{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:21:59Z","timestamp":1743121319130,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319453774"},{"type":"electronic","value":"9783319453781"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45378-1_56","type":"book-chapter","created":{"date-parts":[[2016,9,8]],"date-time":"2016-09-08T05:04:15Z","timestamp":1473311055000},"page":"647-660","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Fault-Tolerant Authenticated Key-Conference Agreement Protocol with Forward Secrecy"],"prefix":"10.1007","author":[{"given":"Tomasz","family":"Hyla","sequence":"first","affiliation":[]},{"given":"Jerzy","family":"Peja\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,9]]},"reference":[{"issue":"4","key":"56_CR1","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1109\/12.995447","volume":"51","author":"WG Tzeng","year":"2002","unstructured":"Tzeng, W.G.: A secure fault-tolerant conference-key agreement protocol. IEEE Trans. Comput. 51(4), 373\u2013379 (2002)","journal-title":"IEEE Trans. Comput."},{"issue":"7","key":"56_CR2","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1002\/sec.1089","volume":"8","author":"O Ermi\u015f","year":"2015","unstructured":"Ermi\u015f, O., Bahtityar, S., Anarim, E., \u00c7a\u011flayan, M.U.: An improved conference-key agreement protocol for dynamic groups with efficient fault correction. Secur. Commun. Netw. 8(7), 1347\u20131359 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"56_CR3","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1016\/j.jss.2006.10.053","volume":"80","author":"YM Tseng","year":"2007","unstructured":"Tseng, Y.M.: A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy. J. Syst. Softw. 80(7), 1091\u20131101 (2007)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"56_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JCN.2004.6596636","volume":"6","author":"KH Rhee","year":"2004","unstructured":"Rhee, K.H., Park, Y.H., Tsudik, G.: An architecture for key management in hierarchical mobile ad-hoc networks. J. Commun. Netw. 6(2), 1\u20137 (2004)","journal-title":"J. Commun. Netw."},{"key":"56_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"56_CR6","unstructured":"ANSI X9.63: Public key cryptography for the financial services industry: key agreement and key transport using Elliptic Curve cryptography. ANSI (2001)"},{"issue":"4","key":"56_CR7","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1093\/comjnl\/bxh111","volume":"48","author":"YM Tseng","year":"2005","unstructured":"Tseng, Y.M.: A robust multi-party key agreement protocol resistant to malicious participants. Comput. J. 48(4), 480\u2013487 (2005)","journal-title":"Comput. J."},{"key":"56_CR8","doi-asserted-by":"crossref","unstructured":"Katz, J., Shin, J.S.: Modelling insider attacks on group key exchange protocols. In: ACM Conference on Computer and Communications Security, pp. 180\u2013189 (2005)","DOI":"10.1145\/1102120.1102146"},{"key":"56_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/11602897_26","volume-title":"Information and Communications Security","author":"Q Tang","year":"2005","unstructured":"Tang, Q., Mitchell, C.J.: Security properties of two authenticated conference key agreement protocols. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 304\u2013314. Springer, Heidelberg (2005)"},{"issue":"11","key":"56_CR10","doi-asserted-by":"publisher","first-page":"2125","DOI":"10.1002\/sec.924","volume":"7","author":"YF Chung","year":"2013","unstructured":"Chung, Y.F.: The design of authentication key protocol in certificate-free public key cryptosystem. Secur. Commun. Netw. 7(11), 2125\u20132133 (2013)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"56_CR11","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1002\/dac.2506","volume":"26","author":"ZY Cheng","year":"2013","unstructured":"Cheng, Z.Y., Liu, Y., Chang, C.C., Guo, C.: A fault-tolerant group key agreement protocol exploiting dynamic setting. Int. J. Commun. Syst. 26(2), 259\u2013275 (2013)","journal-title":"Int. J. Commun. Syst."},{"key":"56_CR12","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1016\/j.comcom.2010.01.001","volume":"33","author":"J Zhao","year":"2010","unstructured":"Zhao, J., Gu, D., Li, Y.: An efficient fault-tolerant group key agreement protocol. Comput. Commun. 33, 890\u2013895 (2010)","journal-title":"Comput. Commun."},{"issue":"2","key":"56_CR13","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.csi.2008.05.015","volume":"31","author":"KH Huang","year":"2009","unstructured":"Huang, K.H., Chung, Y.F., Lee, H.H., Lai, F., Chen, T.S.: A conference key agreement protocol with fault-tolerant capability. Comput. Stand. Interfaces 31(2), 401\u2013405 (2009)","journal-title":"Comput. Stand. Interfaces"},{"key":"56_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-642-01001-9_9","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"Q Wu","year":"2009","unstructured":"Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153\u2013170. Springer, Heidelberg (2009)"},{"issue":"2","key":"56_CR15","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1002\/sec.414","volume":"9","author":"Z Wang","year":"2016","unstructured":"Wang, Z.: Improvement on the fault-tolerant group key agreement protocol of Zhao et al. Sec. Commun. Netw. 9(2), 166\u2013170 (2016)","journal-title":"Sec. Commun. Netw."