{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:36:41Z","timestamp":1770334601882,"version":"3.49.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2016,1,16]],"date-time":"2016-01-16T00:00:00Z","timestamp":1452902400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202389"],"award-info":[{"award-number":["61202389"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["U1135002,U1405255"],"award-info":[{"award-number":["U1135002,U1405255"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572379"],"award-info":[{"award-number":["61572379"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["61372075, 61472310"],"award-info":[{"award-number":["61372075, 61472310"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["JB140302"],"award-info":[{"award-number":["JB140302"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s11227-015-1610-x","type":"journal-article","created":{"date-parts":[[2016,1,16]],"date-time":"2016-01-16T19:46:50Z","timestamp":1452973610000},"page":"3826-3849","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":164,"title":["A privacy preserving three-factor authentication protocol for e-Health clouds"],"prefix":"10.1007","volume":"72","author":[{"given":"Qi","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,16]]},"reference":[{"issue":"3","key":"1610_CR1","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1016\/j.jbi.2012.02.007","volume":"45","author":"P Pawar","year":"2012","unstructured":"Pawar P, Jones V, Van Beijnum BJF et al (2012) A framework for the comparison of mobile patient monitoring systems. J Biomed Inform 45(3):544\u2013556","journal-title":"J Biomed Inform"},{"issue":"4","key":"1610_CR2","doi-asserted-by":"crossref","first-page":"1431","DOI":"10.1109\/JBHI.2014.2300846","volume":"18","author":"A Abbas","year":"2014","unstructured":"Abbas A, Khan SU (2014) A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J Biomed Health Inform 18(4):1431\u20131441","journal-title":"IEEE J Biomed Health Inform"},{"issue":"1","key":"1610_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1186\/2047-2501-2-3","volume":"2","author":"W Raghupathi","year":"2014","unstructured":"Raghupathi W, Raghupathi V (2014) Big data analytics in healthcare: promise and potential. Health Inf Sci Syst 2(1):3","journal-title":"Health Inf Sci Syst"},{"key":"1610_CR4","doi-asserted-by":"crossref","unstructured":"Sun J, Reddy C (2013) Big data analytics for healthcare. In: Proc. $$19{\\rm th}$$ 19 th ACM SIGKDD int\u2019l conf. knowledge discovery and data mining","DOI":"10.1145\/2487575.2506178"},{"key":"1610_CR5","doi-asserted-by":"publisher","unstructured":"Xia Z, Wang X, Sun X, Wang Q (2015) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst. doi: 10.1109\/TPDS.2015.2401003","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"1610_CR6","doi-asserted-by":"crossref","unstructured":"Fu Z, Sun X, Liu Q, Zhou L, Shu J (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans Commun E98-B(1):190\u2013200","DOI":"10.1587\/transcom.E98.B.190"},{"key":"1610_CR7","doi-asserted-by":"publisher","unstructured":"Li H, Yang Y, Luan T, Liang X, Zhou L, Shen X (2015) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Secur Comput. doi: 10.1109\/TDSC.2015.2406704","DOI":"10.1109\/TDSC.2015.2406704"},{"key":"1610_CR8","doi-asserted-by":"publisher","unstructured":"Ren Y, Shen J, Zheng Y, Wang J, Chao H-C (2015) Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Netw Appl. doi: 10.1007\/s12083-015-0346-y","DOI":"10.1007\/s12083-015-0346-y"},{"issue":"2","key":"1610_CR9","first-page":"317","volume":"16","author":"Y Ren","year":"2015","unstructured":"Ren Y, Shen J, Wang J, Han J, Lee S (2015) Mutual verifiable provable data auditing in public cloud storage. J Internet Technol 16(2):317\u2013323","journal-title":"J Internet Technol"},{"key":"1610_CR10","doi-asserted-by":"publisher","unstructured":"He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J. doi: 10.1109\/JSYST.2015.2428620","DOI":"10.1109\/JSYST.2015.2428620"},{"issue":"8","key":"1610_CR11","doi-asserted-by":"crossref","first-page":"2053","DOI":"10.1109\/TPDS.2013.124","volume":"25","author":"H Li","year":"2014","unstructured":"Li H, Lin X, Yang H, Liang X, Lu R, Shen X (2014) EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans Parallel Distrib Syst 25(8):2053\u20132064","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"4","key":"1610_CR12","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1007\/s11277-012-0535-4","volume":"68","author":"Q Jiang","year":"2013","unstructured":"Jiang Q, Ma J, Li G et al (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477\u20131491","journal-title":"Wirel Pers Commun"},{"issue":"6","key":"1610_CR13","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo