{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T07:58:31Z","timestamp":1769500711537,"version":"3.49.0"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T00:00:00Z","timestamp":1490918400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s10916-017-0720-9","type":"journal-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T05:49:48Z","timestamp":1490939388000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":69,"title":["A Mutual Authentication Framework for Wireless Medical Sensor Networks"],"prefix":"10.1007","volume":"41","author":[{"given":"Jangirala","family":"Srinivas","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8115-6397","authenticated-orcid":false,"given":"Dheerendra","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Sourav","family":"Mukhopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,31]]},"reference":[{"issue":"2","key":"720_CR1","doi-asserted-by":"publisher","first-page":"857","DOI":"10.2298\/CSIS141029030K","volume":"12","author":"MK Khan","year":"2015","unstructured":"Khan, M. K., Chaturvedi, A., Mishra, D., and Kumari, S., On the security enhancement of integrated electronic patient records information systems. Comput. Sci. Inf. Syst. 12(2):857\u2013872, 2015.","journal-title":"Comput. Sci. Inf. Syst."},{"issue":"4","key":"720_CR2","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/TITB.2004.840019","volume":"8","author":"RS Istepanian","year":"2004","unstructured":"Istepanian, R. S., Jovanov, E., and Zhang, Y., Guest editorial introduction to the special section on m-health: Beyond seamless mobility and global wireless health-care connectivity. IEEE Trans. Inf. Technol. Biomed. 8(4): 405\u2013414, 2004.","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"720_CR3","unstructured":"Wood, A., Virone, G., Doan, T., Cao, Q., Selavo, L., Wu, Y., Fang, L., He, Z., Lin, S., Stankovic, J.: Alarm-net: Wireless sensor networks for assisted-living and residential monitoring. University of Virginia Computer Science Department Technical Report 2 (2006)"},{"issue":"4","key":"720_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MPRV.2004.18","volume":"3","author":"K Lorincz","year":"2004","unstructured":"Lorincz, K., Malan, D. J., Fulford-Jones, T. R., Nawoj, A., Clavel, A., Shnayder, V., Mainland, G., Welsh, M., Moulton, S., Sensor networks for emergency response: Challenges and opportunities. IEEE Pervasive Comput. 3(4):16\u201323, 2004.","journal-title":"IEEE Pervasive Comput."},{"key":"720_CR5","doi-asserted-by":"crossref","unstructured":"Chen, B. R., Peterson, G., Mainland, G., and Welsh, M., Livenet: Using passive monitoring to reconstruct sensor network dynamics. Distributed Computing in Sensor Systems, pp. 79\u201398. Springer (2008)","DOI":"10.1007\/978-3-540-69170-9_6"},{"key":"720_CR6","doi-asserted-by":"crossref","unstructured":"van Halteren, A., Bults, R., Wac, K., Konstantas, D., Widya, I., Dokovski, N., Koprinkov, G., Jones, V., Herzog, R.: Mobile patient monitoring: The mobihealth system (2004)","DOI":"10.3233\/978-1-60750-946-2-307"},{"key":"720_CR7","doi-asserted-by":"publisher","unstructured":"Fischer, M., Lim, Y. Y., Lawrence, E., and Ganguli, L. K., Remotecare: Health monitoring with streaming video. 7th International Conference on Mobile Business (ICMB\u201908), pp. 280\u2013286. IEEE (2008)","DOI":"10.1109\/ICMB.2008.16"},{"issue":"3","key":"720_CR8","first-page":"237","volume":"41","author":"F Bellifemine","year":"2011","unstructured":"Bellifemine, F., Fortino, G., Giannantonio, R., Gravina, R., Guerrieri, A., Sgroi, M., Spine: A domain-specific framework for rapid prototyping of wbsn applications. Software: Practice and Experience 41(3): 237\u2013265, 2011.","journal-title":"Software: Practice and Experience"},{"key":"720_CR9","unstructured":"Ng, J. W., Lo, B. P., Wells, O., Sloman, M., Peters, N., Darzi, A., Toumazou, C., Yang, G. Z.: Ubiquitous monitoring environment for wearable and implantable sensors (ubimon). International Conference on Ubiquitous Computing (Ubicomp). Citeseer (2004)"},{"key":"720_CR10","doi-asserted-by":"crossref","unstructured":"de los Angeles Cosio Leon, M., Hipolito, J. I. N., and Garc\u00eda, J. L.: A security and privacy survey for wsn in e-health applications. Electronics, Robotics and Automotive Mechanics Conference, 2009. CERMA\u201909, pp. 125\u2013130. IEEE (2009)","DOI":"10.1109\/CERMA.2009.47"},{"issue":"2","key":"720_CR11","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/s10550-006-0051-8","volume":"24","author":"H Ng","year":"2006","unstructured":"Ng, H., Sim, M., and Tan, C., Security issues of wireless sensor networks in healthcare applications. BT Technol. J. 24(2):138\u2013144, 2006.","journal-title":"BT Technol. J."