{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:23:45Z","timestamp":1743114225817,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723945"},{"type":"electronic","value":"9783319723952"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72395-2_10","type":"book-chapter","created":{"date-parts":[[2017,12,8]],"date-time":"2017-12-08T04:56:41Z","timestamp":1512709001000},"page":"97-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Anonymous Identity-Based Authentication Scheme in Vector Network"],"prefix":"10.1007","author":[{"given":"Jie","family":"Yu","sequence":"first","affiliation":[]},{"given":"Mangui","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,9]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Yoon, H.S.: A large-scale ATM switch: analysis, simulation and implementation. In: 1st IEEE International Conference on ATM, ICATM 1998, pp. 459\u2013464. IEEE (1998)","key":"10_CR1","DOI":"10.1109\/ICATM.1998.688213"},{"key":"10_CR2","volume-title":"QoS and Traffic Management in IP and ATM Networks","author":"D McDysan","year":"2000","unstructured":"McDysan, D.: QoS and Traffic Management in IP and ATM Networks. McGraw-Hill Companies, Inc., New York City (2000)"},{"key":"10_CR3","volume-title":"MPLS Technology and Applications","author":"B Davie","year":"2000","unstructured":"Davie, B., Rekhter, Y.: MPLS Technology and Applications. Morgan Kaufmann Publishers, Burlington (2000)"},{"unstructured":"Liang, M., Zhang, J., Wang, S.: A new network based on vector address. In: ICWMMN 2008 Proceedings (2008)","key":"10_CR4"},{"unstructured":"Liang, M.: Coding method of vector network address. US Patent No. 12\/304,435, 27 Dec 2007","key":"10_CR5"},{"key":"10_CR6","first-page":"11","volume":"1","author":"ZW Wang","year":"2011","unstructured":"Wang, Z.W., Liang, M.G.: Vector label switching (VLS): a high-performance switching architecture for future internet. J. Internet Technol. 1, 11\u201313 (2011)","journal-title":"J. Internet Technol."},{"key":"10_CR7","first-page":"11","volume":"9","author":"ZW Wang","year":"2011","unstructured":"Wang, Z.W., Liang, M.G.: Vector address switching: an energy-effective next-generation switching technology for internet. Tamkang J. Sci. Eng. 9, 11\u201313 (2011)","journal-title":"Tamkang J. Sci. Eng."},{"unstructured":"Qi, G., Liang, M.: Research and design of layering accessing authentication based on RSA in vector network. In: Cross-Strait Conference on Information Science and Technology, Qinhuangdao, People\u2019s Republic of China, 9\u201311 July 2010, pp. 234\u2013237 (2010)","key":"10_CR8"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). \nhttps:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"doi-asserted-by":"crossref","unstructured":"Kuzhalvaimozhi, S., Rao, G.R.: Privacy protection in cloud using identity based group signature. In: Applications of Digital Information and Web Technologies, pp. 75\u201380. IEEE (2014)","key":"10_CR10","DOI":"10.1109\/ICADIWT.2014.6814670"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/11761679_27","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Gentry","year":"2006","unstructured":"Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445\u2013464. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11761679_27"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41\u201355. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-28628-8_3"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-540-30539-2_26","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"L Nguyen","year":"2004","unstructured":"Nguyen, L., Safavi-Naini, R.: Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 372\u2013386. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-30539-2_26"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/978-3-540-30574-3_11","volume-title":"Topics in Cryptology \u2013 CT-RSA 2005","author":"M Bellare","year":"2005","unstructured":"Bellare, M., Shi, H., Zhang, C.: Foundations of group signatures: the case of dynamic groups. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 136\u2013153. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/978-3-540-30574-3_11"},{"doi-asserted-by":"crossref","unstructured":"Chen, P., et al.: An escrow-free hierarchical identity-based signature scheme from composite order bilinear groups. In: International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 364\u2013369. IEEE Computer Society (2015)","key":"10_CR15","DOI":"10.1109\/BWCCA.2015.9"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-642-11799-2_27","volume-title":"Theory of Cryptography","author":"A Lewko","year":"2010","unstructured":"Lewko, A., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 455\u2013479. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-11799-2_27"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72395-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T04:07:17Z","timestamp":1512965237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72395-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723945","9783319723952"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72395-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}