{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:13:47Z","timestamp":1774937627585,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10916-018-1120-5","type":"journal-article","created":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T21:35:06Z","timestamp":1543700106000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":74,"title":["A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications"],"prefix":"10.1007","volume":"43","author":[{"given":"Arezou","family":"Ostad-Sharif","sequence":"first","affiliation":[]},{"given":"Dariush","family":"Abbasinezhad-Mood","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3894-3103","authenticated-orcid":false,"given":"Morteza","family":"Nikooghadam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,1]]},"reference":[{"issue":"11","key":"1120_CR1","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s10916-015-0335-y","volume":"39","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, S. A., Mahmood, K., Naqvi, H., and Khan, M. K., An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. J. Med. Syst. 39(11):175, 2015.","journal-title":"J. Med. Syst."},{"issue":"5","key":"1120_CR2","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1109\/JBHI.2018.2799198","volume":"22","author":"A Jindal","year":"2018","unstructured":"Jindal, A., Dua, A., Kumar, N., Das, A. K., Vasilakos, A. V., and Rodrigues, J. J., Providing Healthcare-as-a-Service Using Fuzzy Rule Based Big Data Analytics in Cloud Computing. IEEE Journal of Biomedical and Health Informatics 22(5):1605\u20131618, 2018.","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"issue":"3","key":"1120_CR3","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1016\/j.cmpb.2014.09.006","volume":"117","author":"TF Lee","year":"2014","unstructured":"Lee, T. F., Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems. Comput. Methods Prog. Biomed. 117(3):464\u2013472, 2014.","journal-title":"Comput. Methods Prog. Biomed."},{"issue":"5","key":"1120_CR4","doi-asserted-by":"publisher","first-page":"5503","DOI":"10.1007\/s11042-017-4464-9","volume":"77","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry, S. A., Naqvi, H., and Khan, M. K., An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimedia Tools and Applications 77(5):5503\u20135524, 2018.","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"1120_CR5","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10916-015-0217-3","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G. P., A novel user authentication and key agreement for accessing multi-medical server usable in TMIS. J. Med. Syst. 39(3):33, 2015.","journal-title":"J. Med. Syst."},{"issue":"4","key":"1120_CR6","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/MWC.2015.7224734","volume":"22","author":"K Zhang","year":"2015","unstructured":"Zhang, K., Yang, K., Liang, X., Su, Z., Shen, X., and Luo, H. H., Security and privacy for mobile healthcare networks. IEEE Wirel. Commun. 22(4):104\u2013112, 2015.","journal-title":"IEEE Wirel. Commun."},{"key":"1120_CR7","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.cmpb.2018.02.002","volume":"157","author":"CT Li","year":"2018","unstructured":"Li, C. T., Shih, D. H., and Wang, C. C., Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. Comput. Methods Prog. Biomed. 157:191\u2013203, 2018.","journal-title":"Comput. Methods Prog. Biomed."},{"issue":"15","key":"1120_CR8","doi-asserted-by":"publisher","first-page":"16463","DOI":"10.1007\/s11042-016-3921-1","volume":"76","author":"A Irshad","year":"2017","unstructured":"Irshad, A., Sher, M., Nawaz, O., Chaudhry, S. A., Khan, I., and Kumari, S., A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multimedia Tools and Applications 76(15):16463\u201316489, 2017.","journal-title":"Multimedia Tools and Applications"},{"key":"1120_CR9","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.cmpb.2016.07.028","volume":"135","author":"AK Sutrala","year":"2016","unstructured":"Sutrala, A. K., Das, A. K., Odelu, V., Wazid, M., and Kumari, S., Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Comput. Methods Prog. Biomed. 135:167\u2013185, 2016.","journal-title":"Comput. Methods Prog. Biomed."},{"issue":"11","key":"1120_CR10","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10916-016-0596-0","volume":"40","author":"M Wazid","year":"2016","unstructured":"Wazid, M., Zeadally, S., Das, A. K., and Odelu, V., Analysis of security protocols for mobile healthcare. J. Med. Syst. 40(11):229, 2016.","journal-title":"J. Med. Syst."