{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:39Z","timestamp":1750220319431,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,14]],"date-time":"2021-05-14T00:00:00Z","timestamp":1620950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,14]]},"DOI":"10.1145\/3472813.3473187","type":"proceedings-article","created":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T15:41:48Z","timestamp":1635262908000},"page":"181-186","source":"Crossref","is-referenced-by-count":0,"title":["An Access Authentication Scheme of a Copyright Privacy Protection without Key Agreement using PUF Healthcare Cards"],"prefix":"10.1145","author":[{"given":"Yu-Jie","family":"(Jessica) Kuo","sequence":"first","affiliation":[{"name":"Graduate Institute of Library and Information Studies, National Normal University Taipei 10610, Taiwan, Taiwan"}]},{"given":"Jiann-Cherng","family":"Shieh","sequence":"additional","affiliation":[{"name":"Graduate Institute of Library and Information Studies, National Normal University Taipei 10610, Taiwan, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2021,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00521-8"},{"key":"e_1_3_2_1_2_1","volume-title":"A Provable and Secure Patient Electronic Health Record Fair Exchange Scheme for Health Information Systems. Applied Sciences,\u00a011, 5 (January","author":"Chen M.-T.","year":"2021","unstructured":"M.-T. Chen and\u00a0 T.-H. Lin .\u00a02021. A Provable and Secure Patient Electronic Health Record Fair Exchange Scheme for Health Information Systems. Applied Sciences,\u00a011, 5 (January 2021 ), 2401.\u00a0DOI= http:\/\/10.3390\/app11052401 M.-T. Chen and\u00a0T.-H. Lin.\u00a02021. A Provable and Secure Patient Electronic Health Record Fair Exchange Scheme for Health Information Systems. Applied Sciences,\u00a011, 5 (January 2021), 2401.\u00a0DOI= http:\/\/10.3390\/app11052401"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"C.-S. Tsai Q.-X. Huang \u00a0T.-H. Lin \u00a0and T.-F. Lee. 2019.\u00a0Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems.\u00a0 In Proceedings of the third International Conference on Medical and Health Informatics 2019 (ICMHI2019) pp.161-171 \u00a0Xiamen China May 17\u223c19 2019.\u00a0\u00a0DOI=https:\/\/doi.org\/10.1145\/3340037.3340064\u00a0  C.-S. Tsai Q.-X. Huang \u00a0T.-H. Lin \u00a0and T.-F. Lee. 2019.\u00a0Computation-Efficient Three-Party Encrypted Key Exchange for Telecare Medicine Information Systems.\u00a0 In Proceedings of the third International Conference on Medical and Health Informatics 2019 (ICMHI2019) pp.161-171 \u00a0Xiamen China May 17\u223c19 2019.\u00a0\u00a0DOI=https:\/\/doi.org\/10.1145\/3340037.3340064\u00a0","DOI":"10.1145\/3340037.3340064"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"T.F. Lee Y.-Y. Diao F.M. Chen. 2020.\u00a0An Improved Authenticated Key Agreement Protocol with Privacy Protection for Mobile Healthcare Systems with Wearable Sensors.\u00a0 International Journal of Business and Systems Research \u00a014 4 (January 2020) 385-397.  T.F. Lee Y.-Y. Diao F.M. Chen. 2020.\u00a0An Improved Authenticated Key Agreement Protocol with Privacy Protection for Mobile Healthcare Systems with Wearable Sensors.\u00a0 International Journal of Business and Systems Research \u00a014 4 (January 2020) 385-397.","DOI":"10.1504\/IJBSR.2020.110758"},{"key":"e_1_3_2_1_5_1","volume-title":"An integrated two-stage medical pre-checkup and subsequent validation key agreement authentication mechanism. \u00a0Applied Sciences,\u00a010, 5 (January","author":"Chen T.-H.","year":"2020","unstructured":"T.-H. Lin\u00a0and M.-T. Chen .\u00a02020. An integrated two-stage medical pre-checkup and subsequent validation key agreement authentication mechanism. \u00a0Applied Sciences,\u00a010, 5 (January 2020 ), 1888. DOI= http:\/\/10.3390\/app10051888 T.-H. Lin\u00a0and M.-T. Chen.\u00a02020. An integrated two-stage medical pre-checkup and subsequent validation key agreement authentication mechanism. \u00a0Applied Sciences,\u00a010, 5 (January 2020), 1888. DOI= http:\/\/10.3390\/app10051888"},{"key":"e_1_3_2_1_6_1","volume-title":"In\u00a02015 IEEE International Workshop on Information Forensics and Security (WIFS), 1-6. DOI= http:\/\/10","author":"Wong C.","year":"2015","unstructured":"C. Wong and M. Wu . 2015. Counterfeit detection using paper PUF and mobile cameras . In\u00a02015 IEEE International Workshop on Information Forensics and Security (WIFS), 1-6. DOI= http:\/\/10 .1109\/WIFS. 2015 .7368579. C. Wong and M. Wu. 2015. Counterfeit detection using paper PUF and mobile cameras. In\u00a02015 IEEE International Workshop on Information Forensics and Security (WIFS), 1-6. DOI= http:\/\/10.1109\/WIFS.2015.7368579."},{"key":"e_1_3_2_1_7_1","unstructured":"M. Deutschmann L. Iriskic S.L. Lattacher M. Munzer F. Stornig and O. Tomashchuk. 2018. Research on the Applications of Physically Unclonable Functions within the Internet of Things. 9.  M. Deutschmann L. Iriskic S.L. Lattacher M. Munzer F. Stornig and O. Tomashchuk. 2018. Research on the Applications of Physically Unclonable Functions within the Internet of Things. 9."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2018.04.007"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"}],"event":{"name":"ICMHI 2021: 2021 5th International Conference on Medical and Health Informatics","acronym":"ICMHI 2021","location":"Kyoto Japan"},"container-title":["2021 5th International Conference on Medical and Health Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472813.3473187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472813.3473187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:56Z","timestamp":1750191116000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472813.3473187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,14]]},"references-count":9,"alternative-id":["10.1145\/3472813.3473187","10.1145\/3472813"],"URL":"https:\/\/doi.org\/10.1145\/3472813.3473187","relation":{},"subject":[],"published":{"date-parts":[[2021,5,14]]}}}