{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T04:33:32Z","timestamp":1768710812481,"version":"3.49.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:00:00Z","timestamp":1605139200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:00:00Z","timestamp":1605139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-020-10134-x","type":"journal-article","created":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T17:05:35Z","timestamp":1605200735000},"page":"17103-17128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4008-6350","authenticated-orcid":false,"given":"B. D.","family":"Deebak","sequence":"first","affiliation":[]},{"given":"Fadi","family":"Al-Turjman","sequence":"additional","affiliation":[]},{"given":"Anand","family":"Nayyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,12]]},"reference":[{"key":"10134_CR1","doi-asserted-by":"publisher","first-page":"24617","DOI":"10.1109\/ACCESS.2017.2766090","volume":"5","author":"F Al-Turjman","year":"2017","unstructured":"Al-Turjman F, Ever YK, Ever E, Nguyen HX, David DB (2017) Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks. IEEE Access 5:24617\u201324631","journal-title":"IEEE Access"},{"key":"10134_CR2","doi-asserted-by":"publisher","first-page":"4629","DOI":"10.1007\/s11277-017-4408-8","volume":"96","author":"R Amin","year":"2017","unstructured":"Amin R, Maitra T, Giri D, Srivastava PD (2017) Cryptanalysis and improvement of an RSA based remote user authentication scheme using smart card. Wirel Pers Commun 96:4629\u20134659","journal-title":"Wirel Pers Commun"},{"issue":"6","key":"10134_CR3","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1016\/j.compeleceng.2011.09.015","volume":"37","author":"AK Awasthi","year":"2011","unstructured":"Awasthi AK, Srivastava K, Mittal RC (2011) An improved timestamp-based remote user authentication scheme. Comput Electr Eng 37(6):869\u2013874","journal-title":"Comput Electr Eng"},{"issue":"1","key":"10134_CR4","doi-asserted-by":"publisher","first-page":"96","DOI":"10.4018\/IJACI.2019010106","volume":"10","author":"P Chandrakar","year":"2019","unstructured":"Chandrakar P (2019) A secure remote user authentication protocol for healthcare monitoring using wireless medical sensor networks. Int J Ambient Comput Intell (IJACI) 10(1):96\u2013116","journal-title":"Int J Ambient Comput Intell (IJACI)"},{"issue":"1","key":"10134_CR5","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1166\/jctn.2020.8658","volume":"17","author":"RRK Chaudhary","year":"2020","unstructured":"Chaudhary RRK, Singh A, Chatterjee K (2020) An enhanced authentication scheme for internet of things based E-healthcare system. J Comput Theor Nanosci 17(1):246\u2013253","journal-title":"J Comput Theor Nanosci"},{"issue":"5","key":"10134_CR6","doi-asserted-by":"publisher","first-page":"704","DOI":"10.4218\/etrij.10.1510.0134","volume":"32","author":"TH Chen","year":"2010","unstructured":"Chen TH, Shih WK (2010) A robust mutual authentication protocol for wireless sensor networks. ETRI J 32(5):704\u2013712","journal-title":"ETRI J"},{"issue":"5","key":"10134_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-013-9969-9","volume":"37","author":"AK Das","year":"2013","unstructured":"Das AK, Bruhadeshwar B (2013) An improved and effective secure password based authentication and key agreement scheme using smart cards for the telecare medicine information system. J Med Syst 37(5):1\u201317","journal-title":"J Med Syst"},{"issue":"1","key":"10134_CR8","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s11277-015-2736-0","volume":"85","author":"DB David","year":"2015","unstructured":"David DB, Rajappa M, Karupuswamy T, Iyer SP (2015) A dynamic-identity based multimedia server client authentication scheme for tele-care multimedia medical information system. Wirel Pers Commun 85(1):241\u2013261","journal-title":"Wirel Pers Commun"},{"issue":"8","key":"10134_CR9","doi-asserted-by":"publisher","first-page":"10741","DOI":"10.1007\/s11042-016-3268-7","volume":"76","author":"BD Deebak","year":"2017","unstructured":"Deebak BD (2017) Mutual Authentication Scheme