},{"issue":"1-2","key":"720_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1504\/IJAHUC.2015.067794","volume":"18","author":"D Mishra","year":"2015","unstructured":"Mishra, D., Chaturvedi, A., and Mukhopadhyay, S., An improved biometric\u2013based remote user authentication scheme for connected healthcare. Int. J. Ad Hoc Ubiquitous Comput. 18(1-2):75\u201384, 2015.","journal-title":"Int. J. Ad Hoc Ubiquitous Comput."},{"issue":"15","key":"720_CR13","doi-asserted-by":"publisher","first-page":"2688","DOI":"10.1016\/j.comnet.2010.05.003","volume":"54","author":"H Alemdar","year":"2010","unstructured":"Alemdar, H., and Ersoy, C., Wireless sensor networks for healthcare: A survey. Comput. Netw. 54(15): 2688\u20132710, 2010.","journal-title":"Comput. Netw."},{"key":"720_CR14","doi-asserted-by":"publisher","unstructured":"Das, A. K., Sutrala, A. K., Odelu, V., and Goswami, A., A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wirel. Pers. Commun.,1\u201335, 2016.","DOI":"10.1109\/TWC.2016.2552159"},{"issue":"11","key":"720_CR15","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10916-016-0596-0","volume":"40","author":"M Wazid","year":"2016","unstructured":"Wazid, M., Zeadally, S., Das, A. K., and Odelu, V., Analysis of security protocols for mobile healthcare. J. Med. Syst. 40(11):229, 2016.","journal-title":"J. Med. Syst."},{"issue":"1","key":"720_CR16","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/s10916-014-0154-6","volume":"39","author":"D Mishra","year":"2015","unstructured":"Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1):154, 2015.","journal-title":"J. Med. Syst."},{"issue":"4","key":"720_CR17","first-page":"1","volume":"10","author":"MK Khan","year":"2014","unstructured":"Khan, M.K., and Kumari, S., An improved user authentication protocol for healthcare services via wireless medical sensor networks. Int. J. Distrib. Sens. Netw. 10(4):1\u201310, 2014.","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"720_CR18","doi-asserted-by":"crossref","unstructured":"Wu, F., Xu, L., Kumari, S., and Li, X., An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimedia Systems,1\u201311, 2015.","DOI":"10.1007\/s00530-015-0476-3"},{"issue":"2","key":"720_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0182-2","volume":"39","author":"L Xu","year":"2015","unstructured":"Xu, L., and Wu, F., Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J. Med. Syst. 39(2):1\u20139, 2015.","journal-title":"J. Med. Syst."},{"issue":"6","key":"720_CR20","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/TITB.2007.894818","volume":"11","author":"F Hu","year":"2007","unstructured":"Hu, F., Jiang, M., Wagner, M., and Dong, D. C., Privacy-preserving telecardiology sensor networks: Toward a low-cost portable wireless hardware\/software codesign. IEEE Trans. Inf. Technol. Biomed. 11(6):619\u2013627, 2007.","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"720_CR21","doi-asserted-by":"publisher","unstructured":"Mishra, D., and Mukhopadhyay, S., Cryptanalysis of pairing-free identity-based authenticated key agreement protocols. International Conference on Information Systems Security, pp. 247\u2013254. Springer (2013)","DOI":"10.1007\/978-3-642-45204-8_19"},{"issue":"6","key":"720_CR22","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., and Khan, M. K., Cryptanalysis and improvement of yan et al.s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):24, 2014.","journal-title":"J. Med. Syst."},{"issue":"6","key":"720_CR23","doi-asserted-by":"publisher","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"HM Chen","year":"2012","unstructured":"Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907\u20133915 , 2012.","journal-title":"J. Med. Syst."},{"issue":"2","key":"720_CR24","doi-asserted-by":"publisher","first-page":"9929","DOI":"10.1007\/s10916-013-9929-4","volume":"37","author":"HY Lin","year":"2013","unstructured":"Lin, H. Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9929, 2013.","journal-title":"J. Med. Syst."},{"issue":"2","key":"720_CR25","doi-asserted-by":"publisher","first-page":"9912","DOI":"10.1007\/s10916-012-9912-5","volume":"37","author":"T Cao","year":"2013","unstructured":"Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9912, 2013.","journal-title":"J. Med. Syst."},{"issue":"2","key":"720_CR26","doi-asserted-by":"publisher","first-page":"9911","DOI":"10.1007\/s10916-012-9911-6","volume":"37","author":"Q Xie","year":"2013","unstructured":"Xie, Q., Zhang, J., and Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9911, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"720_CR27","first-page":"355","volume":"6","author":"XH Le","year":"2011","unstructured":"Le, X. H., Khalid, M., Sankar, R., and Lee, S., An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J. Netw. 6(3):355\u2013364, 2011.","journal-title":"J. Netw."},{"key":"720_CR28","doi-asserted-by":"publisher","unstructured":"Huang, H. F., Chang, Y. F., and Liu, C. H., Enhancement of two-factor user authentication in wireless sensor networks. IEEE 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 27\u201330 (2010)","DOI":"10.1109\/IIHMSP.2010.14"},{"issue":"10","key":"720_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0120-3","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Srinivas, J., andMukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10):1\u201310, 2014.","journal-title":"J. Med. Syst."},{"key":"720_CR30","first-page":"28","volume":"23","author":"D Mishra","year":"2015","unstructured":"Mishra, D., Das, A. K., Chaturvedi, A., and Mukhopadhyay, S., A secure password-based authentication and key agreement scheme using smart cards. J. Inf. Secur. Appl. 23:28\u201343, 2015.","journal-title":"J. Inf. Secur. Appl."},{"key":"720_CR31","doi-asserted-by":"publisher","unstructured":"He, D., Zeadally, S., Kumar, N., and Lee, J. H., Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J.,1\u201312, 2016.","DOI":"10.1109\/JSYST.2016.2544805"},{"issue":"5","key":"720_CR32","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1016\/j.jnca.2013.02.034","volume":"36","author":"X Li","year":"2013","unstructured":"Li, X., Niu, J., Khan, M. K., and Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365\u20131371, 2013.","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"720_CR33","doi-asserted-by":"publisher","first-page":"9994","DOI":"10.1007\/s10916-013-9994-8","volume":"38","author":"X Xu","year":"2013","unstructured":"Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., and He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):9994, 2013.","journal-title":"J. Med. Syst."},{"issue":"3","key":"720_CR34","doi-asserted-by":"publisher","first-page":"9941","DOI":"10.1007\/s10916-013-9941-8","volume":"37","author":"TF Lee","year":"2013","unstructured":"Lee, T. F., Chang, I. P., Lin, T. H., and Wang, C. C., A secure and efficient password-based user authentication scheme using smart cards for the integrated epr information system. J. Med. Syst. 37(3):9941, 2013.","journal-title":"J. Med. Syst."},{"issue":"2","key":"720_CR35","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/s10916-014-0012-6","volume":"38","author":"Q Jiang","year":"2014","unstructured":"Jiang, Q., Ma, J., Lu, X., and Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):12, 2014.","journal-title":"J. Med. Syst."},{"issue":"2","key":"720_CR36","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1002\/sec.967","volume":"8","author":"FT Bin Muhaya","year":"2015","unstructured":"Bin Muhaya, F. T., Cryptanalysis and security enhancement of zhu\u2019s authentication scheme for telecare medicine information system. Secur. Commun. Netw. 8(2):149\u2013158, 2015.","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"720_CR37","doi-asserted-by":"publisher","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833\u20133838, 2012.","journal-title":"J. Med. Syst."},{"issue":"4","key":"720_CR38","doi-asserted-by":"publisher","first-page":"9954","DOI":"10.1007\/s10916-013-9954-3","volume":"37","author":"MK Khan","year":"2013","unstructured":"Khan,M. K., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):9954, 2013.","journal-title":"J. Med. Syst."