P, Wang J, Li B, Variable Lee S A (2014) Threshold-value authentication architecture for wireless mesh networks. J Internet Technol 15(6):929\u2013936","journal-title":"J Internet Technol"},{"issue":"1","key":"1610_CR14","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/s11277-014-1750-y","volume":"78","author":"D Zhao","year":"2014","unstructured":"Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78(1):247\u2013269","journal-title":"Wirel Pers Commun"},{"issue":"12","key":"1610_CR15","doi-asserted-by":"crossref","first-page":"2021","DOI":"10.1109\/JPROC.2003.819611","volume":"91","author":"L O\u2019Gorman","year":"2003","unstructured":"O\u2019Gorman L (2003) Comparing passwords, tokens, and biometrics for user authentication. Proc IEEE 91(12):2021\u20132040","journal-title":"Proc IEEE"},{"issue":"11","key":"1610_CR16","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770\u2013772","journal-title":"Commun ACM"},{"issue":"2","key":"1610_CR17","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1007\/s11227-014-1273-z","volume":"70","author":"MS Farash","year":"2014","unstructured":"Farash MS, Attari MA (2014) An efficient client-client password-based authentication scheme with provable security. J Supercomput 70(2):1002\u20131022","journal-title":"J Supercomput"},{"issue":"2","key":"1610_CR18","first-page":"113","volume":"42","author":"Q Jiang","year":"2013","unstructured":"Jiang Q, Ma J, Li G et al (2013) An improved password-based remote user authentication protocol without smart cards. Inf Technol Control 42(2):113\u2013123","journal-title":"Inf Technol Control"},{"issue":"2","key":"1610_CR19","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1007\/s11227-013-0966-z","volume":"66","author":"TY Chen","year":"2013","unstructured":"Chen TY, Lee CC, Hwang MS, Jan JK (2013) Towards secure and efficient user authentication scheme using smart card for multi-server environments. J Supercomput 66(2):1008\u20131032","journal-title":"J Supercomput"},{"key":"1610_CR20","doi-asserted-by":"publisher","unstructured":"Arshad H, Nikooghadam M (2015) Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. J Supercomput. doi: 10.1007\/s11227-015-1434-8","DOI":"10.1007\/s11227-015-1434-8"},{"issue":"4","key":"1610_CR21","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/TDSC.2014.2355850","volume":"12","author":"D Wang","year":"2015","unstructured":"Wang D, He D, Wang P, Chu C-H (2015) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secur Comput 12(4):428\u2013442. doi: 10.1109\/TDSC.2014.2355850","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1610_CR22","doi-asserted-by":"publisher","unstructured":"Wang D, Wang N, Wang P, Qing S (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf Sci. doi: 10.1016\/j.ins.2015.03.070","DOI":"10.1016\/j.ins.2015.03.070"},{"issue":"12","key":"1610_CR23","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1049\/el:20020380","volume":"38","author":"JK Lee","year":"2002","unstructured":"Lee JK, Ryu SR, Yoo KY (2002) Fingerprint-based remote user authentication scheme using smart cards. Electron Lett 38(12):554\u2013555","journal-title":"Electron Lett"},{"issue":"1","key":"1610_CR24","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.csi.2004.03.003","volume":"27","author":"CH Lin","year":"2004","unstructured":"Lin CH, Lai YY (2004) A flexible biometrics remote user authentication scheme. Comput Stand Interfaces 27(1):19\u201323","journal-title":"Comput Stand Interfaces"},{"issue":"5","key":"1610_CR25","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1049\/el:20047658","volume":"41","author":"WC Ku","year":"2005","unstructured":"Ku WC, Chang ST, Chiang MH (2005) Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards. Electron Lett 41(5):240\u2013241","journal-title":"Electron Lett"},{"issue":"1","key":"1610_CR26","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.csi.2006.01.002","volume":"29","author":"MK Khan","year":"2007","unstructured":"Khan MK, Zhang JS (2007) Improving the security of \u2018a flexible biometrics remote user authentication scheme\u2019. Comput Stand Interfaces 29(1):82\u201385","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"1610_CR27","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.csi.2007.11.017","volume":"31","author":"HS Rhee","year":"2009","unstructured":"Rhee HS, Kwon JO, Lee DH (2009) A remote user authentication scheme without using smart cards. Comput Stand Interfaces 31(1):6\u201313","journal-title":"Comput Stand Interfaces"},{"issue":"4","key":"1610_CR28","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/958965.958969","volume":"37","author":"HS Kim","year":"2003","unstructured":"Kim HS, Lee SW, Yoo KY (2003) ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 