for Multimedia Medical Information System. Multimedia Tools Appl 76(8):10741\u201310759 (IF-1.53)","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"10134_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s11277-014-2118-z","volume":"81","author":"BD Deebak","year":"2015","unstructured":"Deebak BD, Muthaiah R, Thenmozhi K, Swaminathan P (2015) Evaluating three party authentication and key agreement protocols using IP multimedia server\u2013client systems. Wirel Pers Commun 81(1):77\u201399","journal-title":"Wirel Pers Commun"},{"issue":"10","key":"10134_CR11","doi-asserted-by":"publisher","first-page":"5795","DOI":"10.1007\/s11042-015-2542-4","volume":"75","author":"BD Deebak","year":"2016","unstructured":"Deebak BD, Muthaiah R, Thenmozhi K, Swaminathan PI (2016) Analyzing three-party authentication and key agreement protocol for real time IP multimedia server\u2013client systems. Multimed Tools Appl 75(10):5795\u20135817","journal-title":"Multimed Tools Appl"},{"key":"10134_CR12","doi-asserted-by":"publisher","first-page":"135632","DOI":"10.1109\/ACCESS.2019.2941575","volume":"7","author":"BD Deebak","year":"2019","unstructured":"Deebak BD, Al-Turjman F, Aloqaily M, Alfandi O (2019) An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT. IEEE Access 7:135632\u2013135649","journal-title":"IEEE Access"},{"key":"10134_CR13","doi-asserted-by":"crossref","unstructured":"Dharminder D, Gupta P (2019) Security analysis and application of Chebyshev chaotic map in the authentication protocols. Int J Comput Appl. 2019:1\u20139","DOI":"10.1080\/1206212X.2019.1682238"},{"key":"10134_CR14","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.adhoc.2015.05.014","volume":"36","author":"MS Farasha","year":"2016","unstructured":"Farasha MS, Turkanovic M, Kumaric S, H\u00f6lbl M (2016) An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. AdHoc Networks 36:152\u2013176","journal-title":"AdHoc Networks"},{"key":"10134_CR15","doi-asserted-by":"crossref","unstructured":"Franks J, Hallam-Baker P, Hostetler J, Lawrence S, Leach P, Luotonen A, Stewart L (1999) HTTP authentication: basic and digest access authentication. Network Working Group 1999:78","DOI":"10.17487\/rfc2617"},{"issue":"9","key":"10134_CR16","doi-asserted-by":"publisher","first-page":"4957","DOI":"10.1109\/TII.2019.2895030","volume":"15","author":"P Gope","year":"2019","unstructured":"Gope P, Das AK, Kumar N, Cheng Y (2019) Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans Ind Informa 15(9):4957\u20134968","journal-title":"IEEE Trans Ind Informa"},{"issue":"4","key":"10134_CR17","doi-asserted-by":"publisher","first-page":"1042","DOI":"10.1109\/TIFS.2017.2777787","volume":"13","author":"H Gunasinghe","year":"2017","unstructured":"Gunasinghe H, Bertino E (2017) PrivBioMTAuth: privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones. IEEE Trans Inf Forensics Secur 13(4):1042\u20131057","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"10134_CR18","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1109\/JIOT.2017.2659783","volume":"4","author":"P Hu","year":"2017","unstructured":"Hu P, Ning H, Qiu T, Song H, Wang Y, Yao X (2017) Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J 4(5):1143\u20131155","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"10134_CR19","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390\u20131397","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"10134_CR20","unstructured":"ICS 35.040.50, Information technology\u2014Smart transducer interface for sensors and actuators \u2014 Part 7: Transducer to radio frequency identification(RFID) systems communication protocols and Transducer Electronic Data Sheet (TEDS) formats (2011) ISO\/IEC\/IEEE Std 21451\u20137, pp.1\u201382"},{"issue":"10","key":"10134_CR21","doi-asserted-by":"publisher","first-page":"3826","DOI":"10.1007\/s11227-015-1610-x","volume":"72","author":"Q Jiang","year":"2016","unstructured":"Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. J Supercomput 72(10):3826\u20133849","journal-title":"J