{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:06:40Z","timestamp":1761930400058,"version":"3.40.2"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T00:00:00Z","timestamp":1742428800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T00:00:00Z","timestamp":1742428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-024-06851-x","type":"journal-article","created":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T08:11:02Z","timestamp":1742458262000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["SLMAS: a secure and lightweight mutual authentication scheme for telecare medical information system based on ECC"],"prefix":"10.1007","volume":"81","author":[{"given":"Khushboo","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Vinod","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Prakash","sequence":"additional","affiliation":[]},{"given":"Om","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,20]]},"reference":[{"issue":"3","key":"6851_CR1","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1007\/s10916-010-9614-9","volume":"36","author":"Z-Y Wu","year":"2012","unstructured":"Wu Z-Y et al (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529\u20131535","journal-title":"J Med Syst"},{"issue":"3","key":"6851_CR2","doi-asserted-by":"publisher","first-page":"1989","DOI":"10.1007\/s10916-011-9658-5","volume":"36","author":"He Debiao","year":"2012","unstructured":"Debiao He, Jianhua C, Rui Z (2012) A more secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1989\u20131995","journal-title":"J Med Syst"},{"issue":"1","key":"6851_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s00530-013-0346-9","volume":"21","author":"D He","year":"2015","unstructured":"He D et al (2015) Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimed Syst 21(1):49\u201360","journal-title":"Multimed Syst"},{"issue":"2","key":"6851_CR4","doi-asserted-by":"publisher","first-page":"1625","DOI":"10.3390\/s120201625","volume":"12","author":"P Kumar","year":"2012","unstructured":"Kumar P, Lee S-G, Lee H-J (2012) E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 12(2):1625\u20131647","journal-title":"Sensors"},{"key":"6851_CR5","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.ins.2014.09.003","volume":"314","author":"J Zhou","year":"2015","unstructured":"Zhou J, Cao Z, Dong X, Xiong N, Vasilakos AV (2015) 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf Sci 314:255\u2013276","journal-title":"Inf Sci"},{"key":"6851_CR6","doi-asserted-by":"publisher","first-page":"69603","DOI":"10.1109\/ACCESS.2018.2880898","volume":"6","author":"S Ji","year":"2018","unstructured":"Ji S, Gui Z, Zhou T, Yan H, Shen J (2018) An efficient and certificateless conditional privacy-preserving authentication scheme for wireless body area networks big data services. IEEE Access 6:69603\u201369611","journal-title":"IEEE Access"},{"issue":"11","key":"6851_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0351-y","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin R, Islam SH, Biswas GP, Khan MK, Kumar N (2015) An efficient and practical smart card-based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography. J Med Syst 39(11):1\u201318","journal-title":"J Med Syst"},{"issue":"11","key":"6851_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0592-4","volume":"40","author":"SA Chaudhry","year":"2016","unstructured":"Chaudhry SA, Khan MT, Khan MK, Shon T (2016) A multiserver biometric authentication scheme for TMIS using elliptic curve cryptography. J Med Syst 40(11):1\u201313","journal-title":"J Med Syst"},{"issue":"13","key":"6851_CR9","doi-asserted-by":"publisher","first-page":"1983","DOI":"10.1002\/sec.1452","volume":"9","author":"M Wazid","year":"2016","unstructured":"Wazid M, Das AK, Kumari S, Li X, Wu F (2016) Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. Secur Commun Netw 9(13):1983\u20132001","journal-title":"Secur Commun Netw"},{"issue":"8","key":"6851_CR10","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/s10916-015-0258-7","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin R, Biswas GP (2015) A secure three-factor user authentication and key agreement protocol for TMIS with user anonymity. J Med Syst 39(8):78","journal-title":"J Med Syst"},{"key":"6851_CR11","first-page":"172","volume":"18","author":"R Amin","year":"2016","unstructured":"Amin R (2016) Cryptanalysis and efficient dynamic ID based remote user authentication scheme in multi-server environment using smart card. Int J Netw Secur 18:172\u2013181","journal-title":"Int J Netw Secur"},{"issue":"11","key":"6851_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-014-0143-9","volume":"38","author":"C-L Chen","year":"2014","unstructured":"Chen C-L et al (2014) A privacy authentication scheme