},{"issue":"4","key":"1120_CR11","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1007\/s12652-017-0485-5","volume":"9","author":"F Wu","year":"2018","unstructured":"Wu, F., Xu, L., Kumari, S., Li, X., Das, A. K., and Shen, J., A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J. Ambient. Intell. Humaniz. Comput. 9(4):919\u2013930, 2018.","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"4","key":"1120_CR12","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.2018.1700787","volume":"56","author":"R Chaudhary","year":"2018","unstructured":"Chaudhary, R., Jindal, A., Aujla, G. S., Kumar, N., Das, A. K., and Saxena, N., LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment. IEEE Commun. Mag. 56(4):24\u201332, 2018.","journal-title":"IEEE Commun. Mag."},{"key":"1120_CR13","doi-asserted-by":"crossref","unstructured":"J. Srinivas, A. K. Das, N. Kumar and J. Rodrigues, Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing, 2018.","DOI":"10.1109\/TDSC.2018.2828306"},{"key":"1120_CR14","doi-asserted-by":"crossref","unstructured":"S. Roy, A. K. Das, S. Chatterjee, N. Kumar, S. Chattopadhyay and J. J. Rodrigues, Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications. IEEE Transactions on Industrial Informatics, 2018.","DOI":"10.1109\/TII.2018.2824815"},{"issue":"11","key":"1120_CR15","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/s10916-016-0592-4","volume":"40","author":"SA Chaudhry","year":"2016","unstructured":"Chaudhry, S. A., Khan, M. T., Khan, M. K., and Shon, T., A multiserver biometric authentication scheme for TMIS using elliptic curve cryptography. J. Med. Syst. 40(11):230, 2016.","journal-title":"J. Med. Syst."},{"issue":"11","key":"1120_CR16","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10916-016-0585-3","volume":"40","author":"H Arshad","year":"2016","unstructured":"Arshad, H., and Rasoolzadegan, A., Design of a secure authentication and key agreement scheme preserving user privacy usable in telecare midicine information systems. J. Med. Syst. 40(11):237, 2016.","journal-title":"J. Med. Syst."},{"issue":"1","key":"1120_CR17","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s10916-014-0145-7","volume":"39","author":"D Giri","year":"2015","unstructured":"Giri, D., Maitra, T., Amin, R., and Srivastava, P. D., An efficient and robust RSA-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1):145, 2015.","journal-title":"J. Med. Syst."},{"issue":"8","key":"1120_CR18","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/s10916-015-0262-y","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G. P., An improved RSA based user authentication and session key agreement protocol usable in TMIS. J. Med. Syst. 39(8):79, 2015.","journal-title":"J. Med. Syst."},{"key":"1120_CR19","doi-asserted-by":"crossref","unstructured":"R. Canetti and H. Krawczyk, Analysis of key-exchange protocols and their use for building secure channels. Advances in Cryptology, pp. 453\u2013474, 2001.","DOI":"10.1007\/3-540-44987-6_28"},{"issue":"1","key":"1120_CR20","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"MS Hwang","year":"2000","unstructured":"Hwang, M. S., and Li, L. H., A new remote user authentication scheme user smart cards. IEEE Transactions on Consumers Electronics 46(1):28\u201330, 2000.","journal-title":"IEEE Transactions on Consumers Electronics"},{"issue":"4","key":"1120_CR21","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/30.920446","volume":"46","author":"HM Sun","year":"2000","unstructured":"Sun, H. M., An efficient user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(4):958\u2013961, 2000.","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"3","key":"1120_CR22","first-page":"200","volume":"2","author":"Z Tan","year":"2013","unstructured":"Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200\u2013204, 2013.","journal-title":"Network"},{"issue":"12","key":"1120_CR23","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/s10916-014-0136-8","volume":"38","author":"H Arshad","year":"2014","unstructured":"Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12):136, 2014.","journal-title":"J. Med. Syst."},{"issue":"3","key":"1120_CR24","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/s10916-014-0016-2","volume":"38","author":"Z Tan","year":"2014","unstructured":"Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 38(3):16, 2014.","journal-title":"J. Med. Syst."