{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:30:59Z","timestamp":1775262659317,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2018,11,3]],"date-time":"2018-11-03T00:00:00Z","timestamp":1541203200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61303237"],"award-info":[{"award-number":["61303237"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10916-018-1099-y","type":"journal-article","created":{"date-parts":[[2018,11,2]],"date-time":"2018-11-02T22:50:04Z","timestamp":1541199004000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Privacy Protection for Point-of-Care Using Chaotic Maps-Based Authentication and Key Agreement"],"prefix":"10.1007","volume":"42","author":[{"given":"Liping","family":"Zhang","sequence":"first","affiliation":[]},{"given":"He","family":"Luo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2557-7784","authenticated-orcid":false,"given":"Lanchao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yixin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,3]]},"reference":[{"issue":"9","key":"1099_CR1","doi-asserted-by":"publisher","first-page":"2186","DOI":"10.1109\/TBME.2016.2631885","volume":"64","author":"A Abuadbba","year":"2017","unstructured":"Abuadbba, A., and Khalil, I., Walsh-Hadamard-Based 3-D steganography for protecting sensitive information in point-of-care. IEEE Trans. Biomed. Eng. 64(9):2186\u20132195, 2017.","journal-title":"IEEE Trans. Biomed. Eng."},{"issue":"3","key":"1099_CR2","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/SURV.2013.121313.00064","volume":"16","author":"S Movassaghi","year":"2014","unstructured":"Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., and Jamalipour, A., Wireless body area networks: A survey. IEEE Commun. Surv. Tutor. 16(3):1658\u20131685, 2014.","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1099_CR3","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.comcom.2016.03.014","volume":"89\u201390","author":"I Chatzigiannakis","year":"2016","unstructured":"Chatzigiannakis, I., Vitaletti, A., and Pyrgelis, A., A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Comput. Commun. 89\u201390:165\u2013177, 2016.","journal-title":"Comput. Commun."},{"key":"1099_CR4","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TWC.2008.080128","volume":"8","author":"ML Das","year":"2009","unstructured":"Das, M. L., Two-factor user authentication scheme in wireless sensor networks. IEEE Trans. Wirel. Commun. 8:1086\u20131090, 2009.","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1099_CR5","doi-asserted-by":"crossref","unstructured":"Lee, C. I, and Chien, H. Y., An elliptic curve cryptography-based RFID authentication securing E-health system. Taylor & Francis, Inc. 2015.","DOI":"10.1155\/2015\/642425"},{"key":"1099_CR6","doi-asserted-by":"crossref","unstructured":"Challa, S., et al., An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Comput. Electr. Eng. 2017.","DOI":"10.1016\/j.compeleceng.2017.08.003"},{"issue":"3","key":"1099_CR7","first-page":"63","volume":"8","author":"YS Lee","year":"2014","unstructured":"Lee, Y. S., Alasaarela, E., and Lee, H. J., An efficient encryption scheme using elliptic curve cryptography (ECC) with symmetric algorithm for healthcare system. Int. J. Sec. Appl. 8(3):63\u201370, 2014.","journal-title":"Int. J. Sec. Appl."},{"issue":"4","key":"1099_CR8","first-page":"1","volume":"2015","author":"JL Hou","year":"2015","unstructured":"Hou, J. L., and Yeh, K. H., Novel authentication schemes for IoT based healthcare systems. Int. J. Distrib. Sens. Netw. 2015(4):1\u20139, 2015.","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"11","key":"1099_CR9","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s10916-016-0586-2","volume":"40","author":"CT Li","year":"2016","unstructured":"Li, C. T., Lee, C. C., Weng, C. Y., and Chen, S. J., A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J. Med. Syst. 40(11):233, 2016.","journal-title":"J. Med. Syst."},{"key":"1099_CR10","doi-asserted-by":"publisher","first-page":"10288","DOI":"10.1109\/ACCESS.2016.2638038","volume":"4","author":"Kuo-Hui Yeh","year":"2016","unstructured":"Yeh, K. H., A secure iot-based healthcare system with body sensor networks. IEEE Access, 10288\u201310299, 2016.","journal-title":"IEEE Access"},{"issue":"1","key":"1099_CR11","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He, D., Kumar, N., Chen, J., Lee, C. C., Chilamkurti, N., and Yeo, S. S., Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed. Syst. 21(1):49\u201360, 2015.","journal-title":"Multimed. Syst."},{"issue":"5","key":"1099_CR12","doi-asserted-by":"publisher","first-page":"1368","DOI":"10.1109\/JSEN.2015.2502401","volume":"16","author":"P Gope","year":"2016","unstructured":"Gope, P., and Hwang, T., BSN-care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 16(5):1368\u20131376, 2016.","journal-title":"IEEE Sens. J."},{"issue":"12","key":"1099_CR13","doi-asserted-by":"publisher","first-page":"29841","DOI":"10.3390\/s151229767","volume":"15","author":"IP Chang","year":"2015","unstructured":"Chang, I. P., Lee, T. F., Lin, T. H., and Liu, C. M., Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors. 15(12):29841\u201329854, 2015.","journal-title":"Sensors."},{"key":"1099_CR14","doi-asserted-by":"crossref","unstructured":"Kocarev, L., and Tasev, Z., Public-key encryption based on Chebyshev maps. Proc. Int. Sym. Circ. Syst. 3: III-28-III-31 2003.","DOI":"10.1109\/ISCAS.2003.1204947"},{"key":"1099_CR15","volume-title":"Chebyshev polynomials","author":"JC Mason","year":"2003","unstructured":"Mason, J. C., and Handscomb, D. C., Chebyshev polynomials. Boca Raton: Chapman & Hall\/CRC, 2003."