{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:43:07Z","timestamp":1773279787394,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,29]],"date-time":"2015-10-29T00:00:00Z","timestamp":1446076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1007\/s10916-015-0365-5","type":"journal-article","created":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T19:58:11Z","timestamp":1447703891000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems"],"prefix":"10.1007","volume":"40","author":[{"given":"Hoon","family":"Ko","sequence":"first","affiliation":[]},{"given":"MoonBae","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,29]]},"reference":[{"issue":"4","key":"365_CR1","first-page":"1","volume":"2013","author":"R Guo","year":"2013","unstructured":"Guo, R., Wen, Q., Jin, Z., and Zhang, H., An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks. Int. J. Distrib. Sens. Netw. 2013(4):1\u20137, 2013.","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"365_CR2","doi-asserted-by":"crossref","unstructured":"Fragopoulos, A. Gialelis, J. and Serpanos, D. Security framework for pervasive healthcare architectures utilizing MPEG-21 IPMP components, International Journal of Telemedicine and Applications. 2009:1\u20139, 2009.","DOI":"10.1155\/2009\/461560"},{"issue":"1","key":"365_CR3","first-page":"9","volume":"10","author":"H Kim","year":"2013","unstructured":"Kim, H., Ryu, E.-K., and Lee, S.-W., Security considerations on cognitive radio based on body area networks for u-healthcare. J. Secur. Eng. 10(1):9\u201320, 2013.","journal-title":"J. Secur. Eng."},{"key":"365_CR4","doi-asserted-by":"crossref","unstructured":"Zhang, G.H., Chung, C., Poon, Y., and Zhang, Y.T. A review on body area networks security for healthcare, Int. J. Distrib. Sensors Networks, 2011.","DOI":"10.5402\/2011\/692592"},{"key":"365_CR5","doi-asserted-by":"crossref","unstructured":"Haque, S.A., Aziz, S.M., and Rahman, M. Review of Cyber-Physical System in Healthcare, Int. J. Distrib. Sensors Networks, 2014.","DOI":"10.1155\/2014\/217415"},{"key":"365_CR6","unstructured":"EMC, Cybercrime and the Healthcare industry, http:\/\/www.emc.com\/collateral\/white-papers\/h12105-cybercrime-healthcare-industry-rsa-wp.pdf"},{"key":"365_CR7","unstructured":"Forbes, Hackers Stole Data On 80 Million Anthem Customers. Why Wasn\u2019t It Encrypted?, http:\/\/www.forbes.com\/sites\/brucejapsen\/2015\/02\/06\/anthem-didnt-encrypt-personal-data-and-privacy-laws-dont-require-it\/"},{"key":"365_CR8","doi-asserted-by":"crossref","unstructured":"Yu, H., He, J., Liu, R., and Ji, D., On the security of data collection and transmission from wireless sensor networks in the context of internet of things. Int. J. Distrib. Sens. Netw. 2013:1\u201313, 2013.","DOI":"10.1155\/2013\/806505"},{"key":"365_CR9","unstructured":"TrustedSEC, Explaining security issues with healthcare.gov, https:\/\/www.trustedsec.com\/january-2014\/explaining-security-issues-healthcare-gov\/"},{"issue":"2","key":"365_CR10","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.camwa.2011.10.038","volume":"63","author":"MR Ogiela","year":"2012","unstructured":"Ogiela, M. R., and Ogiela, U., Linguistic protocols for secure information management and sharing. Comput. Math. Appl. 63(2):564\u2013572, 2012.","journal-title":"Comput. Math. Appl."},{"key":"365_CR11","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Ogiela, U. Linguistic extension for secret sharing (m, n)-threshold Schemes, 2008 International Conference on Security Technology, December 13\u201315, 2008, Hainan Island, Sanya, China, pp. 125\u2013128, 2008.","DOI":"10.1109\/SecTech.2008.15"},{"key":"365_CR12","doi-asserted-by":"crossref","unstructured":"Ko, H., Chen, N., Marreiros, G., and Ramos, C. Safe high accuracy Context-Aware Matrix (CAM) making based on X.509 proxy certificate, Lecture Notes in Computer Science, pp. 829\u2009~\u2009837, Korea University, Seoul, S. Korea, June 25\u2009~\u200927, 2009.","DOI":"10.1007\/978-3-642-02617-1_85"},{"issue":"6","key":"365_CR13","doi-asserted-by":"crossref","first-page":"3833","DOI":"10.1007\/s10916-012-9856-9","volume":"36","author":"ZA Zhu","year":"2012","unstructured":"Zhu, Z. A., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833\u20133838, 2012.","journal-title":"J. Med. Syst."},{"issue":"1","key":"365_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10916-012-9897-0","volume":"37","author":"Q Jiang","year":"2013","unstructured":"Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1\u20138, 2013.","journal-title":"J. Med. Syst."},{"key":"365_CR15","doi-asserted-by":"crossref","unstructured":"Cao, T., Zhai, J. Improved dynamic id-based authentication scheme for telecare medical information systems, J. Med. Syst. Vol. 37, No. 2, 2013.","DOI":"10.1007\/s10916-012-9912-5"},{"issue":"6","key":"365_CR16","doi-asserted-by":"crossref","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"H-M Chen","year":"2012","unstructured":"Chen, H.-M., Lo, J.-W., and Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907\u20133915, 2012.","journal-title":"J. Med. Syst."},{"issue":"6","key":"365_CR17","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1016\/j.ins.2009.11.036","volume":"180","author":"L Zhang","year":"2010","unstructured":"Zhang, L., Zhang, F., Wu, Q., and Domingo-Ferrer, J., Simulatable certificateless two-party authenticated key agreement protocol. Inf. Sci. 180(6):1020\u20131030, 2010.","journal-title":"Inf. Sci."},{"issue":"3","key":"365_CR18","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1016\/j.comcom.2010.02.011","volume":"34","author":"MK Khana","year":"2010","unstructured":"Khana, M. K., Kimb, S.-K., and Alghathbar, K., Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Comput. Commun. 34(3):305\u2013309, 2010.","journal-title":"Comput. Commun."},{"issue":"3","key":"365_CR19","doi-asserted-by":"crossref","first-page":"1213","DOI":"10.1016\/j.mcm.2011.10.001","volume":"55","author":"H Xiong","year":"2012","unstructured":"Xiong, H., Chen, Z., and Li, F. G., Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3):1213\u20131221, 2012.","journal-title":"Math. Comput. Model."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0365-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-015-0365-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-015-0365-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T15:51:10Z","timestamp":1567353070000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-015-0365-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,29]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,1]]}},"alternative-id":["365"],"URL":"https:\/\/doi.org\/10.1007\/s10916-015-0365-5","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,29]]},"article-number":"1"}}