based on cloud for medical environment. J Medical Syst 38(11):1\u201316","journal-title":"J Medical Syst"},{"issue":"4","key":"6851_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0453-1","volume":"40","author":"S-Y Chiou","year":"2016","unstructured":"Chiou S-Y, Ying Z, Liu J (2016) Improvement of a privacy authentication scheme based on cloud for medical environment. J Med Syst 40(4):1\u201315","journal-title":"J Med Syst"},{"issue":"4","key":"6851_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-017-0699-2","volume":"41","author":"P Mohit","year":"2017","unstructured":"Mohit P, Amin R, Karati A, Biswas GP, Khan MK (2017) A standard mutual authentication protocol for cloud computing-based health care system. J Med Syst 41(4):1\u201313","journal-title":"J Med Syst"},{"key":"6851_CR15","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.cmpb.2018.02.002","volume":"157","author":"C-T Li","year":"2018","unstructured":"Li C-T, Shih D-H, Wang C-C (2018) Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. Comput Method Progr Biomed 157:191\u2013203","journal-title":"Comput Method Progr Biomed"},{"key":"6851_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0987-5","volume":"42","author":"V Kumar","year":"2018","unstructured":"Kumar V, Jangirala S, Ahmad M (2018) An efficient mutual authentication framework for healthcare system in cloud computing. J Med Syst 42:1\u201325","journal-title":"J Med Syst"},{"key":"6851_CR17","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.tele.2018.09.001","volume":"38","author":"V Kumar","year":"2019","unstructured":"Kumar V, Ahmad M, Kumari A (2019) A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS. Telemat Inform 38:100\u2013117","journal-title":"Telemat Inform"},{"key":"6851_CR18","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.cmpb.2016.07.028","volume":"135","author":"AK Sutrala","year":"2016","unstructured":"Sutrala AK, Das AK, Odelu V, Wazid M, Kumari S (2016) Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Comput Method Progr Biomed 135:167\u2013185","journal-title":"Comput Method Progr Biomed"},{"key":"6851_CR19","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.procs.2016.09.091","volume":"98","author":"A Abdellaoui","year":"2016","unstructured":"Abdellaoui A, Khamlichi YI, Chaoui H (2016) A robust authentication scheme for telecare medicine information system. Proced Comput Sci 98:584\u2013589","journal-title":"Proced Comput Sci"},{"issue":"8","key":"6851_CR20","first-page":"1","volume":"39","author":"R Amin","year":"2015","unstructured":"Amin R, Biswas GP (2015) An improved rsa based user authentication and session key agreement protocol usable in TMIS. J Med Syst 39(8):1\u201314","journal-title":"J Med Syst"},{"issue":"6","key":"6851_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0244-0","volume":"39","author":"SA Chaudhry","year":"2015","unstructured":"Chaudhry SA, Naqvi H, Shon T, Sher M, Farash MS (2015) Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J Med Syst 39(6):1. https:\/\/doi.org\/10.1007\/s10916-015-0244-0","journal-title":"J Med Syst"},{"key":"6851_CR22","doi-asserted-by":"publisher","first-page":"7452","DOI":"10.1109\/ACCESS.2017.2780124","volume":"6","author":"S Qiu","year":"2017","unstructured":"Qiu S, Xu G, Ahmad H, Wang L (2017) A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems. IEEE Access 6:7452\u20137463","journal-title":"IEEE Access"},{"issue":"1","key":"6851_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0658-3","volume":"41","author":"MU Aslam","year":"2017","unstructured":"Aslam MU, Derhab A, Saleem K, Abbas H, Orgun M, Iqbal W, Aslam B (2017) A survey of authentication schemes in telecare medicine information systems. J Med Syst 41(1):1\u201326","journal-title":"J Med Syst"},{"key":"6851_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2017.03.003","volume":"87","author":"M Masdari","year":"2017","unstructured":"Masdari M, Ahmadzadeh S (2017) A survey and taxonomy of the authentication schemes in Telecare medicine information systems. J Netw Comput Appl 87:1\u201319","journal-title":"J Netw Comput Appl"},{"key":"6851_CR25","doi-asserted-by":"publisher","first-page":"7012","DOI":"10.1109\/ACCESS.2017.2694044","volume":"5","author":"S Chatterjee","year":"2017","unstructured":"Chatterjee S, Roy S, Das AK, Chattopadhyay S, Kumar N, Reddy AG, Park K, Park Y (2017) On the design of fine-grained access control with user authentication scheme for telecare medicine information systems. IEEE Access 5:7012\u20137030","journal-title":"IEEE Access"},{"issue":"8","key":"6851_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0998-2","volume":"42","author":"Y Ji","year":"2018","unstructured":"Ji Y, Zhang J, Ma J, Yang C, Yao X (2018) BMPLS: Blockchain-based multi-level