},{"issue":"7","key":"1099_CR16","doi-asserted-by":"publisher","first-page":"1382","DOI":"10.1109\/TCSI.2005.851701","volume":"52","author":"P Bergamo","year":"2004","unstructured":"Bergamo, P., D\u2019Arco, P., Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst. 52(7):1382\u20131393, 2004.","journal-title":"IEEE Trans. Circ. Syst."},{"key":"1099_CR17","unstructured":"Lee, T., Provably secure anonymous single-sign-on authentication mechanisms using extended Chebyshev chaotic maps for distributed Computer networks. IEEE Syst. J. 1\u20138, 2015."},{"key":"1099_CR18","doi-asserted-by":"crossref","unstructured":"Lai, H., Xiao, J., Li, L., and Yang, Y., Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol, Math. Probl. Eng. 2012.","DOI":"10.1155\/2012\/454823"},{"issue":"1\u20132","key":"1099_CR19","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s11071-013-0979-4","volume":"74","author":"F Zhao","year":"2013","unstructured":"Zhao, F., Gong, P., Li, S., Li, M., and Li, P., Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. 74(1\u20132):419\u2013427, 2013.","journal-title":"Nonlinear Dyn."},{"issue":"C","key":"1099_CR20","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.future.2016.04.016","volume":"63","author":"S Kumari","year":"2016","unstructured":"Kumari, S., Li, X., Wu, F., Das, A. K., Arshad, H., and Khan, M. K., A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gen. Comput. Syst. 63(C):56\u201375, 2016.","journal-title":"Future Gen. Comput. Syst."},{"issue":"7","key":"1099_CR21","doi-asserted-by":"publisher","first-page":"14960","DOI":"10.3390\/s150714960","volume":"15","author":"TF Lee","year":"2015","unstructured":"Lee, T. F., Efficient and secure temporal credential-based authenticated key agreement using extended chaotic maps for wireless sensor networks. Sensors. 15(7):14960\u201314980, 2015.","journal-title":"Sensors."},{"issue":"3","key":"1099_CR22","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Soliton Fract. 37(3):669\u2013674, 2008.","journal-title":"Chaos Soliton Fract."},{"key":"1099_CR23","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume":"1807","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. Lect. Notes Comput. Sci. 1807:139\u2013155, 2000.","journal-title":"Lect. Notes Comput. Sci."},{"issue":"2005","key":"1099_CR24","first-page":"65","volume":"3386","author":"M Abdalla","year":"2005","unstructured":"Abdalla, M., Fouque, P. A., and Pointcheval, D., Password-based authenticated key exchange in the three-party setting in public key cryptography - PKC. Springer-Verlag Berlin 3386(2005):65\u201384, 2005.","journal-title":"Springer-Verlag Berlin"},{"key":"1099_CR25","unstructured":"Shoup, V., Sequences of games: A tool for taming complexity in security proofs, Manuscript, 2004. http:\/\/www.shoup.net (Accessed 12 September 2016)."},{"issue":"11","key":"1099_CR26","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/s10916-016-0590-6","volume":"40","author":"H Xiong","year":"2016","unstructured":"Xiong, H., Tao, J., and Chen, Y., A robust and anonymous two factor authentication and key agreement protocol for telecare medicine information systems. J. Med. Syst. 40(11):228, 2016.","journal-title":"J. Med. Syst."},{"issue":"3","key":"1099_CR27","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1007\/s11071-015-1937-0","volume":"80","author":"X Li","year":"2015","unstructured":"Li, X., Niu, J., Kumari, S., Khan, M. K., Liao, J., and Liang, W., Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol. Nonlinear Dyn. 80(3):1209\u20131220, 2015.","journal-title":"Nonlinear Dyn."},{"issue":"4","key":"1099_CR28","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1007\/s11071-014-1827-x","volume":"79","author":"CC Lee","year":"2014","unstructured":"Lee, C. C., Li, C. T., Chiu, S. T., and Lai, Y. M., A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn. 79(4):2485\u20132495, 2014.","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"1099_CR29","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0960-0779(04)00456-4","volume":"24","author":"D Xiao","year":"2005","unstructured":"Xiao, D., Liao, X., and Deng, S., One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fract. 24(1):65\u201371, 2005.","journal-title":"Chaos Solitons Fract."},{"issue":"2","key":"1099_CR30","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1002\/sec.709","volume":"6","author":"ZY Cheng","year":"2013","unstructured":"Cheng, Z. Y., Liu, Y., Chang, C. C., and Chang, S. C., Authenticated RFID security mechanism based on chaotic maps. Sec. Commun. Netw. 6(2):247\u2013256, 2013.","journal-title":"Sec. Commun. Netw."},{"issue":"2","key":"1099_CR31","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s11277-013-1282-x","volume":"74","author":"D He","year":"2014","unstructured":"He, D., Zhang, Y., and Chen, J., Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel. Personal Commun. 74(2):229\u2013243, 2014.","journal-title":"Wirel. Personal Commun."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-018-1099-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-1099-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-1099-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:19:13Z","timestamp":1775258353000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-018-1099-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,3]]},"references-count":31,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1099"],"URL":"https:\/\/doi.org\/10.1007\/s10916-018-1099-y","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,3]]},"assertion":[{"value":"2 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that we have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"250"}}