{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:16:46Z","timestamp":1725549406798},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540310129"},{"type":"electronic","value":"9783540331537"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11604938_7","type":"book-chapter","created":{"date-parts":[[2006,2,1]],"date-time":"2006-02-01T10:28:58Z","timestamp":1138789738000},"page":"81-95","source":"Crossref","is-referenced-by-count":2,"title":["A Simple and Efficient Conference Scheme for Mobile Communications"],"prefix":"10.1007","author":[{"given":"Wen-Shenq","family":"Juang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Data encryption standard, in National Bureau of Standards. U.S. Dept. of Commerce, Washington, DC (1977)"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-540-27800-9_14","volume-title":"Information Security and Privacy","author":"B. Feng","year":"2004","unstructured":"Feng, B.: Analysis of a conference scheme under active and passive attacks. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 157\u2013163. Springer, Heidelberg (2004)"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/98.403454","volume":"2","author":"Y. Frankel","year":"1995","unstructured":"Frankel, Y., Herzberg, A., Karger, P., Krawczyk, H., Kunzinger, C., Yung, M.: Security issues in a CDPD wireless network. IEEE Personal Communi.\u00a02, 16\u201327 (1995)","journal-title":"IEEE Personal Communi."},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"IT-28","author":"I. Ingemarsson","year":"1982","unstructured":"Ingemarsson, I., Tang, D., Wong, C.: A conference key distribution system. IEEE Trans. on Inform. Theory\u00a0IT-28, 714\u2013720 (1982)","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1016\/S0020-0190(97)00065-3","volume":"62","author":"S. Hirose","year":"1997","unstructured":"Hirose, S., Ikeda, K.: A conference key distribution system for the star configuration based on the discrete logarithm problem. Inform. Processing Lett.\u00a062, 189\u2013192 (1997)","journal-title":"Inform. Processing Lett."},{"issue":"2","key":"7_CR6","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/25.994813","volume":"51","author":"G. Horn","year":"2002","unstructured":"Horn, G., Martin, K., Mitchell, C.: Authentication protocols for mobile network environment value-added services. IEEE Trans. on Vehicular Technology\u00a051(2), 383\u2013392 (2002)","journal-title":"IEEE Trans. on Vehicular Technology"},{"issue":"2","key":"7_CR7","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/TWC.2003.809452","volume":"2","author":"K. Hwang","year":"2003","unstructured":"Hwang, K., Chang, C.: A self-encryption mechanism for authentication of roaming and teleconference service. IEEE Trans. on Wireless Communications\u00a02(2), 400\u2013407 (2003)","journal-title":"IEEE Trans. on Wireless Communications"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/49.345886","volume":"13","author":"M. Hwang","year":"1995","unstructured":"Hwang, M., Yang, W.: Conference key distribution schemes for secure digital mobile communications. IEEE J. Select Areas Communi.\u00a013, 416\u2013420 (1995)","journal-title":"IEEE J. Select Areas Communi."},{"issue":"5","key":"7_CR9","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/25.790522","volume":"48","author":"M. Hwang","year":"1999","unstructured":"Hwang, M.: Dynamic participation in a secure conference scheme for mobile communications. IEEE Trans. on Vehicular Technology\u00a048(5), 1469\u20131474 (1999)","journal-title":"IEEE Trans. on Vehicular Technology"},{"issue":"5","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1109\/26.387429","volume":"43","author":"T. Hwang","year":"1995","unstructured":"Hwang, T., Ku, W.: Repairable key distribution protocols for internet environments. IEEE Trans. on Communications\u00a043(5), 1947\u20131950 (1995)","journal-title":"IEEE Trans. on Communications"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/3-540-48184-2_13","volume-title":"Advances in Cryptology - CRYPTO \u201987","author":"K. Koyama","year":"1988","unstructured":"Koyama, K., Ohta, K.: Identity Based Conference Key Distribution Systems. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol.\u00a0293, pp. 175\u2013184. Springer, Heidelberg (1988)"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TCE.2004.1277863","volume":"50","author":"W. Ku","year":"2004","unstructured":"Ku, W., Chen, S.: Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics\u00a050(1), 204\u2013207 (2004)","journal-title":"IEEE Trans. on Consumer Electronics"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-540-40061-5_4","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"A. Lenstra","year":"2003","unstructured":"Lenstra, A., Tromer, E., Shamir, A., Kortsmit, W., Dodson, B., Hughes, J., Leyland, P.: Factoring estimates for a 1024-bit RSA modulus. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 55\u201374. Springer, Heidelberg (2003)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/0-387-34805-0_40","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R. Merkle","year":"1990","unstructured":"Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 428\u2013446. Springer, Heidelberg (1990)"},{"key":"7_CR15","unstructured":"NIST FIPS PUB 180-2, Secure Hash Standard, National Institute of Standards and Technology, U.S. Department of Commerce (2004)"},{"key":"7_CR16","unstructured":"NIST FIPS PUB 197, Announcing the Advanced Encryption Standard(AES), National Institute of Standards and Technology, U.S. Department of Commerce (2001)"},{"key":"7_CR17","unstructured":"Rabin, M.: Digitalized signatures and public key functions as intractable as factorization. MIT Lab. Computer Sci., TR 212 (January 1979)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The MD5 message-digest algorithm. RFC 1321, Internet Activities Board, Internet Privacy Task Force (1992)","DOI":"10.17487\/rfc1321"},{"issue":"6","key":"7_CR19","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1109\/TIT.1980.1056264","volume":"IT-26","author":"H. Williams","year":"1980","unstructured":"Williams, H.: A Modification of RSA public-key encryption. IEEE Trans. on Inform. Theory\u00a0IT-26(6), 726\u2013729 (1980)","journal-title":"IEEE Trans. on Inform. Theory"},{"issue":"4","key":"7_CR20","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/TVT.2003.814227","volume":"52","author":"X. Yi","year":"2003","unstructured":"Yi, X., Siew, C., Tan, C.: A secure and efficient conference scheme for mobile communications. IEEE Trans. on Vehicular Technology\u00a052(4), 784\u2013793 (2003)","journal-title":"IEEE Trans. on Vehicular Technology"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11604938_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:05:04Z","timestamp":1619507104000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11604938_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540310129","9783540331537"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11604938_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}