{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:39:52Z","timestamp":1725867592677},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319474212"},{"type":"electronic","value":"9783319474229"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47422-9_14","type":"book-chapter","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T21:26:41Z","timestamp":1476221201000},"page":"244-254","source":"Crossref","is-referenced-by-count":1,"title":["Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message"],"prefix":"10.1007","author":[{"given":"Yong","family":"Xie","sequence":"first","affiliation":[]},{"given":"Libing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yubo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhiyan","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,13]]},"reference":[{"issue":"17","key":"14_CR1","doi-asserted-by":"crossref","first-page":"3167","DOI":"10.1002\/sec.1241","volume":"8","author":"H Sun","year":"2015","unstructured":"Sun, H., Wen, Q., Zhang, H., Jin, Z.: A strongly secure identity-based authenticated key agreement protocol without pairings under the gdh assumption. Secur. Commun. Netw. 8(17), 3167\u20133179 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"14_CR2","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.ins.2014.05.041","volume":"281","author":"KKR Choo","year":"2014","unstructured":"Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281, 182\u2013200 (2014)","journal-title":"Inf. Sci."},{"issue":"3","key":"14_CR3","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1007\/s11277-015-2815-2","volume":"85","author":"SK Hafizul Islam","year":"2015","unstructured":"Hafizul Islam, S.K., Singh, A.: Provably secure one-round certificateless authenticated group key agreement protocol for secure communications. Wirel. Pers. Commun. 85(3), 879\u2013898 (2015)","journal-title":"Wirel. Pers. Commun."},{"key":"14_CR4","unstructured":"Zhu, Z., et al.: Cryptanalysis of pairing-free certificateless authenticated key agreement protocol. IACR Cryptology ePrint Archive, p. 253 (2012)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-10628-6_4","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"C Swanson","year":"2009","unstructured":"Swanson, C., Jao, D.: A study of two-party certificateless authenticated key-agreement protocols. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 57\u201371. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-10628-6_4"},{"issue":"2","key":"14_CR6","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1002\/dac.1265","volume":"25","author":"D He","year":"2012","unstructured":"He, D., Chen, J., Jin, H.: A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst. 25(2), 221\u2013230 (2012)","journal-title":"Int. J. Commun. Syst."},{"key":"14_CR7","unstructured":"Kim, Y.-J., Kim, Y.-M., Choe, Y.-J.: An efficient bilinear pairing-free certificateless two-party authenticated key agreement protocol in the eCK model. arXiv preprint arXiv:1304.0383 (2013)"},{"issue":"2","key":"14_CR8","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1504\/IJAHUC.2016.075187","volume":"21","author":"S Bala","year":"2016","unstructured":"Bala, S., Verma, A.K.: A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks. Int. J. Ad Hoc Ubiquit. Comput. 21(2), 140\u2013155 (2016)","journal-title":"Int. J. Ad Hoc Ubiquit. Comput."},{"issue":"1","key":"14_CR9","first-page":"71","volume":"45","author":"H-Y Lin","year":"2016","unstructured":"Lin, H.-Y.: Secure certificateless two-party key agreement with short message. Inf. Technol. Contr. 45(1), 71\u201376 (2016)","journal-title":"Inf. Technol. Contr."},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-75670-5_1","volume-title":"Provable Security","author":"B LaMacchia","year":"2007","unstructured":"LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1\u201316. Springer, Heidelberg (2007)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","first-page":"285","volume-title":"Information Security","author":"JK Liu","year":"2008","unstructured":"Liu, J.K., Baek, J., Susilo, W., Zhou, J.: Certificate-based signature schemes without pairings or random oracles. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 285\u2013297. Springer, Heidelberg (2008)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Xiong, X., Wong, D.S., Deng, X.: Tinypairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Wireless Communications and Networking Conference (WCNC 2010), pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/WCNC.2010.5506580"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47422-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:53:18Z","timestamp":1498337598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47422-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319474212","9783319474229"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47422-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}