privacy-preserving location sharing scheme for telecare medical information systems. J Med Syst 42(8):1\u201313","journal-title":"J Med Syst"},{"key":"6851_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0997-3","volume":"42","author":"H Li","year":"2018","unstructured":"Li H, Zhu L, Shen M, Gao F, Tao X, Liu S (2018) Blockchain-based data preservation system for medical data. J Med Syst 42:1\u201313","journal-title":"J Med Syst"},{"issue":"9","key":"6851_CR28","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1016\/j.jksuci.2017.12.014","volume":"32","author":"V Kumar","year":"2020","unstructured":"Kumar V, Kumar R, Pandey SK (2020) A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. J King Saud Univ-Comput Inf Sci 32(9):1081\u20131094","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"6851_CR29","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/s12083-020-00921-6","volume":"14","author":"V Kumar","year":"2021","unstructured":"Kumar V, Kumar R, Pandey SK (2021) LKM-AMI: a lightweight key management scheme for secure two-way communications between smart meters and HAN devices of AMI system in smart grid. Peer-to-Peer Netw Appl 14:82\u2013100","journal-title":"Peer-to-Peer Netw Appl"},{"key":"6851_CR30","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.future.2017.08.029","volume":"84","author":"X Li","year":"2018","unstructured":"Li X, Wu F, Khan MK, Xu L, Shen J, Jo M (2018) A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener Comput Syst 84:149\u2013159","journal-title":"Future Gener Comput Syst"},{"issue":"8","key":"6851_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-021-01750-7","volume":"45","author":"D Dharminder","year":"2021","unstructured":"Dharminder D, Kundu N, Mishra D (2021) Construction of a chaotic map-based authentication protocol for tmis. J Med Syst 45(8):1\u201310","journal-title":"J Med Syst"},{"key":"6851_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-020-08904-8","volume":"80","author":"V Kumar","year":"2021","unstructured":"Kumar V, Kumar R, Pandey SK (2021) A computationally efficient and scalable key management scheme for access control of media delivery in digital pay-TV systems. Multimed Tools Appl 80:1\u201334","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"6851_CR33","first-page":"781","volume":"14","author":"V Kumar","year":"2022","unstructured":"Kumar V, Pal O, Thakur V, Kumar K (2022) SCGKM: a secure and cost-effective group key management scheme for multicast communication in large dynamic groups. Int J Inf Technol 14(2):781\u2013788","journal-title":"Int J Inf Technol"},{"issue":"3","key":"6851_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0221-7","volume":"39","author":"Y Lu","year":"2015","unstructured":"Lu Y, Li L, Peng H, Yang Y (2015) An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 39(3):1\u20138","journal-title":"J Med Syst"},{"key":"6851_CR35","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1007\/s12652-017-0516-2","volume":"9","author":"Q Jiang","year":"2018","unstructured":"Jiang Q et al (2018) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Humaniz Comput 9:1061\u20131073","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"6851_CR36","first-page":"283","volume":"12","author":"V Kumar","year":"2020","unstructured":"Kumar V, Kumar R, Pandey SK (2020) Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups. Int J Inf Technol 12:283\u2013288","journal-title":"Int J Inf Technol"},{"key":"6851_CR37","doi-asserted-by":"publisher","first-page":"67555","DOI":"10.1109\/ACCESS.2020.2985719","volume":"8","author":"S Shin","year":"2020","unstructured":"Shin S, Kwon T (2020) A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated internet of things. IEEE access 8:67555\u201367571","journal-title":"IEEE access"},{"issue":"7","key":"6851_CR38","doi-asserted-by":"publisher","first-page":"8668","DOI":"10.1007\/s11227-023-05756-5","volume":"80","author":"K Gupta","year":"2024","unstructured":"Gupta K, Kumar V (2024) KMS\u2013AMI: an efficient and scalable key management scheme for secure two-way communications in advanced metering infrastructure of smart grid. J Supercomput 80(7):8668\u20138701","journal-title":"J Supercomput"},{"key":"6851_CR39","doi-asserted-by":"publisher","unstructured":"Kumar V, Kumar R, Pandey SK (2020). An efficient and scalable distributed key management scheme using ternary tree for secure communication in dynamic groups. In: Singh P, Panigrahi B, Suryadevara N, Sharma S, Singh A (eds) Proceedings of ICETIT 2019. Lecture Notes in Electrical Engineering, vol 605, Springer, Cham https:\/\/doi.org\/10.1007\/978-3-030-30577-2_13","DOI":"10.1007\/978-3-030-30577-2_13"},{"issue":"8","key":"6851_CR40","doi-asserted-by":"publisher","first-page":"8281","DOI":"10.1007\/s11227-020-03553-y","volume":"77","author":"VP