CR41","doi-asserted-by":"crossref","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529\u20131535, 2012.","journal-title":"J. Med. Syst."},{"issue":"4","key":"699_CR42","doi-asserted-by":"crossref","first-page":"2547","DOI":"10.1007\/s10916-011-9727-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu, Z. Y., Tseng, Y. J., Chung, Y., Chen, Y. C., Lai, F., A reliable user authentication and key agreement scheme for web-based hospital-acquired infection surveillance information system. J. Med. Syst. 36(4): 2547\u20132555, 2012.","journal-title":"J. Med. Syst."},{"issue":"5","key":"699_CR43","first-page":"1","volume":"35","author":"X Yan","year":"2013","unstructured":"Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J. Med. Syst. 35(5):1\u20136, 2013.","journal-title":"J. Med. Syst."},{"issue":"6","key":"699_CR44","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1007\/s12083-014-0299-6","volume":"8","author":"H Yang","year":"2015","unstructured":"Yang, H., Kim, H., Mtonga, K., An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-to-Peer Netw. Appl. 8(6):1059\u20131069, 2015.","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"6","key":"699_CR45","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833\u20133838 , 2012.","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0699-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-017-0699-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0699-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T14:49:22Z","timestamp":1719067762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-017-0699-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,17]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["699"],"URL":"https:\/\/doi.org\/10.1007\/s10916-017-0699-2","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,17]]},"article-number":"50"}}