{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:34:15Z","timestamp":1743154455667,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319257433"},{"type":"electronic","value":"9783319257440"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25744-0_10","type":"book-chapter","created":{"date-parts":[[2015,11,29]],"date-time":"2015-11-29T07:46:38Z","timestamp":1448783198000},"page":"109-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cloud Access Secure with Identity Based Cryptography"],"prefix":"10.1007","author":[{"given":"Houria","family":"Hamadi","sequence":"first","affiliation":[]},{"given":"Abdelkrim","family":"Khireddine","sequence":"additional","affiliation":[]},{"given":"Abdelkamel","family":"Tari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"10_CR1","unstructured":"Cloud Security Alliance. Top Threats To Cloud Computing. Technical report, March 2010. \n                    http:\/\/www.Cloudsecurityalliance.org\/topthreats.html"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"10_CR3","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc., Secaucus (2003)"},{"key":"10_CR4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546570","volume-title":"Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)","author":"I Blake","year":"2005","unstructured":"Blake, I., Seroussi, G., Smart, N., Cassels, J.W.S.: Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series). Cambridge University Press, New York (2005)"},{"key":"10_CR5","unstructured":"Ratna, D., Rana, B., Palash, S.: Pairing-based cryptographic protocols: A survey (2004). \n                    http:\/\/eprint.iacr.org\/"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). \n                    http:\/\/dl.acm.org\/citation.cfm?id=646766.704155"},{"key":"10_CR7","unstructured":"Sakai, R., Kasahara, M.: Id based cryptosystems with pairing on elliptic curve, Cryptology ePrint Archive, Report 2003\/054 (2003). \n                    http:\/\/eprint.iacr.org\/"},{"key":"10_CR8","unstructured":"Secure Password by Using Two Factor Authentication in Cloud Computing, Ali A. Yassin, Hai Jin, Ayad Ibrahim, Weizhong Qiang, and Deqing Zou, Services Computing Technology and System, Lab Cluster and Grid Computing, Lab School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-45325-3_32","volume-title":"Cryptography and Coding","author":"C Cocks","year":"2001","unstructured":"Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Honary, B. (ed.) Cryptography and Coding 2001. LNCS, vol. 2260, pp. 360\u2013363. Springer, Heidelberg (2001)"},{"key":"10_CR10","unstructured":"Lim, H.W., Robshaw, M.J.B.: On identity-based cryptography and grid computing. Lecture Notes in Computer Science, pp. 474\u2013477 (2004). \n                    http:\/\/www.springerlink.com\/content\/ylj95gfgjxlb2131"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/11508380_27","volume-title":"Advances in Grid Computing - EGC 2005","author":"HW Lim","year":"2005","unstructured":"Lim, H.W., Robshaw, M.: A dynamic key infrastructure for Grid. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds.) EGC 2005. LNCS, vol. 3470, pp. 255\u2013264. Springer, Heidelberg (2005)"},{"issue":"1","key":"10_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10207-010-0116-z","volume":"10","author":"HW Lim","year":"2011","unstructured":"Lim, H.W., Paterson, K.G.: Identity-based cryptography for grid security. Int. J. Inf. Secur. 10(1), 15\u201332 (2011). \n                    http:\/\/dx.doi.org\/10.1007\/s10207-010-0116-z","journal-title":"Int. J. Inf. Secur."},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-642-10665-1_14","volume-title":"Cloud Computing","author":"H Li","year":"2009","unstructured":"Li, H., Dai, Y., Tian, L., Yang, H.: Identity-based authentication for cloud computing. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) Cloud Computing. LNCS, vol. 5931, pp. 157\u2013166. Springer, Heidelberg (2009)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Schridde, C., D\u00f6rnemann, T., Juhnke, E., Smith, M., Freisleben, B.: An identity-based security infrastructure for cloud environments. In: Proceedings of IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS2010) (2010)","DOI":"10.1109\/WCINS.2010.5541859"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: RFC 5246 - The Transport Layer Security (TLS) Protocol Version 1.2, Technical report, August 2008. \n                    http:\/\/tools.ietf.org\/html\/rfc5246","DOI":"10.17487\/rfc5246"}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25744-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T14:51:50Z","timestamp":1559314310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25744-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319257433","9783319257440"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25744-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}