{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:32:48Z","timestamp":1761989568893},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11227-020-03553-y","type":"journal-article","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T12:02:45Z","timestamp":1611057765000},"page":"8281-8304","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function"],"prefix":"10.1007","volume":"77","author":[{"given":"Vishesh P.","family":"Gaikwad","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jitendra V.","family":"Tembhurne","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chandrashekhar","family":"Meshram","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"key":"3553_CR1","doi-asserted-by":"crossref","unstructured":"Sood SK, Sarjee AK, Singh K (2010) Anjour improvement of Liao et al.\u2019s authentication scheme using smart card. In: 2010 IEEE 2nd International Advance Computing Conference (IACC2010), pp 240\u2013245","DOI":"10.1109\/IADCC.2010.5423004"},{"issue":"10","key":"3553_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0116-z","volume":"38","author":"D He","year":"2014","unstructured":"He D, Kumar N, Chilamkurti N, Lee JH (2014) Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J Med Syst 38(10):1\u20136","journal-title":"J Med Syst"},{"issue":"1","key":"3553_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"MS Hwang","year":"2000","unstructured":"Hwang MS, Li LH (2000) A new remote user authentication scheme using smart cards. IEEE Trans Consum Electron 46(1):28\u201330","journal-title":"IEEE Trans Consum Electron"},{"key":"3553_CR4","unstructured":"Lee TF, Chang JB, Chan CW, Liu HC (2010) Password-based mutual authentication scheme using smart cards. In: The E-learning and Information Technology Symposium (EITS 2010)"},{"issue":"9","key":"3553_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10916-014-0077-2","volume":"38","author":"CT Li","year":"2014","unstructured":"Li CT, Lee CC, Weng CY (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecaremedicine information systems. J Med Syst 38(9):77","journal-title":"J Med Syst"},{"key":"3553_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.02.010","author":"D He","year":"2015","unstructured":"He D, Kumar N, Chilamkurti N (2015) A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf Sci. https:\/\/doi.org\/10.1016\/j.ins.2015.02.010","journal-title":"Inf Sci"},{"issue":"1","key":"3553_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"35","author":"D He","year":"2015","unstructured":"He D, Zeadally S (2015) Authentication protocol for ambient assisted living system. IEEE Commun Mag 35(1):71\u201377","journal-title":"IEEE Commun Mag"},{"issue":"11","key":"3553_CR8","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s10916-014-0143-9","volume":"38","author":"CL Chen","year":"2014","unstructured":"Chen CL, Yang TT, Chiang ML, Shih TF (2014) A privacy authentication scheme based on cloud for medical environment. J Med Syst 38(11):143","journal-title":"J Med Syst"},{"issue":"3","key":"3553_CR9","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"ZY Wu","year":"2012","unstructured":"Wu ZY, Lee YC, Lai F, Lee HC, Chung Y (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529\u20131535","journal-title":"J Med Syst"},{"key":"3553_CR10","doi-asserted-by":"publisher","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"DB He","year":"2012","unstructured":"He DB, Chen JH, Zhang R (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36:1989\u20131995","journal-title":"J Med Syst"},{"issue":"3","key":"3553_CR11","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1002\/dac.1158","volume":"24","author":"C Chen","year":"2011","unstructured":"Chen C, He D, Chan S, Bu SJ, Gao Y, Fan R (2011) Lightweight and provably secure user authentication with anonymity for the global mobility network. Int J Commun Syst 24(3):347\u2013362","journal-title":"Int J Commun Syst"},{"key":"3553_CR12","doi-asserted-by":"publisher","first-page":"9929","DOI":"10.1007\/s10916-013-9929-4","volume":"37","author":"HY Lin","year":"2013","unstructured":"Lin HY (2013) On the security of adynamic ID-based authentication scheme for telecaremedical information systems. J Med Syst 37:9929","journal-title":"J Med Syst"},{"key":"3553_CR13","doi-asserted-by":"publisher","first-page":"9912","DOI":"10.1007\/s10916-012-9912-5","volume":"37","author":"T Cao","year":"2013","unstructured":"Cao T, Zhai J (2013) Improved dynamic ID-based authentication scheme for telecare medical information systems. J Med Syst 37:9912","journal-title":"J Med Syst"},{"issue":"2","key":"3553_CR14","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1002\/sec.791","volume":"7","author":"MK Khan","year":"2014","unstructured":"Khan MK, Kumari S (2014) Cryptanalysis and improvement of \u201cAn efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.