{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T13:40:22Z","timestamp":1773236422599,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540258094","type":"print"},{"value":"9783540320173","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11422778_9","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T20:01:28Z","timestamp":1279051288000},"page":"102-113","source":"Crossref","is-referenced-by-count":15,"title":["ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I)"],"prefix":"10.1007","author":[{"given":"Levent","family":"Ertaul","sequence":"first","affiliation":[]},{"given":"Weimin","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1007\/3-540-46416-6_47","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"T.P. Pedersen","year":"1991","unstructured":"Pedersen, T.P.: A Threshold Cryptosystem without a Trusted Party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 522\u2013526. Springer, Heidelberg (1991)"},{"key":"9_CR2","unstructured":"Takaragi, K., Miyazaki, K., Takahashi, M.: A Threshold Digital Signature Issuing Scheme without Secret Communication"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Mishra, A., Nadkarni, K.: Security in Wireless Ad Hoc Networks. The Handbook of Ad Hoc Wireless Networks, 30.1\u201330.51 (December 2002)","DOI":"10.1201\/9781420040401.ch30"},{"key":"9_CR4","unstructured":"Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks. IEEE Network Magazine (November\/December 1999)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Zhou, D.: Security Issues in Ad Hoc Networks. The Handbook of Ad Hoc Wireless Networks, 32.1\u201330.14 (December 2002)","DOI":"10.1201\/9781420040401.ch32"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.: Securing Mobile Ad Hoc Networks. The Handbook of Ad Hoc Wireless Networks, 31.1\u201331.17 (December 2002)","DOI":"10.1201\/9781420040401.ch31"},{"issue":"11","key":"9_CR7","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad Hoc Networks. In: Proceddings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31 (2002)","DOI":"10.1201\/9781420040401.ch31"},{"key":"9_CR9","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8592-7","volume-title":"A Course in Number Theory and Cryptography","author":"N. Koblitz","year":"1994","unstructured":"Koblitz, N.: A Course in Number Theory and Cryptography. Graduate Texts in Mathematics, vol.\u00a0(114). Springer, Heidelberg (1994)"},{"key":"9_CR10","volume-title":"Introduction to Cryptography: with Coding Theory","author":"W. Trappe","year":"2002","unstructured":"Trappe, W., Washington, L.C.: Introduction to Cryptography: with Coding Theory. Prentice Hall, Englewood Cliffs (2002)"},{"issue":"4","key":"9_CR11","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. Elgamal","year":"1985","unstructured":"Elgamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory\u00a0IT-31(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR12","doi-asserted-by":"crossref","DOI":"10.4324\/9780203484029","volume-title":"Elliptic Curves: Number Theory and Cryptography","author":"L.C. Washington","year":"2003","unstructured":"Washington, L.C.: Elliptic Curves: Number Theory and Cryptography. Chapman & Hall\/CRC, Boca Raton (2003)"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic Curve Cryptosystems. Math. Comp.\u00a048, 203\u2013209 (1987)","journal-title":"Math. Comp."},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/BF00203817","volume":"6","author":"A. Menezes","year":"1993","unstructured":"Menezes, A., Vanstone, S.A.: Elliptic Curve Cryptosystems and Their Implementation. Journal of Cryptology\u00a06, 209\u2013224 (1993)","journal-title":"Journal of Cryptology"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-46766-1_20","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"K. Koyama","year":"1992","unstructured":"Koyama, K., Maurer, U., Okamoto, T., Vanstone, S.A.: New Public-Key Schemes Based on Elliptic Curves over the Ring Zn. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 252\u2013266. Springer, Heidelberg (1992)"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/3-540-48285-7_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"N. Demytko","year":"1994","unstructured":"Demytko, N.: A New Elliptic Curve Based Analogue of RSA. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 40\u201349. Springer, Heidelberg (1994)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Lauter, K.: The Advantages of Elliptic Curve Cryptography for Wireless Security. IEEE Wireless Communications (February 2004)","DOI":"10.1109\/MWC.2004.1269719"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Gupta, V., Gupta, S., Chang, S.: Performance Analysis of Elliptic Curve Cryptography for SSL. In: ACM Workshop Wireless Security, Mobicom 2002, Atlanta, GA (September 2002)","DOI":"10.1145\/570681.570691"},{"key":"9_CR19","unstructured":"Brown, M., Cheung, D., Hankerson, D., Hernandez, J.L., Kirkup, M., Menezes, A.: PGP in Constrained Wireless Devices. In: Proceedings of the 9th USENIX Security Symposium, Denver, CO (August 2000)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigaing Routing Misbehavior in Mobile Ad Hoc Networks. In: Proceedings of the 6th MobiCom, Boston, MA (August 2000)","DOI":"10.1145\/345910.345955"},{"key":"9_CR21","unstructured":"Papadimitratos, P., Haas, Z.J.: Secure Message Transmission. Mobile Ad Hoc Networks"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11422778_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T21:55:17Z","timestamp":1740261317000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11422778_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540258094","9783540320173"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11422778_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}