37(4):32\u201341","journal-title":"ACM SIGOPS Oper Syst Rev"},{"issue":"2","key":"1610_CR29","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/991130.991137","volume":"38","author":"M Scott","year":"2004","unstructured":"Scott M (2004) Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 38(2):73\u201375","journal-title":"ACM SIGOPS Oper Syst Rev"},{"issue":"1","key":"1610_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1\u20135","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"1610_CR31","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jnca.2010.09.003","volume":"34","author":"X Li","year":"2011","unstructured":"Li X, Niu JW, Ma J, Wang WD, Liu CL (2011) Cryptanalysis and improvement of a biometric-based remote authentication scheme using smart cards. J Netw Comput Appl 34(1):73\u201379","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"1610_CR32","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1049\/iet-ifs.2010.0125","volume":"5","author":"AK Das","year":"2012","unstructured":"Das AK (2012) Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf Secur 5(3):145\u2013151","journal-title":"IET Inf Secur"},{"key":"1610_CR33","doi-asserted-by":"publisher","unstructured":"An Y (2012) Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards. J Biomed Biotechnol. doi: 10.1155\/2012\/519723","DOI":"10.1155\/2012\/519723"},{"issue":"2","key":"1610_CR34","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1002\/dac.1277","volume":"25","author":"C Chen","year":"2012","unstructured":"Chen C, Lee C, Hsu C (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25(2):585\u201397","journal-title":"Int J Commun Syst"},{"issue":"9","key":"1610_CR35","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1007\/s00607-013-0308-2","volume":"96","author":"MK Khan","year":"2014","unstructured":"Khan MK, Kumari S, Gupta MK (2014) More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9):793\u2013816","journal-title":"Computing"},{"issue":"3","key":"1610_CR36","first-page":"1","volume":"38","author":"Z Tan","year":"2014","unstructured":"Tan Z (2014) A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J Med Syst 38(3):1\u20139","journal-title":"J Med Syst"},{"issue":"1","key":"1610_CR37","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s11227-010-0512-1","volume":"63","author":"EJ Yoon","year":"2013","unstructured":"Yoon EJ, Yoo KY (2013) Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem. J Supercomput 63(1):235\u2013255","journal-title":"J Supercomput"},{"issue":"4","key":"1610_CR38","doi-asserted-by":"crossref","first-page":"933","DOI":"10.1109\/TIFS.2009.2031942","volume":"4","author":"CI Fan","year":"2009","unstructured":"Fan CI, Lin YH (2009) Provably secure remote truly three factor authentication scheme with privacy protection on biometrics. IEEE Trans Inf Forensics Secur 4(4):933\u2013945","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1610_CR39","doi-asserted-by":"crossref","unstructured":"Dodis Y, Reyzin L, Smith (2004) A fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of EUROCRYPT, pp 523\u2013540","DOI":"10.1007\/978-3-540-24676-3_31"},{"issue":"8","key":"1610_CR40","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1109\/TPDS.2010.206","volume":"22","author":"X Huang","year":"2011","unstructured":"Huang X, Xiang Y, Chonka A, Zhou J, Deng RH (2011) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parallel Distrib Syst 22(8):1390\u20131397","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"10","key":"1610_CR41","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1002\/sec.767","volume":"7","author":"X Li","year":"2013","unstructured":"Li X, Niu J, Wang Z, Chen C (2013) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488\u20131497","journal-title":"Secur Commun Netw"},{"key":"1610_CR42","doi-asserted-by":"publisher","unstructured":"Li X, Niu JW, Khan MK, Liao JG, Zhao XK (2014) Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Secur Commun Netw. doi: 10.1002\/sec.961","DOI":"10.1002\/sec.961"},{"key":"1610_CR43","doi-asserted-by":"publisher","unstructured":"Mishra D, Kumari S, Khan MK et al (2015) An anonymous biometric\u2014based remote user\u2014authenticated key agreement scheme for multimedia systems. Int J Commun Syst. doi: 10.1002\/dac.2946","DOI":"10.1002\/dac.2946"},{"issue":"1","key":"1610_CR44","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He D, Kumar N, Lee J-H (2014) Enhanced three-factor security protocol for USB consumer storage devices. IEEE Trans Consum Electron 60(1):30\u201337","journal-title":"IEEE Trans Consum Electron"},{"issue":"3","key":"1610_CR45","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","volume":"9","author":"D He","year":"2015","unstructured":"He D, Wang D (2015) Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst J 9(3):816\u2013823","journal-title":"IEEE Syst J"},{"issue":"9","key":"1610_CR46","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1109\/TIFS.2015.2439964","volume":"10","author":"V Odelu","year":"2015","unstructured":"Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Inf Forensics Secur 10(9):1953\u20131966","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1610_CR47","doi-asserted-by":"publisher","unstructured":"Wu F, Xu L, Kumari S, Li X (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client\u2013server networks. Comput Electr Eng. doi: 10.1016\/j.compeleceng.2015.02.015","DOI":"10.1016\/j.compeleceng.2015.02.015"},{"issue":"12","key":"1610_CR48","doi-asserted-by":"crossref","first-page":"2302","DOI":"10.1109\/TIFS.2014.2362979","volume":"9","author":"J Yu","year":"2014","unstructured":"Yu J, Wang G, Mu Y, Gao W (2014) An efficient and improved generic framework for three-factor authentication with provably secure instantiation. IEEE Trans Inf Forensics Secur 9(12):2302\u20132313","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1610_CR49","doi-asserted-by":"crossref","unstructured":"Juels A, Sudan M (2002) A fuzzy vault scheme. In: Proceedings of international symposium on information theory (ISIT), p 408","DOI":"10.1109\/ISIT.2002.1023680"},{"key":"1610_CR50","doi-asserted-by":"crossref","unstructured":"Nagar A, Nandakumar K, Jain A K (2008) Securing fingerprint template: fuzzy vault with minutiae descriptors. In: Proceedings of 19th international conference on pattern recognition, pp 1\u20134","DOI":"10.1109\/ICPR.2008.4761459"},{"issue":"5","key":"1610_CR51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0041-1","volume":"38","author":"D Mishra","year":"2014","unstructured":"Mishra D, Mukhopadhyay S, Kumari S, Khan MK, Chaturvedi A (2014) Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J Med Syst 38(5):1\u201311","journal-title":"J Med Syst"},{"issue":"11","key":"1610_CR52","doi-asserted-by":"crossref","first-page":"2245","DOI":"10.1016\/j.patcog.2004.04.011","volume":"37","author":"ATB Jin","year":"2004","unstructured":"Jin ATB, Ling DNC, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognit 37(11):2245\u20132255","journal-title":"Pattern Recognit"},{"key":"1610_CR53","unstructured":"Hankerson D, Menezes A, Vanstone S (2004) Guide to elliptic curve cryptography. In: Lecture notes in computer science. Springer, Berlin"},{"key":"1610_CR54","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Proceedings of advances in cryptology (Crypto\u201999). LNCS, pp 388\u2013397","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"1610_CR55","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"1610_CR56","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.1007\/s11277-013-1594-x","volume":"77","author":"Q Jiang","year":"2014","unstructured":"Jiang Q, Ma J, Li G, Yang L (2014) An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wirel Pers Commun 77(2):1489\u20131506","journal-title":"Wirel Pers Commun"},{"issue":"6","key":"1610_CR57","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1007\/s12083-014-0285-z","volume":"8","author":"Q Jiang","year":"2015","unstructured":"Jiang Q, Ma J, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw Appl 8(6):1070\u20131081","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"1","key":"1610_CR58","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-014-0154-6","volume":"39","author":"D Mishra","year":"2015","unstructured":"Mishra D (2015) On the security flaws in id-based password authentication schemes for telecare medical information systems. J Med Syst 39(1):1\u201316","journal-title":"J Med Syst"},{"issue":"3","key":"1610_CR59","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-015-0193-7","volume":"39","author":"D Mishra","year":"2015","unstructured":"Mishra D (2015) Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems. J Med Syst 39(3):1\u20138","journal-title":"J Med Syst"},{"issue":"1","key":"1610_CR60","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18\u201336","journal-title":"ACM Trans Comput Syst"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-015-1610-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-015-1610-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-015-1610-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-015-1610-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T20:58:03Z","timestamp":1718312283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-015-1610-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,16]]},"references-count":60,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["1610"],"URL":"https:\/\/doi.org\/10.1007\/s11227-015-1610-x","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,16]]}}}