\u201d Secur Commun Netw 7(2):399\u2013408","journal-title":"Secur Commun Netw"},{"issue":"3","key":"3553_CR15","doi-asserted-by":"publisher","first-page":"9941","DOI":"10.1007\/s10916-013-9941-8","volume":"37","author":"T-F Lee","year":"2013","unstructured":"Lee T-F, Chang I-P, Lin T-H, Wang C-C (2013) A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J Med Syst 37(3):9941","journal-title":"J Med Syst"},{"issue":"5","key":"3553_CR16","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/s10916-014-0042-0","volume":"38","author":"F Wen","year":"2014","unstructured":"Wen F (2014) A more secure anonymous user authentication scheme for the integrated EPR information system. J Med Syst 38(5):42","journal-title":"J Med Syst"},{"key":"3553_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10916-015-0204-8","volume":"39","author":"A Das","year":"2015","unstructured":"Das A (2015) A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system. J Med Syst 39:25","journal-title":"J Med Syst"},{"issue":"1","key":"3553_CR18","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/JIOT.2014.2360121","volume":"2","author":"D He","year":"2015","unstructured":"He D, Zeadally S (2015) An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J 2(1):72\u201383","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"3553_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0221-7","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):1\u20138","journal-title":"J Med Syst"},{"key":"3553_CR20","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.procs.2016.09.091","volume":"98","author":"A Abdellaoui","year":"2016","unstructured":"Abdellaoui A, Khamlichi YI, Chaoui H (2016) A robust authentication scheme for telecare medicine information system. Proc Comput Sci 98:584\u2013589","journal-title":"Proc Comput Sci"},{"key":"3553_CR21","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s10916-015-0335-y","volume":"39","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry SA, Mahmood K, Naqvi H, Khan MK (2015) An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. J Med Syst 39:175. https:\/\/doi.org\/10.1007\/s10916-015-0335-y","journal-title":"J Med Syst"},{"key":"3553_CR22","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/s10916-016-0592-4","volume":"40","author":"SA Chaudhry","year":"2016","unstructured":"Chaudhry SA, Khan MT, Khan MK, Shon T (2016) A multiserver biometric authentication scheme for TMIS using elliptic curve cryptography. J Med Syst 40:230. https:\/\/doi.org\/10.1007\/s10916-016-0592-4","journal-title":"J Med Syst"},{"key":"3553_CR23","doi-asserted-by":"publisher","first-page":"5503","DOI":"10.1007\/s11042-017-4464-9","volume":"77","author":"SA Chaudhry","year":"2018","unstructured":"Chaudhry SA, Naqvi H, Khan MK (2018) An enhanced lightweight anonymous biometric based authentication scheme for TMIS. Multimed Tools Appl 77:5503\u20135524. https:\/\/doi.org\/10.1007\/s11042-017-4464-9","journal-title":"Multimed Tools Appl"},{"key":"3553_CR24","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.cmpb.2016.07.028","volume":"135","author":"AK Sutrala","year":"2016","unstructured":"Sutrala AK, Das AK, Odelu V, Wazid M, Kumari S (2016) Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Comput Methods Prog Biomed 135:167\u2013185","journal-title":"Comput Methods Prog Biomed"},{"key":"3553_CR25","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1186\/s40064-016-2018-7","volume":"5","author":"W Liu","year":"2016","unstructured":"Liu W, Xie Qi, Wang S, Bin Hu (2016) An improved authenticated key agreement protocol for telecare medicine information system. Springer Plus 5:555. https:\/\/doi.org\/10.1186\/s40064-016-2018-7","journal-title":"Springer