{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:45:30Z","timestamp":1725486330480},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540476900"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68217-2_9","type":"book-chapter","created":{"date-parts":[[2007,6,18]],"date-time":"2007-06-18T08:06:41Z","timestamp":1182154001000},"page":"71-80","source":"Crossref","is-referenced-by-count":2,"title":["Evaluation of Real-Time Aspects of Multiparty Security on Low-Power Mobile Devices"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Limmer","sequence":"first","affiliation":[]},{"given":"Falko","family":"Dressler","sequence":"additional","affiliation":[]},{"given":"Ruben","family":"Gonzalez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM archive, Volume 21, Issue 2, pp. 120\u2013126, 1978","journal-title":"Communications of the ACM archive"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"D. Boneh et al., Generating RSA Keys on a Handheld Using an Untrusted Server. RSA 2000","DOI":"10.1007\/3-540-44495-5_24"},{"issue":"29-31","key":"9_CR3","first-page":"532","volume":"2","author":"Y. Lei","year":"2004","unstructured":"Yu Lei, Deren Chen, Zhongding Jiang, Generating digital signatures on mobile devices. 18th International Conference on Advanced Information Networking and Applications, AINA 2004. Volume 2, 29-31, pp. 532\u2013535, 2004","journal-title":"Generating digital signatures on mobile devices"},{"key":"9_CR4","first-page":"417","volume":"218","author":"V. S. Miller","year":"1985","unstructured":"V. S. Miller, Use of Elliptic Curves in Cryptography. Advances in Cryptology-CRYPTO, LNCS, Volume 218, pp. 417\u2013426, 1985","journal-title":"Advances in Cryptology-CRYPTO, LNCS"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz, Elliptic Curve Cryptosystems. Mathematics of Computation, Volume 48, pp. 203\u2013209, 1987","journal-title":"Mathematics of Computation"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Arjen K. Lenstra and Eric R. Verheul, The XTR Public Key System. Lecture Notes in Computer Science, Volume 1880, 2000","DOI":"10.1007\/3-540-44598-6_1"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"H. Harney and C. Muckenhirn, RFC 2093: Group Key Manag. Protocol (GKMP) Specification. Network Working Group, 1997","DOI":"10.17487\/rfc2093"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"M. Steiner et al., Diffie-Hellman Key Distribution Extended to Group Communication. Proceedings of the 3rd ACM conference on Computer and communications security, pp. 31\u201337, 1996","DOI":"10.1145\/238168.238182"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"M. Burmester and Y. Desmedt, A Secure and Efficient Conference Key Distribution System. In Proceedings of Eurocrypt 1994, pp. 275\u2013286, 1994","DOI":"10.1007\/BFb0053443"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"M. Just and S. Vaudenay, Authenticated Multi-Party Key Agreement. Proceedings of the Int. Conference on the Theory and Applications of Cryptology and Inf. Security: Advances in Cryptology, pp. 36\u201349, 1996","DOI":"10.1007\/BFb0034833"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"E. Bresson et al., Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices. 5th IEEE MWCN, 2003","DOI":"10.1142\/9789812791146_0013"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Y. Kim et al., Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. Proceedings of the 7th ACM conference on Computer and communications security, pp. 235\u2013244, 2000","DOI":"10.1145\/352600.352638"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"M.A. Strangio, Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves. SAC '05, pp. 324\u2013331, 2005","DOI":"10.1145\/1066677.1066755"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"C. Popescu, A Secure Key Agreement Protocol Using Elliptic Curves. International Journal of Computers and Applications, Volume 27, 2005","DOI":"10.2316\/Journal.202.2005.3.202-1501"}],"container-title":["Informatik aktuell","Echtzeitsysteme im Alltag"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68217-2_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:09:27Z","timestamp":1605744567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68217-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540476900"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68217-2_9","relation":{},"subject":[]}}