{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T06:06:43Z","timestamp":1757570803791,"version":"3.41.2"},"reference-count":24,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,9,2]],"date-time":"2018-09-02T00:00:00Z","timestamp":1535846400000},"content-version":"vor","delay-in-days":244,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602045","61502044"],"award-info":[{"award-number":["61602045","61502044"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>Telecare medical information systems (TMIS) enable patients to access healthcare delivery services conveniently. With the explosive development occurring in cloud computing and services, storage of personal medical and health information outsourcing to cloud infrastructure has been a potential alternative. However, this has entailed many considerable security and privacy issues. In order to address the security loopholes, we propose a promising solution satisfying the requirements of cloud computing scenarios for telemedical systems. The proposed scheme could provide both data confidentiality and message authenticity while preserving anonymity. Furthermore, the formal security proof demonstrates that the proposed scheme is resistant to various attacks. The performance comparisons show the proposal\u2019s workability and it is well suited to adoption in telemedical services.<\/jats:p>","DOI":"10.1155\/2018\/8131367","type":"journal-article","created":{"date-parts":[[2018,9,2]],"date-time":"2018-09-02T23:35:04Z","timestamp":1535931304000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems"],"prefix":"10.1155","volume":"2018","author":[{"given":"Wenmin","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5362-8916","authenticated-orcid":false,"given":"Shuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Su","sequence":"additional","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,9,2]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/730831"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1594-x"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1762-7"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1080\/02533839.2014.912785"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2013.6689693"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2585681"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.02.010"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2467-5"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2428620"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1610-x"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2596286"},{"key":"e_1_2_9_12_2","first-page":"149","article-title":"Design and implementation of a cloud based rural healthcare information system model","volume":"2","author":"Padhy R. P.","year":"2012","journal-title":"American Journal of Computer Science and Technology"},{"key":"e_1_2_9_13_2","first-page":"2261","article-title":"Design of a cloud based emergency healthcare service model","volume":"8","author":"Banerjee A.","year":"2013","journal-title":"International Journal of Applied Engineering Research"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0112-3"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0143-9"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0453-1"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0699-2"},{"key":"e_1_2_9_18_2","series-title":"Lecture Notes in Electrical Engineering","first-page":"241","volume-title":"International Conference on Information Science and Applications","author":"Li C. T.","year":"2017"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2018.02.002"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0658-3"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2605087"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2721359"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_11"},{"key":"e_1_2_9_24_2","doi-asserted-by":"crossref","unstructured":"GroceA.andKatzJ. A new framework for efficient password-based authenticated key exchange Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS \u203210) October 2010 Chicago Ill USA ACM 516\u2013525 https:\/\/doi.org\/10.1145\/1866307.1866365 2-s2.0-78650032056.","DOI":"10.1145\/1866307.1866365"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/8131367.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/8131367.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/8131367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:38:27Z","timestamp":1723012707000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/8131367"}},"subtitle":[],"editor":[{"given":"Joseph","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/8131367"],"URL":"https:\/\/doi.org\/10.1155\/2018\/8131367","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-04-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-02","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8131367"}}