Plus"},{"key":"3553_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.03.003","volume":"87","author":"M Masdari","year":"2017","unstructured":"Masdari M, Ahmadzadeh S (2017) A survey and taxonomy of the authentication schemes in telecare medicine information systems. J Netw Comput Appl 87:1\u201319","journal-title":"J Netw Comput Appl"},{"key":"3553_CR27","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.future.2017.08.042","volume":"82","author":"Wu Fan","year":"2018","unstructured":"Fan Wu, Li X, Sangaiah AK, Lili Xu, Kumari S, Liuxi Wu, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener Comput Syst 82:727\u2013737","journal-title":"Future Gener Comput Syst"},{"key":"3553_CR28","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1016\/j.future.2017.04.012","volume":"83","author":"X Li","year":"2018","unstructured":"Li X, Niub J, Kumaric S, Wud F, Chooe K-K (2018) A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Future Gener Comput Syst 83:607\u2013618","journal-title":"Future Gener Comput Syst"},{"key":"3553_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.05.009","author":"P Chandrakar","year":"2017","unstructured":"Chandrakar P, Om H (2017) A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC. Comput Commun. https:\/\/doi.org\/10.1016\/j.comcom.2017.05.009","journal-title":"Comput Commun"},{"key":"3553_CR30","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.future.2017.07.002","volume":"84","author":"SK Hafizul Islam","year":"2018","unstructured":"Hafizul Islam SK, Obaidat MS, Vijayakumar P, Abdulhay E, Fagen Li M, Reddy KC (2018) A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Gener Comput Syst 84:216\u2013227","journal-title":"Future Gener Comput Syst"},{"key":"3553_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.060","author":"J Cui","year":"2018","unstructured":"Cui J, Zhang J, Zhong H, Shi R, Yan Xu (2018) An efficient certificate less aggregate signature without pairings for vehicular ad hoc networks. Inf Sci. https:\/\/doi.org\/10.1016\/j.ins.2018.03.060","journal-title":"Inf Sci"},{"key":"3553_CR32","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.compeleceng.2017.03.016","volume":"63","author":"Qi Jiang","year":"2017","unstructured":"Jiang Qi, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput Electr Eng 63:182\u2013195","journal-title":"Comput Electr Eng"},{"key":"3553_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.019","author":"S Challa","year":"2018","unstructured":"Challa S, Das AK, Gope P, Kumar N, Wu F, Vasilakos AV (2018) Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems. Future Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2018.04.019","journal-title":"Future Gener Comput Syst"},{"key":"3553_CR34","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.comcom.2019.08.018","volume":"147","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) Efficient utilization of elliptic curve cryptography in design of a three-factor authentication protocol for satellite communications. Comput Commun 147:85\u201397","journal-title":"Comput Commun"},{"key":"3553_CR35","doi-asserted-by":"crossref","unstructured":"Wei J, Liu W, Hu X (2018) On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS. Int J Commun Syst. e3767","DOI":"10.1002\/dac.3767"},{"key":"3553_CR36","doi-asserted-by":"crossref","unstructured":"Chandrakar P, Om H (2018) An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS. Int J Commun Syst e3540","DOI":"10.1002\/dac.3540"},{"key":"3553_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.imu.2018.02.003","author":"N Radhakrishnan","year":"2018","unstructured":"Radhakrishnan N, Karuppiah M (2018) An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems. Inform Med Unlocked. https:\/\/doi.org\/10.1016\/j.imu.2018.02.003","journal-title":"Inform Med Unlocked"},{"key":"3553_CR38","doi-asserted-by":"publisher","first-page":"8239","DOI":"10.1007\/s13369-018-3494-6","volume":"43","author":"BA Alzahrani","year":"2018","unstructured":"Alzahrani BA, Irshad A (2018) A secure and efficient TMIS-based authentication scheme improved against Zhang et al\u2019.s scheme. Arab J Sci Eng 43:8239\u20138253. https:\/\/doi.org\/10.1007\/s13369-018-3494-6","journal-title":"Arab J Sci Eng"},{"issue":"5","key":"3553_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0233-3","volume":"39","author":"LP