},{"issue":"1","key":"720_CR39","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s11042-014-2282-x","volume":"75","author":"H Arshad","year":"2016","unstructured":"Arshad, H., and Nikooghadam, M., An efficient and secure authentication and key agreement scheme for session initiation protocol using ecc. Multimedia Tools and Applications 75(1):181\u2013197, 2016.","journal-title":"Multimedia Tools and Applications"},{"issue":"9","key":"720_CR40","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10916-015-0265-8","volume":"39","author":"O Mir","year":"2015","unstructured":"Mir, O., van der Weide, T., and Lee, C. C., A secure user anonymity and authentication scheme using avispa for telecare medical information systems. J. Med. Syst. 39(9):89, 2015.","journal-title":"J. Med. Syst."},{"issue":"3","key":"720_CR41","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M. L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 8 (3):1086\u20131090, 2009.","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"5","key":"720_CR42","doi-asserted-by":"publisher","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","volume":"32","author":"TH Chen","year":"2010","unstructured":"Chen, T. H., and Shih, W. K., A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32(5):704\u2013712, 2010.","journal-title":"ETRI J."},{"issue":"3","key":"720_CR43","doi-asserted-by":"publisher","first-page":"2450","DOI":"10.3390\/s100302450","volume":"10","author":"MK Khan","year":"2010","unstructured":"Khan, M. K., and Alghathbar, K., Cryptanalysis and security improvements of \u2019two-factor user authentication in wireless sensor networks\u2019. Sensors 10(3):2450\u20132459, 2010.","journal-title":"Sensors"},{"issue":"2","key":"720_CR44","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.3390\/s120201625","volume":"12","author":"P Kumar","year":"2012","unstructured":"Kumar, P., Lee, S. G., and Lee, H. J., E-sap: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625\u20131647, 2012.","journal-title":"Sensors"},{"issue":"1","key":"720_CR45","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2013","unstructured":"He, D., Kumar, N., Chen, J., Lee, C. C., Chilamkurti, N., and Yeo, S. S., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems 21(1):49\u201360, 2013.","journal-title":"Multimedia Systems"},{"issue":"15","key":"720_CR46","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1002\/sec.1214","volume":"9","author":"X Li","year":"2016","unstructured":"Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., and Khan, M. K., A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Netw. 9(15): 2643\u20132655, 2016.","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"720_CR47","doi-asserted-by":"publisher","first-page":"9997","DOI":"10.1007\/s10916-013-9997-5","volume":"38","author":"Z Siddiqui","year":"2014","unstructured":"Siddiqui, Z., Abdullah, A. H., Khan, M. K., and Alghamdi, A. S., Smart environment as a service: Three factor cloud based user authentication for telecare medical information system. J. Med. Syst. 38(1):9997, 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"720_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0041-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., and Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5): 1\u201313, 2014.","journal-title":"J. Med. Syst."},{"issue":"4","key":"720_CR49","doi-asserted-by":"publisher","first-page":"2439","DOI":"10.1007\/s11277-015-2538-4","volume":"83","author":"O Mir","year":"2015","unstructured":"Mir, O., and Nikooghadam, M., A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services. Wirel. Pers. Commun. 83(4):2439\u20132461, 2015.","journal-title":"Wirel. Pers. Commun."},{"issue":"9","key":"720_CR50","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/s10916-015-0276-5","volume":"39","author":"AK Das","year":"2015","unstructured":"Das, A. K., Odelu, V., and Goswami, A., A secure and robust user authenticated key agreement scheme for hierarchical multi-medical server environment in tmis. J. Med. Syst. 39(9):92, 2015.","journal-title":"J. Med. Syst."},{"issue":"3","key":"720_CR51","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s10916-015-0218-2","volume":"39","author":"AK Das","year":"2015","unstructured":"Das, A. K., A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems. J. Med. Syst. 39(3):30, 2015.","journal-title":"J. Med. Syst."