Gaikwad","year":"2021","unstructured":"Gaikwad VP, Tembhurne JV, Meshram C, Lee CC (2021) Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function. J Supercomput 77(8):8281\u20138304","journal-title":"J Supercomput"},{"key":"6851_CR41","doi-asserted-by":"crossref","unstructured":"Kumar V, Kumar R, Pandey SK (2020) An effective and secure key management protocol for access control in pay-TV broadcasting systems using theory of numbers. Computing Algorithms with Applications in Engineering: Proceedings of ICCAEEE 2019. Springer, Singapore","DOI":"10.1007\/978-981-15-2369-4_31"},{"issue":"14","key":"6851_CR42","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4465","volume":"33","author":"V Kumar","year":"2020","unstructured":"Kumar V, Kumar R, Pandey SK (2020) A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications. Int J Commun Syst 33(14):e4465","journal-title":"Int J Commun Syst"},{"key":"6851_CR43","unstructured":"Kumar V, Gupta K, Pal O, Prakash S, Kumar P, Singh SV, Tiwari PK, Tripathi A. Effective key agreement protocol for large and dynamic groups using elliptic curve cryptography. Cyber Security Using Modern Technologies. CRC Press, pp 101\u2013109."},{"issue":"1","key":"6851_CR44","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TDSC.2021.3129512","volume":"20","author":"Q Wang","year":"2021","unstructured":"Wang Q, Wang D, Cheng C, He D (2021) Quantum2FA: efficient quantum-resistant two-factor authentication scheme for mobile devices. IEEE Transact Dependable Secure Comput 20(1):193\u2013208","journal-title":"IEEE Transact Dependable Secure Comput"},{"key":"6851_CR45","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1109\/TIFS.2022.3227753","volume":"18","author":"Q Wang","year":"2022","unstructured":"Wang Q, Wang D (2022) Understanding failures in security proofs of multi-factor authentication for mobile devices. IEEE Trans Inf Forensics Secur 18:597\u2013612","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"6851_CR46","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"6851_CR47","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1002\/sec.977","volume":"8","author":"L Xu","year":"2015","unstructured":"Xu L, Fan Wu (2015) An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur Commun Netw 8(2):245\u2013260","journal-title":"Secur Commun Netw"},{"issue":"1","key":"6851_CR48","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/s11277-021-08234-4","volume":"119","author":"S Rana","year":"2021","unstructured":"Rana S, Mishra D, Arora R (2021) Privacy-preserving key agreement protocol for fog computing supported internet of things environment. Wirel Pers Commun 119(1):727\u2013747","journal-title":"Wirel Pers Commun"},{"key":"6851_CR49","volume-title":"Healthcare governance and patients\u2019 perception of service quality","author":"PA Abor","year":"2012","unstructured":"Abor PA, Agrizzi D (2012) Healthcare governance and patients\u2019 perception of service quality. Annual conference on innovations in business & Management, London"},{"key":"6851_CR50","doi-asserted-by":"publisher","DOI":"10.1201\/9780429466335","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"2018","unstructured":"Menezes AJ, Van Oorschot PC, Vanstone SA (2018) Handbook of applied cryptography. CRC Press, Boca Raton"},{"issue":"4","key":"6851_CR51","first-page":"708","volume":"15","author":"D Wang","year":"2016","unstructured":"Wang D, Wang P (2016) Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Trans Dependable Secure Comput 15(4):708\u2013722","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"6851_CR52","unstructured":"Kumar V, Gupta K, Pal O, Kumar R, Tiwari PK, Updhyay NK, Bhardwaj MK (2023) Computation and storage efficient key distribution protocol for secure multicast communication in centralized environments. Cyber security using modern technologies. CRC Press, pp 91\u2013100."},{"key":"6851_CR53","unstructured":"Gupta K, Kumar V (2023) Security and performance analysis of advanced metering infrastructure in smart grid and use of blockchain in security perspective.\u00a0Cyber security using modern technologies. CRC Press, pp 73\u201390."