{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:55:51Z","timestamp":1742954151392,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_47","type":"book-chapter","created":{"date-parts":[[2015,11,17]],"date-time":"2015-11-17T23:38:40Z","timestamp":1447803520000},"page":"521-530","source":"Crossref","is-referenced-by-count":6,"title":["Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks"],"prefix":"10.1007","author":[{"given":"Changji","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"issue":"2","key":"47_CR1","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11036-010-0260-8","volume":"16","author":"M Chen","year":"2011","unstructured":"Chen, M., Gonzalez, S., Vasilakos, A., et al.: Body area networks: a survey. Mobile Netw. Appl. 16(2), 171\u2013193 (2011)","journal-title":"Mobile Netw. Appl."},{"issue":"1","key":"47_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSAC.2009.090101","volume":"27","author":"C Cordeiro","year":"2009","unstructured":"Cordeiro, C., Fantacci, R., Gupta, S., et al.: Body area networking: technology and applications. IEEE J. Selected Areas Commun. 27(1), 1\u20134 (2009)","journal-title":"IEEE J. Selected Areas Commun."},{"key":"47_CR3","unstructured":"Kyung, S.K., Ullah, S., Ullah, N.: An Overview of IEEE 802.15.6 Standard. In: Proceedings of IEEE Symposium on Applied Sciences in Biomedical and Communication Technologies, pp. 1\u20136 (2010)"},{"issue":"2","key":"47_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2422966.2422975","volume":"9","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S.C., Guttman, J.D., et al.: Secure Ad Hoc trust initialization and key management in wireless body area networks. ACM Trans. Sensor Netw. 9(2), 1\u201335 (2013)","journal-title":"ACM Trans. Sensor Netw."},{"issue":"6","key":"47_CR5","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1109\/TITB.2012.2206115","volume":"16","author":"ZY Zhang","year":"2012","unstructured":"Zhang, Z.Y., Wang, H.G., Vasilakos, A.V., et al.: ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6), 1070\u20131078 (2012)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"issue":"8","key":"47_CR6","doi-asserted-by":"publisher","first-page":"6273","DOI":"10.3390\/s90806273","volume":"9","author":"K Malasri","year":"2009","unstructured":"Malasri, K., Wang, L.: Design and implementation of a secure wireless mote-based medical sensor network. Sensors 9(8), 6273\u20136297 (2009)","journal-title":"Sensors"},{"issue":"9","key":"47_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/JSAC.2013.SUP.0513004","volume":"31","author":"CQ Hu","year":"2013","unstructured":"Hu, C.Q., Zhang, N., Li, H.J., et al.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Selected Areas Commun. 31(9), 37\u201346 (2013)","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"1","key":"47_CR8","first-page":"84","volume":"4","author":"YL Tan","year":"2013","unstructured":"Tan, Y.L., Goi, B., Komiya, R., et al.: Design and implementation of key-policy attribute-based encryption in body sensor network. Int. J. Cryptol. Res. 4(1), 84\u2013101 (2013)","journal-title":"Int. J. Cryptol. Res."},{"issue":"2","key":"47_CR9","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TPDS.2013.145","volume":"25","author":"JW Liu","year":"2014","unstructured":"Liu, J.W., Zhang, Z.H., Chen, X.F., et al.: Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans. Parallel Dist. Syst. 25(2), 332\u2013342 (2014)","journal-title":"IEEE Trans. Parallel Dist. Syst."},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"47_CR11","unstructured":"Beimel, A.: Secure schemes for secret sharing and key distribution. Ph.D. thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:44:40Z","timestamp":1559303080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}