Supercomput"},{"issue":"4","key":"10134_CR22","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1080\/09720529.2019.1637155","volume":"22","author":"A Kumari","year":"2019","unstructured":"Kumari A, Yahya Abbasi M, Kumar V, Khan AA (2019) A secure user authentication protocol using elliptic curve cryptography. J Discret Math Sci Cryptogr 22(4):521\u2013530","journal-title":"J Discret Math Sci Cryptogr"},{"issue":"11","key":"10134_CR23","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770\u2013772","journal-title":"Commun ACM"},{"issue":"3","key":"10134_CR24","first-page":"355","volume":"6","author":"XH Le","year":"2011","unstructured":"Le XH, Khalid M, Sankar R, Lee S (2011) An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J Netw 6(3):355\u2013364","journal-title":"J Netw"},{"key":"10134_CR25","doi-asserted-by":"crossref","unstructured":"Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2015) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur Commun Netw 9(15):2643\u20132655","DOI":"10.1002\/sec.1214"},{"key":"10134_CR26","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.cmpb.2018.02.002","volume":"157","author":"CT Li","year":"2018","unstructured":"Li CT, Shih DH, Wang CC (2018) Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. Comput Methods Prog Biomed 157:191\u2013203","journal-title":"Comput Methods Prog Biomed"},{"key":"10134_CR27","doi-asserted-by":"crossref","unstructured":"Li X, Peng J, Obaidat MS, Wu F, Khan MK, Chen C (2019) A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst J 14(1):39\u201350","DOI":"10.1109\/JSYST.2019.2899580"},{"key":"10134_CR28","doi-asserted-by":"crossref","unstructured":"Li J, Zhang N, Ni J, Chen J, Du R (2020) Secure and lightweight authentication with key agreement for smart wearable systems. IEEE Int Things J 7(8):7334\u20137344","DOI":"10.1109\/JIOT.2020.2984618"},{"issue":"1","key":"10134_CR29","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1109\/TPDS.2014.2308218","volume":"26","author":"H Liu","year":"2014","unstructured":"Liu H, Ning H, Xiong Q, Yang LT (2014) Shared authority based privacy-preserving authentication protocol in cloud computing. IEEE Trans Parallel Distrib Syst 26(1):241\u2013251","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"10134_CR30","doi-asserted-by":"publisher","first-page":"1352","DOI":"10.1109\/JIOT.2018.2843561","volume":"6","author":"H Liu","year":"2018","unstructured":"Liu H, Yao X, Yang T, Ning H (2018) Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet Things J 6(2):1352\u20131362","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"10134_CR31","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/s12083-019-0717-x","volume":"13","author":"R Madhusudhan","year":"2020","unstructured":"Madhusudhan R, Shashidhara R (2020) Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET. Peer-to-Peer Netw Appl 13(1):82\u2013103","journal-title":"Peer-to-Peer Netw Appl"},{"key":"10134_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/5047379","volume":"2020","author":"J Mo","year":"2020","unstructured":"Mo J, Hu Z, Lin Y (2020) Cryptanalysis and security improvement of two authentication schemes for healthcare systems using wireless medical sensor networks. Secur Commun Networks 2020:1\u201311","journal-title":"Secur Commun Networks"},{"key":"10134_CR33","first-page":"1","volume":"2 1","author":"V Odelu","year":"2015","unstructured":"Odelu V, Das AK, Goswami A (2015) An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card. J Inf Sec Appl 2 1:1\u20131 9","journal-title":"J Inf Sec Appl"},{"issue":"12","key":"10134_CR34","doi-asserted-by":"publisher","first-page":"4307","DOI":"10.3390\/s18124307","volume":"18","author":"S Oueida","year":"2018","unstructured":"Oueida S, Kotb Y, Aloqaily M, Jararweh Y, Baker T (2018) An edge computing based smart healthcare framework for resource management. Sensors 18(12):4307","journal-title":"Sensors"},{"issue":"17","key":"10134_CR35","doi-asserted-by":"publisher","first-page":"24573","DOI":"10.1007\/s11042-018-6647-4","volume":"78","author":"S Oueida","year":"2019","unstructured":"Oueida S, Aloqaily M, Ionescu S (2019) A smart healthcare