Zhang","year":"2015","unstructured":"Zhang LP, Zhu SH (2015) Robust ECC-based authenticated key agreement scheme with privacy protection for telecare medicine information systems. J Med Syst 39(5):1\u201313","journal-title":"J Med Syst"},{"key":"3553_CR40","doi-asserted-by":"publisher","first-page":"105054","DOI":"10.1016\/j.cmpb.2019.105054","volume":"182","author":"P Soni","year":"2019","unstructured":"Soni P, Pal AK, Hafizul Islam SK (2019) An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system. Comput Methods Progr Biomed 182:105054","journal-title":"Comput Methods Progr Biomed"},{"key":"3553_CR41","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10916-019-1251-3","volume":"43","author":"KM Renuka","year":"2019","unstructured":"Renuka KM, Kumari S, Li S (2019) Design of a secure three-factor authentication scheme for smart healthcare. J Med Syst 43:133. https:\/\/doi.org\/10.1007\/s10916-019-1251-3","journal-title":"J Med Syst"},{"key":"3553_CR42","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s10916-019-1442-y","volume":"43","author":"H Qiao","year":"2019","unstructured":"Qiao H, Dong X, Shen Y (2019) Authenticated key agreement scheme with strong anonymity for multi-server environment in TMIS. J Med Syst 43:321. https:\/\/doi.org\/10.1007\/s10916-019-1442-y","journal-title":"J Med Syst"},{"key":"3553_CR43","doi-asserted-by":"publisher","first-page":"e3913","DOI":"10.1002\/dac.3913","volume":"2019","author":"A Ostad-Sharif","year":"2019","unstructured":"Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC. Int J Commun Syst 2019:e3913. https:\/\/doi.org\/10.1002\/dac.3913","journal-title":"Int J Commun Syst"},{"key":"3553_CR44","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s10916-019-1471-6","volume":"44","author":"D Dharminder","year":"2020","unstructured":"Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services. J Med Syst 44:6. https:\/\/doi.org\/10.1007\/s10916-019-1471-6","journal-title":"J Med Syst"},{"issue":"1","key":"3553_CR45","first-page":"263","volume":"21","author":"J-W Lo","year":"2020","unstructured":"Lo J-W, Chun-Yueh Wu, Chiou S-F (2020) A lightweight authentication and key agreement scheme for telecare medicine information system. J Internet Technol 21(1):263\u2013272","journal-title":"J Internet Technol"},{"key":"3553_CR46","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10916-016-0585-3","volume":"40","author":"H Arshad","year":"2016","unstructured":"Arshad H, Rasoolzadegan A (2016) Design of a secure authentication and key agreement scheme preserving user privacy usable in telecare medicine information systems. J Med Syst 40:237","journal-title":"J Med Syst"},{"issue":"23","key":"3553_CR47","doi-asserted-by":"publisher","first-page":"7961","DOI":"10.1007\/s00500-017-2743-z","volume":"22","author":"W Liu","year":"2018","unstructured":"Liu W, Liu J, Wu Q, Qin B, Naccache D, Ferradi H (2018) Efficient subtree-based encryption for fuzzy-entity data sharing. Soft Comput 22(23):7961\u20137976","journal-title":"Soft Comput"},{"issue":"1","key":"3553_CR48","doi-asserted-by":"publisher","first-page":"80063","DOI":"10.1109\/ACCESS.2020.2991348","volume":"8","author":"C Meshram","year":"2020","unstructured":"Meshram C, Lee CC, Meshram SG, Meshram A (2020) OOS-SSS: an efficient online\/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network. IEEE Access 8(1):80063\u201380073","journal-title":"IEEE Access"},{"issue":"7","key":"3553_CR49","doi-asserted-by":"publisher","first-page":"e4307","DOI":"10.1002\/dac.4307","volume":"33","author":"C Meshram","year":"2020","unstructured":"Meshram C, Lee CC, Ranadive AS, Li CT, Meshram SG, Tembhurne JV (2020) A subtree-based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing. Int J Commun Syst 33(7):e4307","journal-title":"Int J Commun Syst"},{"issue":"24","key":"3553_CR50","doi-asserted-by":"publisher","first-page":"13127","DOI":"10.1007\/s00500-019-03855-1","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Lee CC, Meshram SG, Khan MK (2019) An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput 23(24):13127\u201313138","journal-title":"Soft Comput"},{"key":"3553_CR51","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0960-0779(04)00456-4","volume":"241","author":"D Xiao","year":"2005","unstructured":"Xiao