{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:30:48Z","timestamp":1725489048565},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735465"},{"type":"electronic","value":"9783540735472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73547-2_7","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:54:52Z","timestamp":1186844092000},"page":"42-51","source":"Crossref","is-referenced-by-count":0,"title":["A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid"],"prefix":"10.1007","author":[{"given":"Yunfa","family":"Li","sequence":"first","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Jieyun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zongfen","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/S1363-4127(04)00016-0","volume":"9","author":"Y. Demchenko","year":"2004","unstructured":"Demchenko, Y.: Virtual organizations in computer grids and identity management. Information Security Technical Report\u00a09(1), 59\u201376 (2004)","journal-title":"Information Security Technical Report"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1049\/ip-cdt:19981599","volume":"145","author":"W. Lee","year":"1998","unstructured":"Lee, W., Chang, C.: Efficient Group Signature Scheme Based on the Discrete Logarithm. IEE Proceedings Computers & Digital Techniques\u00a0145(1), 15\u201318 (1998)","journal-title":"IEE Proceedings Computers & Digital Techniques"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1049\/el:19990071","volume":"35","author":"Y.M. Tseng","year":"1999","unstructured":"Tseng, Y M., Jan, J K.: Improved Group Signature Based on Discrete Logarithm Problem. Electronics Letters\u00a035(1), 37\u201338 (1999)","journal-title":"Electronics Letters"},{"issue":"16","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1323","DOI":"10.1049\/el:19990906","volume":"35","author":"H. Sun","year":"1999","unstructured":"Sun, H.: Comment: Improved Group Signature Scheme Based on Discrete Logarithm Problem. Electronics Letters\u00a035(16), 1323\u20131324 (1999)","journal-title":"Electronics Letters"},{"key":"7_CR6","unstructured":"Tseng, Y M., Jan, J K.: A Novel ID-based Group Signature. In: Proceedings of Workshop on Cryptology and Information Security at 1998 International Computer Symposium, Tainan, pp. 159\u2013164 (1998)"},{"issue":"2","key":"7_CR7","first-page":"36","volume":"XLV","author":"C. Popescu","year":"2000","unstructured":"Popescu, C.: A Modification of the Tseng-Jan Group Signature Scheme. Studia Universitatis Babes-Bolyai Informatica\u00a0XLV(2), 36\u201340 (2000)","journal-title":"Studia Universitatis Babes-Bolyai Informatica"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/978-3-540-30598-9_9","volume-title":"Security in Communication Networks","author":"J. Camenisch","year":"2005","unstructured":"Camenisch, J., Groth, J.: Group signatures: Better efficiency and new theoretical aspects. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 120\u2013133. Springer, Heidelberg (2005)"},{"issue":"5","key":"7_CR9","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/S0140-3664(97)00185-0","volume":"21","author":"Y.S. Chang","year":"1998","unstructured":"Chang, Y S., Wu, T C.: Group-oriented authentication mechanism with key exchange. Computer Communication\u00a021(5), 485\u2013497 (1998)","journal-title":"Computer Communication"},{"issue":"1-2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0304-3975(00)00184-5","volume":"269","author":"R. Safavi-Naini","year":"2001","unstructured":"Safavi-Naini, R., Wang, H.X.: Broadcast authentication for group communication. Theoretical Computer Science\u00a0269(1-2), 1\u201321 (2001)","journal-title":"Theoretical Computer Science"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73547-2_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:16:11Z","timestamp":1605762971000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73547-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735465","9783540735472"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73547-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}