reward model for resource allocation in smart city. Multimed Tools Appl 78(17):24573\u201324594","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"10134_CR36","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/S0167-4048(03)00709-0","volume":"22","author":"JJ Shen","year":"2003","unstructured":"Shen JJ, Lin CW, Hwang MS (2003) Security enhancement for the timestamp-based password authentication scheme using smart cards. Comput Secur 22(7):591\u2013595","journal-title":"Comput Secur"},{"issue":"5","key":"10134_CR37","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/s10916-017-0720-9","volume":"41","author":"J Srinivas","year":"2017","unstructured":"Srinivas J, Mishra D, Mukhopadhyay S (2017) A mutual authentication framework for wireless medical sensor networks. J Med Syst 41(5):80\u201399","journal-title":"J Med Syst"},{"key":"10134_CR38","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2014.03.009","volume":"20","author":"M Turkanovic","year":"2014","unstructured":"Turkanovic M, Brumen B, H\u00f6lbl M (2014) A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw 20:96\u2013112","journal-title":"Ad Hoc Netw"},{"key":"10134_CR39","doi-asserted-by":"crossref","unstructured":"Wang L (2014) Analysis and enhancement of a password authentication and update scheme based on elliptic curve cryptography. J Appl Math 247836:1\u201311","DOI":"10.1155\/2014\/247836"},{"key":"10134_CR40","doi-asserted-by":"publisher","first-page":"101596","DOI":"10.1109\/ACCESS.2019.2930542","volume":"7","author":"F Wang","year":"2019","unstructured":"Wang F, Xu G, Xu G (2019) A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map. IEEE Access 7:101596\u2013101608","journal-title":"IEEE Access"},{"key":"10134_CR41","doi-asserted-by":"crossref","unstructured":"Wang F, Xu G, Xu G, Wang Y, Peng J (2020) A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure wireless communications and mobile computing. Wirel Commun Mob Com 3805058:1\u201315","DOI":"10.1155\/2020\/3805058"},{"issue":"4","key":"10134_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-013-9958-z","volume":"37","author":"F Wu","year":"2013","unstructured":"Wu F, Xu L (2013) Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J Med Syst 37(4):1\u20139","journal-title":"J Med Syst"},{"issue":"7","key":"10134_CR43","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1016\/j.jcss.2008.04.002","volume":"74","author":"G Yang","year":"2008","unstructured":"Yang G, Wong DS, Wang H, Deng X (2008) Two-factor mutual authentication based on smart cards and passwords. J Comput Syst Sci 74(7):1160\u20131172","journal-title":"J Comput Syst Sci"},{"issue":"4","key":"10134_CR44","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/TIFS.2016.2615853","volume":"12","author":"Y Yu","year":"2016","unstructured":"Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Sec 12(4):767\u2013778","journal-title":"IEEE Trans Inf Forensics Sec"},{"issue":"3","key":"10134_CR45","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.chaos.2006.09.047","volume":"37","author":"L Zhang","year":"2008","unstructured":"Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669\u2013674","journal-title":"Chaos, Solitons Fractals"},{"key":"10134_CR46","unstructured":"Zhu H, Hao X, Liu H (2015) An effcient authenticated key agreement protocol based on chaotic maps with privacy protection using smart card. J Inf Hiding Multimedia Signal Process 6(3):500\u2013510"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10134-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10134-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10134-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T02:25:15Z","timestamp":1744079115000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10134-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,12]]},"references-count":46,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10134"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10134-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,12]]},"assertion":[{"value":"17 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}