{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:30Z","timestamp":1725558990322},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540241287"},{"type":"electronic","value":"9783540305668"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30566-8_99","type":"book-chapter","created":{"date-parts":[[2010,7,2]],"date-time":"2010-07-02T17:07:43Z","timestamp":1278090463000},"page":"858-865","source":"Crossref","is-referenced-by-count":5,"title":["A Novel Hierarchical Key Management Scheme Based on Quadratic Residues"],"prefix":"10.1007","author":[{"given":"Jue-Sam","family":"Chou","sequence":"first","affiliation":[]},{"given":"Chu-Hsing","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Ting-Ying","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"99_CR1","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.1016\/S0140-3664(97)00100-X","volume":"20","author":"C.H. Lin","year":"1997","unstructured":"Lin, C.H.: Dynamic key management schemes for access control in a hierarchy. Computer Communications\u00a020, 1381\u20131385 (1997)","journal-title":"Computer Communications"},{"key":"99_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/S0140-3664(98)00216-3","volume":"22","author":"N.Y. Lee","year":"1999","unstructured":"Lee, N.Y., Hwang, T.: Research note Comments on \u2018dynamic key management schemes for access control in a hierarchy\u2019. Computer Communications\u00a022, 87\u201389 (1999)","journal-title":"Computer Communications"},{"issue":"3","key":"99_CR3","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1080\/09720502.2002.10700323","volume":"5","author":"C.H. Lin","year":"2002","unstructured":"Lin, C.H., Lee, J.H.: An Efficient Hierarchical Key Management Scheme Based on Elliptic Curves. Journal of Interdisciplinary Mathematics\u00a05(3), 293\u2013301 (2002)","journal-title":"Journal of Interdisciplinary Mathematics"},{"key":"99_CR4","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1016\/0140-3664(96)81592-1","volume":"18","author":"C.C. Chang","year":"1995","unstructured":"Chang, C.C., Tsu, S.M.: Remote scheme for password authentication based on theory of quadratic residues. Computer Communications\u00a018, 936\u2013942 (1995)","journal-title":"Computer Communications"},{"key":"99_CR5","volume-title":"Elementary Number Theory and Its Applications","author":"K.H. Rosen","year":"1988","unstructured":"Rosen, K.H.: Elementary Number Theory and Its Applications. Addison-Wesley, Reading (1988)"},{"key":"99_CR6","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1016\/S0140-3664(99)00035-3","volume":"22","author":"K.J. Tan","year":"1999","unstructured":"Tan, K.J., Zhu, H.W.: Research note A conference key distribution scheme based on the theory of quadratic residues. Computer Communications\u00a022, 735\u2013738 (1999)","journal-title":"Computer Communications"},{"key":"99_CR7","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1023\/A:1008354106356","volume":"19","author":"N. Koblitz","year":"2000","unstructured":"Koblitz, N., Menezes, A., Vanstone, S.: The State of Elliptic curve Cryptography. Design, Codes and Cryptography\u00a019, 173\u2013193 (2000)","journal-title":"Design, Codes and Cryptography"},{"key":"99_CR8","unstructured":"Draft FIPS 180-2, Secure Hash Standard (SHS), U.S. Doc\/NIST, May 30 (2001)"},{"key":"99_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8592-7","volume-title":"A Course in Number Theory and Cryptography","author":"N. Koblitz","year":"1994","unstructured":"Koblitz, N.: A Course in Number Theory and Cryptography, 2nd edn. Springer, New York (1994)","edition":"2"},{"key":"99_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3198-2","volume-title":"Elliptic curve Public Key Cryptosystems","author":"A. Menezes","year":"1993","unstructured":"Menezes, A.: Elliptic curve Public Key Cryptosystems. Kluwer Academic Publishers, Dordrecht (1993)"},{"key":"99_CR11","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/0167-4048(90)90132-D","volume":"9","author":"L. Harn","year":"1990","unstructured":"Harn, L., Lin, L.Y.: A Cryptographic Key Generation Scheme for Multi-Level Data Security. Computer and Security\u00a09, 539\u2013546 (1990)","journal-title":"Computer and Security"},{"key":"99_CR12","unstructured":"Patterson, W.: Mathematical Cryptology for Computer Scientists and Mathematicians. Rowman (1987)"},{"key":"99_CR13","unstructured":"Fan, C.I., Lei, C.L.: Low Computation Partially Blind Signatures for Electronic Cash. IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences E81-A(5) (1998) (to appear)"}],"container-title":["Lecture Notes in Computer Science","Parallel and Distributed Processing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30566-8_99","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T15:34:58Z","timestamp":1558280098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30566-8_99"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540241287","9783540305668"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30566-8_99","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}