},{"issue":"1","key":"56_CR16","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s00145-006-0361-5","volume":"20","author":"J Katz","year":"2007","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. J. Cryptol. 20(1), 85\u2013113 (2007)","journal-title":"J. Cryptol."},{"key":"56_CR17","doi-asserted-by":"publisher","first-page":"275","DOI":"10.15388\/Informatica.2005.098","volume":"16","author":"YM Tseng","year":"2005","unstructured":"Tseng, Y.M.: An improved conference-key agreement protocol with forward secrecy. Informatica 16, 275\u2013284 (2005). Lithuania Academy of Sciences","journal-title":"Informatica"},{"key":"56_CR18","doi-asserted-by":"publisher","DOI":"10.1142\/5885","volume-title":"Basics of Contemporary Cryptography for IT Practioners","author":"B Ryabko","year":"2005","unstructured":"Ryabko, B., Fionov, A.: Basics of Contemporary Cryptography for IT Practioners. World Scientific Publishing Co. Pte. Ltd., Hackensack (2005)"},{"key":"56_CR19","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010756","volume-title":"Introduction to Modern Cryptography: Principles and Protocols","author":"J Katz","year":"2007","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman and Hall\/CRC, Boca Raton (2007)"},{"key":"56_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-642-37682-5_32","volume-title":"Information Security and Cryptology \u2013 ICISC 2012","author":"S Chatterjee","year":"2013","unstructured":"Chatterjee, S., Kamath, C., Kumar, V.: Galindo-Garcia identity-based signature revisited. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 456\u2013471. Springer, Heidelberg (2013)"},{"issue":"4","key":"56_CR21","first-page":"1","volume":"74","author":"S Chatterjee","year":"2015","unstructured":"Chatterjee, S., Kamath, Ch.: A closer look at multiple forking: leveraging (in)dependence for a tighter bound. Algorithmica 74(4), 1\u201342 (2015)","journal-title":"Algorithmica"},{"issue":"12","key":"56_CR22","first-page":"2231","volume":"8","author":"CC Lee","year":"2014","unstructured":"Lee, C.C., Li, C.T., Wu, C.Y., Huang, S.Y.: An enhanced fault-tolerant conference key agreement protocol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 8(12), 2231\u20132235 (2014)","journal-title":"Int. J. Comput. Electr. Autom. Control Inf. Eng."},{"key":"56_CR23","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-662-44893-9_14","volume-title":"Cryptography and Security Systems","author":"I El Fray","year":"2014","unstructured":"El Fray, I., Hyla, T., Kurkowski, M., Ma\u0107k\u00f3w, W., Peja\u015b, J.: Practical authentication protocols for protecting and sharing sensitive information on mobile devices. In: Kotulski, Z., Ksi\u0119\u017copolski, B., Mazur, K. (eds.) CSS 2014. CCIS, vol. 448, pp. 153\u2013165. Springer, Heidelberg (2014)"},{"key":"56_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1007\/978-3-662-45237-0_58","volume-title":"Computer Information Systems and Industrial Management","author":"I El Fray","year":"2014","unstructured":"El Fray, I., Hyla, T., Chocianowicz, W.: Protection profile for secure sensitive information system on mobile devices. In: Saeed, K., Sn\u00e1\u0161el, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 636\u2013650. Springer, Heidelberg (2014)"},{"key":"56_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-33260-9_3","volume-title":"Computer Information Systems and Industrial Management","author":"T Hyla","year":"2012","unstructured":"Hyla, T., Peja\u015b, J.: Certificate-based encryption scheme with general access structure. In: Cortesi, A., Chaki, N., Saeed, K., Wierzcho\u0144, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 41\u201355. Springer, Heidelberg (2012)"},{"key":"56_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-40925-7_19","volume-title":"Computer Information Systems and Industrial Management","author":"T Hyla","year":"2013","unstructured":"Hyla, T., Peja\u015b, J.: A practical certificate and identity based encryption scheme and related security architecture. In: Saeed, K., Chaki, R., Cortesi, A., Wierzcho\u0144, S. (eds.) CISIM 2013. LNCS, vol. 8104, pp. 190\u2013205. Springer, Heidelberg (2013)"},{"key":"56_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/978-3-662-45237-0_59","volume-title":"Computer Information Systems and Industrial Management","author":"T Hyla","year":"2014","unstructured":"Hyla, T., Ma\u0107k\u00f3w, W., Peja\u015b, J.: Implicit and explicit certificates-based encryption scheme. In: Saeed, K., Sn\u00e1\u0161el, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 651\u2013666. Springer, Heidelberg (2014)"},{"key":"56_CR28","unstructured":"IEEE Standard 1363.3 \u2013 2013 \u2013 IEEE Standard for Identity-Based Cryptographic Techniques Using Pairings (2013)"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45378-1_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T08:11:10Z","timestamp":1719303070000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45378-1_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319453774","9783319453781"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45378-1_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"9 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Computer Information Systems and Industrial Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vilnius","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisim2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}