},{"issue":"6","key":"1120_CR25","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10916-014-0027-z","volume":"38","author":"AK Das","year":"2014","unstructured":"Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):27, 2014.","journal-title":"J. Med. Syst."},{"issue":"5","key":"1120_CR26","doi-asserted-by":"publisher","first-page":"9964","DOI":"10.1007\/s10916-013-9964-1","volume":"37","author":"AK Awasthi","year":"2013","unstructured":"Awasthi, A. K., and Sirvastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):9964, 2013.","journal-title":"J. Med. Syst."},{"issue":"6","key":"1120_CR27","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10916-014-0024-2","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., and Khan, M. K., Cryptoanalysis and improvment of Yen et al.;s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):24, 2014.","journal-title":"J. Med. Syst."},{"issue":"4","key":"1120_CR28","doi-asserted-by":"publisher","first-page":"9954","DOI":"10.1007\/s10916-013-9954-3","volume":"37","author":"MK Khan","year":"2013","unstructured":"Khan, M. K., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):9954, 2013.","journal-title":"J. Med. Syst."},{"issue":"6","key":"1120_CR29","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/s10916-015-0244-0","volume":"39","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., and Farash, M. S., Cryptoanalysis and improvment of an improved two factor authentication protocol for telecare medical information systems. J. Med. Syst. 39(6):66, 2015.","journal-title":"J. Med. Syst."},{"issue":"10","key":"1120_CR30","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s10916-014-0135-9","volume":"38","author":"SH Islam","year":"2014","unstructured":"Islam, S. H., and Khan, M. K., Cryptoanalysis and improvment of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):135, 2014.","journal-title":"J. Med. Syst."},{"issue":"8","key":"1120_CR31","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/s10916-015-0259-6","volume":"39","author":"H Arshad","year":"2015","unstructured":"Arshad, H., Teymoori, V., Nikooghadam, M., and Abbassi, H., On the security of a two-factor authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 39(8):76, 2015.","journal-title":"J. Med. Syst."},{"issue":"2","key":"1120_CR32","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1002\/sec.967","volume":"8","author":"FT Bin Muhaya","year":"2015","unstructured":"Bin Muhaya, F. T., Cryptoanalysis and security enhancement of Zhau's authentication scheme for telecare midicine information systems. Security and Communication Networks 8(2):149\u2013158, 2015.","journal-title":"Security and Communication Networks"},{"issue":"8","key":"1120_CR33","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/s10916-015-0258-7","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., and Biswas, G. P., A secure three-factor user authentication and key agreement protocol for TMIS with user anonymity. J. Med. Syst. 39(8):78, 2015.","journal-title":"J. Med. Syst."},{"key":"1120_CR34","first-page":"861","volume":"457","author":"X Xu","year":"2014","unstructured":"Xu, X., Jin, Z. P., Zhang, H., and Zhu, P., A dynamic ID-based authentication scheme based on ECC for telecare medicine information systems. Appl. Mech. Mater. 457:861\u2013866, 2014.","journal-title":"Appl. Mech. Mater."},{"issue":"3","key":"1120_CR35","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1109\/TR.2015.2429271","volume":"64","author":"CH Tseng","year":"2015","unstructured":"Tseng, C. H., Wang, S. H., and Tsaur, W. J., Hierarchical and dynamic elliptic curve cryptosystem based self-certified public key scheme for medical data protection. IEEE Trans. Reliab. 64(3):1078\u20131085, 2015.","journal-title":"IEEE Trans. Reliab."},{"issue":"11","key":"1120_CR36","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin, R., Islam, S. H., Biswas, G., Khan, M. K., and Kumar, N., An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve. J. Med. Syst. 39(11):1\u201318, 2015.","journal-title":"J. Med. Syst."