},{"key":"6851_CR54","doi-asserted-by":"crossref","unstructured":"Gupta K, Kumar V (2023) A provably secure ECC-based key distribution scheme for secure message transmission in vehicular Ad Hoc networks. In: International Conference on Emerging Trends and Technologies on Intelligent Systems. Singapore: Springer Nature Singapore.","DOI":"10.1007\/978-981-99-3963-3_47"},{"issue":"9","key":"6851_CR55","doi-asserted-by":"publisher","first-page":"4081","DOI":"10.1109\/TII.2018.2834351","volume":"14","author":"D Wang","year":"2018","unstructured":"Wang D, Li W, Wang P (2018) Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans Industr Inf 14(9):4081\u20134092","journal-title":"IEEE Trans Industr Inf"},{"key":"6851_CR56","doi-asserted-by":"crossref","unstructured":"Abdalla M, Izabachene M, Pointcheval D (2008) Anonymous and transparent gateway-based password-authenticated key exchange. International Conference on Cryptology and Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg","DOI":"10.1007\/978-3-540-89641-8_10"},{"key":"6851_CR57","unstructured":"Pointcheval D (2003) Security Proofs for an efficient password-based key exchange."},{"issue":"6","key":"6851_CR58","doi-asserted-by":"publisher","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"Z Zhu","year":"2012","unstructured":"Zhu Z (2012) An efficient authentication scheme for telecare medicine information systems. J Med Syst 36(6):3833\u20133838","journal-title":"J Med Syst"},{"issue":"3","key":"6851_CR59","doi-asserted-by":"publisher","first-page":"3620","DOI":"10.1109\/JSYST.2020.3016065","volume":"15","author":"DS Gupta","year":"2020","unstructured":"Gupta DS et al (2020) LAAC: lightweight lattice-based authentication and access control protocol for E-health systems in IoT environments. IEEE Syst J 15(3):3620\u20133627","journal-title":"IEEE Syst J"},{"issue":"2","key":"6851_CR60","doi-asserted-by":"publisher","first-page":"1324","DOI":"10.1109\/TSC.2022.3149940","volume":"16","author":"L Zhang","year":"2022","unstructured":"Zhang L et al (2022) Privacy-preserving fast three-factor authentication and key agreement for IoT-based E-health systems. IEEE Transact Serv Comput 16(2):1324\u20131333","journal-title":"IEEE Transact Serv Comput"},{"issue":"2","key":"6851_CR61","first-page":"1338","volume":"19","author":"S Qiu","year":"2020","unstructured":"Qiu S et al (2020) Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices. IEEE Transact Dependable Secur Comput 19(2):1338\u20131351","journal-title":"IEEE Transact Dependable Secur Comput"},{"key":"6851_CR62","doi-asserted-by":"crossref","unstructured":"Bonneau, Joseph, et al. (2012) The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. 2012 IEEE Symposium on Security and Privacy. IEEE.","DOI":"10.1109\/SP.2012.44"},{"issue":"9","key":"6851_CR63","doi-asserted-by":"publisher","first-page":"9390","DOI":"10.1109\/TVT.2020.2971254","volume":"69","author":"Qi Jiang","year":"2020","unstructured":"Jiang Qi et al (2020) Unified biometric privacy preserving three-factor authentication and key agreement for cloud-assisted autonomous vehicles. IEEE Transact Veh Technol 69(9):9390\u20139401","journal-title":"IEEE Transact Veh Technol"},{"key":"6851_CR64","volume":"63","author":"P Mohit","year":"2021","unstructured":"Mohit P (2021) An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring. J Inf Secur Appl 63:102992","journal-title":"J Inf Secur Appl"},{"key":"6851_CR65","doi-asserted-by":"publisher","first-page":"107838","DOI":"10.1109\/ACCESS.2020.3001152","volume":"8","author":"A Kumari","year":"2020","unstructured":"Kumari A et al (2020) Csef: cloud-based secure and efficient framework for smart medical system using ecc. IEEE Access 8:107838\u2013107852","journal-title":"IEEE Access"},{"key":"6851_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-020-00221-1","volume":"10","author":"C-L Chen","year":"2020","unstructured":"Chen C-L et al (2020) A secure electronic medical record authorization system for smart device application in cloud computing environments. Hum-centric Comput Inf Sci 10:1\u201331","journal-title":"Hum-centric Comput Inf Sci"},{"key":"6851_CR67","doi-asserted-by":"publisher","first-page":"2961","DOI":"10.1109\/TIFS.2023.3272772","volume":"18","author":"C Wang","year":"2023","unstructured":"Wang C et al (2023) Secure and lightweight user authentication scheme for cloud-assisted internet of things. IEEE Transact Inf Forensics Secur 18:2961\u20132976","journal-title":"IEEE Transact Inf Forensics Secur"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06851-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06851-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06851-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T06:27:27Z","timestamp":1742538447000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06851-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,20]]},"references-count":67,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["6851"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06851-x","relation":{},"ISSN":["1573-0484"],"issn-type":[{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2025,3,20]]},"assertion":[{"value":"17 December 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest declared by the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}],"article-number":"639"}}