{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:41Z","timestamp":1725549341073},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_33","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T08:53:57Z","timestamp":1127811237000},"page":"274-282","source":"Crossref","is-referenced-by-count":1,"title":["Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Mike","family":"Burmester","sequence":"first","affiliation":[]},{"given":"Alec","family":"Yasinsac","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Limitations of the kerberos authentication system. Computer Communications Review (October 1990)","DOI":"10.1145\/381906.381946"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, FIPS Conference Proceedings, vol.\u00a048, pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"33_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/BFb0052253","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., Franklin, M.: Efficient generation of shared rsa keys. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 425\u2013439. Springer, Heidelberg (1997)"},{"key":"33_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/978-3-540-48000-6_22","volume-title":"Advances in Cryptology - ASIACRYPT\u201999","author":"M. Burmester","year":"1999","unstructured":"Burmester, M., Desmedt, Y.G.: Secure communication in an unknown network using certificates. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASIACRYPT 1999. LNCS, vol.\u00a01716, pp. 274\u2013287. Springer, Heidelberg (1999)"},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Desmedt","year":"1990","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"issue":"4","key":"33_CR6","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1002\/ett.4460050407","volume":"5","author":"Y.G. Desmedt","year":"1994","unstructured":"Desmedt, Y.G.: Threshold cryptography. European Trans. on Telecommunications\u00a05(4), 449\u2013457 (1994)","journal-title":"European Trans. on Telecommunications"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Desmedt, Y.: Some recent research aspects of threshold cryptography. In: Proc. of the 1st Intl. Information Security Workshop, pp. 158\u2013173 (1997)","DOI":"10.1007\/BFb0030418"},{"key":"33_CR8","unstructured":"Desmedt, Y., Jajodia, S.: Redistributing secret shares to new access structures and its applications. Technical Report ISSE TR-97-01, George Mason University (July 1997)"},{"issue":"6","key":"33_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Frankel, Y., Gemmel, P., MacKenzie, P., Yung, M.: Optimal resilience proactive public-key cryptosystems. In: Proceedings of the 38th Symposium on Foundations of Computer Science (1997)","DOI":"10.1109\/SFCS.1997.646127"},{"key":"33_CR11","first-page":"959","volume":"17","author":"G. Horng","year":"2001","unstructured":"Horng, G.: A new method for constructing multiple assignment schemes for generalized secret sharing. Journal of Information Science and Engineering\u00a017, 959\u2013965 (2001)","journal-title":"Journal of Information Science and Engineering"},{"key":"33_CR12","unstructured":"Ito, M., Saito, A., Nishizeki, T.: Secret sharing scheme realizing any access structure. In: Proceedings of IEEE Globecom 1987, pp. 99\u2013102 (1987)"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly ad-hoc networks. In: IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, FL, January 28 (2003)","DOI":"10.1109\/SAINTW.2003.1210183"},{"key":"33_CR14","unstructured":"National\u00a0Bureau of\u00a0Standards\u00a0(NBS). Data Encryption Standard. Federal Information Processing Standard, Publication 46, NBS, Washington, D.C. (January 1977)"},{"issue":"12","key":"33_CR15","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"issue":"2","key":"33_CR16","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"33_CR17","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022, 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"33_CR18","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. Shannon","year":"1949","unstructured":"Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell System Technical Journal"},{"key":"33_CR19","unstructured":"Yasinsac, A.: Rates of Change in Ad Hoc Networks. In: The Proceedings of the Information Resources Management Association International Conference (IRMA 2003), Philadelphia, PA, May 18\u201321 (2003) (to appear)"},{"key":"33_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-540-39871-4_16","volume-title":"Security Protocols","author":"A. Yasinsac","year":"2004","unstructured":"Yasinsac, A., Davis, J.A.: Modeling protocols for secure group communications in ad hoc networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol.\u00a02845, pp. 189\u2013202. Springer, Heidelberg (2004)"},{"key":"33_CR21","volume-title":"The Official PGP User\u2019s Guide","author":"P. Zimmermann","year":"1995","unstructured":"Zimmermann, P.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995) (second printing)"},{"issue":"6","key":"33_CR22","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/65.806983","volume":"13","author":"L. Zhou","year":"1999","unstructured":"Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network Magazine\u00a013(6), 24\u201330 (1999)","journal-title":"IEEE Network Magazine"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:18:21Z","timestamp":1605626301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11542322_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}