},{"issue":"2","key":"1120_CR37","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1109\/JBHI.2016.2517146","volume":"21","author":"L Zhang","year":"2017","unstructured":"Zhang, L., Zhu, S., and Tang, S., Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE Journal of Biomedical and health informatics 21(2):465\u2013475, 2017.","journal-title":"IEEE Journal of Biomedical and health informatics"},{"key":"1120_CR38","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Chen, Z., Li, B., Shen, J., Yang, L., and Ma, J., Security analysis and improvment of bio-hashing based three-factor authentication scheme for telecare medical information systems. J. Ambient. Intell. Humaniz. Comput.:1\u201313, 2017.","DOI":"10.1007\/s12652-017-0516-2"},{"issue":"3","key":"1120_CR39","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/s10916-015-0221-7","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu, Y., Li, L., Peng, H., and Yang, Y., An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3):32, 2015.","journal-title":"J. Med. Syst."},{"key":"1120_CR40","doi-asserted-by":"publisher","first-page":"7452","DOI":"10.1109\/ACCESS.2017.2780124","volume":"6","author":"S Qiu","year":"2018","unstructured":"Qiu, S., Xu, G., Ahmad, H., and Wang, L., A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems. IEEE Access 6:7452\u20137463, 2018.","journal-title":"IEEE Access"},{"key":"1120_CR41","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.cmpb.2018.02.002","volume":"157","author":"CT Li","year":"2018","unstructured":"Li, C. T., Shih, D. H., and Wang, C. C., Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. Comput. Methods Prog. Biomed. 157:191\u2013203, 2018.","journal-title":"Comput. Methods Prog. Biomed."},{"issue":"4","key":"1120_CR42","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/s10916-017-0699-2","volume":"41","author":"P Mohit","year":"2017","unstructured":"Mohit, P., Amin, R., Karati, A., Biswas, G. P., and Khan, M. K., A standard mutual authentication protocol for cloud computing based health care system. J. Med. Syst. 41(4):50, 2017.","journal-title":"J. Med. Syst."},{"issue":"6","key":"1120_CR43","doi-asserted-by":"publisher","first-page":"9993","DOI":"10.1007\/s10916-013-9993-9","volume":"37","author":"WC Yau","year":"2013","unstructured":"Yau, W. C., and Phan, R. C. W., Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(6):9993, 2013.","journal-title":"J. Med. Syst."},{"key":"1120_CR44","doi-asserted-by":"crossref","unstructured":"Das, A. K., A secure and effective user authentication and privacy preserving protocol with smart. Netw. Sci., 2012.","DOI":"10.1007\/s13119-012-0009-8"},{"key":"1120_CR45","doi-asserted-by":"crossref","unstructured":"S. H. Islam and G. P. Biswas, A provably secure identity-based strong designated verifier proxy. Journal of King Saud University-Computer and Information Sciences, 2013.","DOI":"10.1016\/j.jksuci.2013.03.004"},{"key":"1120_CR46","unstructured":"AVISPA, Automated validation of internet security protocols and applications. 2014. [Online]. Available: http:\/\/www.avispa-project.org\/ ."},{"key":"1120_CR47","doi-asserted-by":"crossref","unstructured":"X. Xu, P. Zhu, Q. Wen, Z. Jin, H. Zhang and L. He, A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems. Journal of Medical systems, 38, 2014.","DOI":"10.1007\/s10916-013-9994-8"},{"issue":"4","key":"1120_CR48","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1109\/TCE.2013.6689693","volume":"59","author":"D He","year":"2013","unstructured":"He, D., Kumar, N., Khan, M., and Lee, J. H., Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans. Consum. Electron. 59(4):811\u2013817, 2013.","journal-title":"IEEE Trans. Consum. Electron."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-018-1120-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-1120-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-018-1120-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T09:03:27Z","timestamp":1662541407000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-018-1120-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,1]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["1120"],"URL":"https:\/\/doi.org\/10.1007\/s10916-018-1120-5","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,1]]},"assertion":[{"value":"28 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"A. Ostad-Sharif, D. Abbasinezhad-Mood, and M. Nikooghadam declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human or animal participants performed by any of the authors. Further, this research has been done without any grant.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}}],"article-number":"10"}}