{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:08Z","timestamp":1725496208930},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540771128"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77115-9_35","type":"book-chapter","created":{"date-parts":[[2007,11,29]],"date-time":"2007-11-29T10:11:56Z","timestamp":1196331116000},"page":"327-335","source":"Crossref","is-referenced-by-count":0,"title":["A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols"],"prefix":"10.1007","author":[{"given":"Sangjin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Changyong","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Daeyoung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Heekuck","family":"Oh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"35_CR1","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/LCOMM.2005.1375241","volume":"9","author":"H. Sun","year":"2005","unstructured":"Sun, H., Hsieh, B., Hwang, H.: Secure E-mail Protocols Providing Perfect Forward Secrecy. IEEE Comm. Letters\u00a09(1), 58\u201360 (2005)","journal-title":"IEEE Comm. Letters"},{"key":"35_CR2","first-page":"77","volume-title":"Proc. of the IEEE Symp. on Security and Privacy","author":"F. Bao","year":"1998","unstructured":"Bao, F., Deng, H., Mao, W.: Identity-based Encryption from Weil pairing. In: Proc. of the IEEE Symp. on Security and Privacy, pp. 77\u201385. IEEE, Los Alamitos (1998)"},{"issue":"8","key":"35_CR3","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1109\/LCOMM.2005.1496593","volume":"9","author":"A.W. Dent","year":"2005","unstructured":"Dent, A.W.: Flaws in an E-Mail Protocol of Sun, Hsieh, and Hwang. IEEE Comm. Letters\u00a09(8), 718\u2013719 (2005)","journal-title":"IEEE Comm. Letters"},{"key":"35_CR4","unstructured":"Kim, B.H., Koo, J.H., Lee, D.H.: REP: A Robust E-Mail Protocol Providing Perfect Forward Secrecy. In: Proc. of the KIISC Chungcheong Regional Conf. KIISC, pp. 37\u201348 (2005)"},{"key":"35_CR5","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/S0020-0190(98)00167-7","volume":"68","author":"Y. Zheng","year":"1998","unstructured":"Zheng, Y., Imai, H.: How to Construct Efficient Signcryption Scheme on Elliptic Curves. Information Processing Letters\u00a068, 227\u2013233 (1998)","journal-title":"Information Processing Letters"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77115-9_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:00:56Z","timestamp":1619521256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77115-9_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540771128"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77115-9_35","relation":{},"subject":[]}}