},{"key":"720_CR52","doi-asserted-by":"publisher","unstructured":"David, D. B., Mutual authentication scheme for multimedia medical information systems. Multimedia Tools and Applications,1\u201319, 2016.","DOI":"10.1007\/s11042-016-3268-7"},{"key":"720_CR53","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.comnet.2016.01.006","volume":"101","author":"R Amin","year":"2016","unstructured":"Amin, R., Islam, S. H., Biswas, G., Khan, M. K., Leng, L., and Kumar, N., Design of anonymity preserving three-factor authenticated key exchange protocol for wireless sensor network. Comput. Netw. 101:42\u201362, 2016.","journal-title":"Comput. Netw."},{"issue":"2","key":"720_CR54","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., and Yao, A. C., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198\u2013208, 1983.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"720_CR55","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541\u2013552, 2002.","journal-title":"IEEE Trans. Comput."},{"key":"720_CR56","doi-asserted-by":"publisher","unstructured":"Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. In: Proceedings of Advances in Cryptology - CRYPTO\u201999, Vol. 1666, pp. 388\u2013397. LNCS (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"720_CR57","doi-asserted-by":"publisher","unstructured":"Wu, F., Xu, L., Kumari, S., and Li, X., A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Networking and Applications,1\u201315, 2015.","DOI":"10.1007\/s12083-015-0404-5"},{"issue":"3","key":"720_CR58","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1007\/s11277-015-2975-0","volume":"86","author":"D Mishra","year":"2016","unstructured":"Mishra, D., Design and analysis of a provably secure multi-server authentication scheme. Wirel. Pers. Commun. 86(3):1095\u20131119, 2016.","journal-title":"Wirel. Pers. Commun."},{"key":"720_CR59","unstructured":"AVISPA: Automated Validation of Internet Security Protocols and Applications http:\/\/www.avispa-project.org\/ . Accessed on January, Vol. 2015,"},{"issue":"3","key":"720_CR60","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3):816\u2013823, 2015.","journal-title":"IEEE Syst. J."},{"issue":"9","key":"720_CR61","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., and Goswami, A., A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans. Inf. Forensics Secur. 10(9):1953\u20131966, 2015.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"720_CR62","doi-asserted-by":"publisher","first-page":"2571","DOI":"10.1007\/s11277-015-2721-7","volume":"84","author":"V Odelu","year":"2015","unstructured":"Odelu, V., Das, A. K., and Goswami, A., An effective and robust secure remote user authenticated key agreement scheme using smart cards in wireless communication systems. Wirel. Pers. Commun. 84(4):2571\u20132598, 2015.","journal-title":"Wirel. Pers. Commun."},{"issue":"5","key":"720_CR63","doi-asserted-by":"publisher","first-page":"052108","DOI":"10.1007\/s11432-015-5469-5","volume":"59","author":"D He","year":"2016","unstructured":"He, D., Kumar, N., Shen, H., and Lee, J. H., One-to-many authentication for access control in mobile pay-tv systems. Science China Information Sciences 59(5):052108, 2016.","journal-title":"Science China Information Sciences"},{"issue":"13","key":"720_CR64","doi-asserted-by":"crossref","first-page":"2070","DOI":"10.1002\/sec.1464","volume":"9","author":"AK Das","year":"2016","unstructured":"Das, A. K., Sutrala, A. K., Kumari, S., Odelu, V., Wazid, M., and Li, X., An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur. Commun. Netw. 9(13):2070\u20132092, 2016.","journal-title":"Secur. Commun. Netw."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0720-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-017-0720-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-017-0720-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:54:21Z","timestamp":1750190061000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-017-0720-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,31]]},"references-count":64,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["720"],"URL":"https:\/\/doi.org\/10.1007\/s10916-017-0720-9","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,31]]},"article-number":"80"}}