{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:33:54Z","timestamp":1768314834087,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642003059","type":"print"},{"value":"9783642003066","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00306-6_9","type":"book-chapter","created":{"date-parts":[[2009,2,17]],"date-time":"2009-02-17T06:15:44Z","timestamp":1234851344000},"page":"115-129","source":"Crossref","is-referenced-by-count":4,"title":["Cryptanalysis of Mu et al.\u2019s and Li et al.\u2019s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme"],"prefix":"10.1007","author":[{"given":"S. Sharmila Deva","family":"Selvi","sequence":"first","affiliation":[]},{"given":"S. Sree","family":"Vivek","sequence":"additional","affiliation":[]},{"given":"Ragavendran","family":"Gopalakrishnan","sequence":"additional","affiliation":[]},{"given":"Naga Naresh","family":"Karuturi","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Aparna, R., Amberker, B.B.: Authenticated secure group communication using broadcast encryption key computation. In: ITNG 2008: Fifth International Conference on Information Technology - New Generations, pp. 348\u2013353 (April 2008)","DOI":"10.1109\/ITNG.2008.84"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Bohio, M.J., Miri, A.: An authenticated broadcasting scheme for wireless ad hoc network. In: 2nd Annual Conference on Communication Networks and Services Research (CNSR), pp. 69\u201374 (2004)","DOI":"10.1109\/DNSR.2004.1344713"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Kanazawa, F., Ohkawa, N., Doi, H., Okamoto, T., Okamoto, E.: Broadcast encryption with sender authentication and its duality. In: International Conference on Convergence Information Technology 2007, pp. 793\u2013798 (November 2007)","DOI":"10.1109\/ICCIT.2007.192"},{"issue":"1-2","key":"9_CR4","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.csi.2007.08.005","volume":"30","author":"F. Li","year":"2008","unstructured":"Li, F., Xin, X., Hu, Y.: Indentity-based broadcast signcryption. Computer Standards and Interfaces\u00a030(1-2), 89\u201394 (2008)","journal-title":"Computer Standards and Interfaces"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-540-30502-6_12","volume-title":"Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making","author":"Y. Mu","year":"2004","unstructured":"Mu, Y., Susilo, W., Lin, Y.-X., Ruan, C.: Identity-based authenticated broadcast encryption and distributed authenticated encryption. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol.\u00a03321, pp. 169\u2013181. Springer, Heidelberg (2004)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Sharmila Deva Selvi, S., Sree Vivek, S., Naresh Karuturi, N., Gopalakrishnan, R., Pandu Rangan, C.: Cryptanalysis of bohio et al.\u2019s id-based broadcast signcryption scheme for wireless ad-hoc networks. In: Proceedings of Sixth Annual Conference on Privacy, Security and Trust, PST 2008 (2008)","DOI":"10.1109\/PST.2008.29"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"How Tan, C., Ming Teo, J.C., Amundsen, J.-A.: Authenticated broadcast encryption scheme. In: AINAW 2007: 21st International Conference Advanced Information Networking and Applications Workshops, vol.\u00a01, pp. 512\u2013518 (May 2007)","DOI":"10.1109\/AINAW.2007.104"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00306-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T22:34:51Z","timestamp":1558132491000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00306-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642003059","9783642003066"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00306-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}