D, Liao X, Deng S (2005) One-way hash function construction based on the chaotic map with changeable-parameter. Chaos Solitons Fract 241:65\u201371","journal-title":"Chaos Solitons Fract"},{"key":"3553_CR52","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10916-014-0027-z","volume":"38","author":"AK Das","year":"2014","unstructured":"Das AK, Goswami A (2014) An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J Med Syst 38:27","journal-title":"J Med Syst"},{"issue":"5","key":"3553_CR53","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"key":"3553_CR54","first-page":"11","volume":"7","author":"M Witteman","year":"2002","unstructured":"Witteman M (2002) Advances in smartcard security. Inf Secur Bull 7:11\u201322","journal-title":"Inf Secur Bull"},{"issue":"1","key":"3553_CR55","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18\u201336","journal-title":"ACM Trans Comput Syst"},{"issue":"4","key":"3553_CR56","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1880022.1880027","volume":"13","author":"P Sarkar","year":"2010","unstructured":"Sarkar P (2010) A simple and generic construction of authenticated encryption with associated data. ACM Trans Inf Syst Secur 13(4):33","journal-title":"ACM Trans Inf Syst Secur"},{"key":"3553_CR57","doi-asserted-by":"publisher","first-page":"9902","DOI":"10.1007\/s10916-012-9902-7","volume":"37","author":"YF Chang","year":"2013","unstructured":"Chang YF, Yu SH, Shiao DR (2013) An uniqueness-andanonymitypreserving remote user authentication scheme for connected health care. J Med Syst 37:9902","journal-title":"J Med Syst"},{"key":"3553_CR58","first-page":"119","volume":"7","author":"CT Li","year":"2013","unstructured":"Li CT, Lee CC, Weng CY, Fan CI (2013) An extended multi-server-based user authentication and key agreement scheme with user anonymity. KSII Trans Int Inform Syst 7:119\u2013131","journal-title":"KSII Trans Int Inform Syst"},{"key":"3553_CR59","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1049\/iet-ifs.2012.0058","volume":"7","author":"CT Li","year":"2013","unstructured":"Li CT (2013) A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inform Secur 7:3\u201310","journal-title":"IET Inform Secur"},{"key":"3553_CR60","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10916-016-0453-1","volume":"40","author":"C Shin-Yan","year":"2016","unstructured":"Shin-Yan C, Ying Z, Liu J (2016) Improvement of a privacy authentication scheme based on cloud for medical environment. J Med Syst 40:101","journal-title":"J Med Syst"},{"key":"3553_CR61","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11042-016-4208-2","volume":"77","author":"R Niloofar","year":"2018","unstructured":"Niloofar R, Nazari M (2018) An efficient improvement remote user mutual authentication and session key agreement scheme for E-health care systems. Multimed Tools Appl 77:55\u201388","journal-title":"Multimed Tools Appl"},{"key":"3553_CR62","doi-asserted-by":"publisher","first-page":"e3913","DOI":"10.1002\/dac.3913","volume":"32","author":"O-S Arezou","year":"2019","unstructured":"Arezou O-S, Abbasinezhad-Mood D, Nikooghadam M (2019) An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC. Int J Commun Syst 32:e3913","journal-title":"Int J Commun Syst"},{"issue":"1","key":"3553_CR63","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TCE.2014.6780922","volume":"60","author":"D He","year":"2014","unstructured":"He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30\u201337","journal-title":"IEEE Trans Consum Electron"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03553-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-020-03553-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-020-03553-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,16]],"date-time":"2021-07-16T10:18:00Z","timestamp":1626430680000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-020-03553-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,19]]},"references-count":63,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["3553"],"URL":"https:\/\/doi.org\/10.1007\/s11227-020-03553-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,19]]},"assertion":[{"value":"28 November 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The paper does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}