{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T16:41:40Z","timestamp":1773765700887,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T00:00:00Z","timestamp":1483574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2010-0020210"],"award-info":[{"award-number":["NRF-2010-0020210"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,5]]},"DOI":"10.1145\/3022227.3022244","type":"proceedings-article","created":{"date-parts":[[2017,2,10]],"date-time":"2017-02-10T13:39:43Z","timestamp":1486733983000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems"],"prefix":"10.1145","author":[{"given":"Dongwoo","family":"Kang","sequence":"first","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]},{"given":"Donghoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]},{"given":"Seokhyang","family":"Cho","sequence":"additional","affiliation":[{"name":"Pyeongtaek University, Pyeongtaek, Republic of Korea"}]},{"given":"Jaewook","family":"Jung","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2017,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Yang Che-Ming etal \"Taiwan's perspective on electronic medical records security and privacy protection: Lessons learned from HIPAA.\" Computer methods and programs in biomedicine 82.3 (2006):  277--282.  Yang Che-Ming et al. \"Taiwan's perspective on electronic medical records security and privacy protection: Lessons learned from HIPAA.\" Computer methods and programs in biomedicine 82.3 (2006): 277--282.","DOI":"10.1016\/j.cmpb.2006.04.002"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2007.906101"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/358790.358797"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0145263"},{"key":"e_1_3_2_1_5_1","first-page":"2014","article-title":"Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics","author":"Choi Younsung","year":"2014","unstructured":"Younsung Choi , \" Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics .\" The Scientific World Journal 2014 ( 2014 ). Younsung Choi, et al. \"Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.\" The Scientific World Journal 2014 (2014).","journal-title":"The Scientific World Journal"},{"issue":"4","key":"e_1_3_2_1_6_1","first-page":"1","article-title":"An efficient user authentication scheme with smart cards for wireless communications","volume":"7","author":"Jeon Woongryul","year":"2013","unstructured":"Woongryul Jeon , Yunho Lee , and Dongho Won . \" An efficient user authentication scheme with smart cards for wireless communications .\" International Journal of Security & Its Applications 7 . 4 ( 2013 ): 1 -- 5 . Woongryul Jeon, Yunho Lee, and Dongho Won. \"An efficient user authentication scheme with smart cards for wireless communications.\" International Journal of Security & Its Applications 7.4 (2013): 1--5.","journal-title":"International Journal of Security & Its Applications"},{"key":"e_1_3_2_1_7_1","volume-title":"1819--1821","author":"Son Kyungho","year":"2012","unstructured":"Kyungho Son ., DongGuk Han , and Dongho Won . \" A privacy-protecting authentication scheme for roaming services with smart cards.\" IEICE transactions on communications 95.5 ( 2012 ): 1819--1821 . Kyungho Son., DongGuk Han, and Dongho Won. \"A privacy-protecting authentication scheme for roaming services with smart cards.\" IEICE transactions on communications 95.5 (2012): 1819--1821."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2012.06.033"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.07.004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9614-9"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9658-5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9835-1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9856-9"},{"issue":"6","key":"e_1_3_2_1_14_1","article-title":"A Robust Authentication Scheme for Telecare Medicine Information Systems","volume":"123","author":"Kukki Arya","year":"2015","unstructured":"Arya Kukki , and Abhinav Vidwansh . \" A Robust Authentication Scheme for Telecare Medicine Information Systems .\" International Journal of Computer Applications 123 . 6 ( 2015 ). Arya Kukki, and Abhinav Vidwansh. \"A Robust Authentication Scheme for Telecare Medicine Information Systems.\" International Journal of Computer Applications 123.6 (2015).","journal-title":"International Journal of Computer Applications"},{"key":"e_1_3_2_1_15_1","volume-title":"Cryptography: theory and practice","author":"Douglas","year":"2005","unstructured":"Stinson, Douglas R. Cryptography: theory and practice . CRC press , 2005 . Stinson, Douglas R. Cryptography: theory and practice. CRC press, 2005."},{"key":"e_1_3_2_1_16_1","volume-title":"Springer Berlin Heidelberg","author":"Jaffe Joshua","year":"1999","unstructured":"Kocher, Paul, Joshua Jaffe , and Benjamin Jun . \" Differential power analysis.\" Advances in Cryptology-CRYPTO' 99. Springer Berlin Heidelberg , 1999 . Kocher, Paul, Joshua Jaffe, and Benjamin Jun. \"Differential power analysis.\" Advances in Cryptology-CRYPTO' 99. Springer Berlin Heidelberg, 1999."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1004593"}],"event":{"name":"IMCOM '17: The 11th International Conference on Ubiquitous Information Management and Communication","location":"Beppu Japan","acronym":"IMCOM '17","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3022227.3022244","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3022227.3022244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:32Z","timestamp":1750220612000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3022227.3022244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,5]]},"references-count":17,"alternative-id":["10.1145\/3022227.3022244","10.1145\/3022227"],"URL":"https:\/\/doi.org\/10.1145\/3022227.3022244","relation":{},"subject":[],"published":{"date-parts":[[2017,1,5]]},"assertion":[{"value":"2017-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}