{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:04Z","timestamp":1725535984150},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642030949"},{"type":"electronic","value":"9783642030956"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03095-6_25","type":"book-chapter","created":{"date-parts":[[2009,7,30]],"date-time":"2009-07-30T13:40:55Z","timestamp":1248961255000},"page":"242-253","source":"Crossref","is-referenced-by-count":0,"title":["Hierarchical Time-Bound Key Management for Mobile Agents"],"prefix":"10.1007","author":[{"given":"Yu-Fang","family":"Chung","sequence":"first","affiliation":[]},{"given":"Tzer-Shyong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chia-Chao","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Yi-Hsuan","family":"Yeh","sequence":"additional","affiliation":[]},{"given":"Hsiu-Chia","family":"Ko","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"25_CR1","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"S.G. Akl","year":"1983","unstructured":"Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems\u00a01(3), 239\u2013248 (1983)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"4","key":"25_CR2","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/S0097-8493(98)00035-1","volume":"22","author":"R. Volker","year":"1998","unstructured":"Volker, R., Mehrdad, J.S.: Access control and key management for mobile agents. Computer Graphics\u00a022(4), 457\u2013461 (1998)","journal-title":"Computer Graphics"},{"issue":"7","key":"25_CR3","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCOM.1998.689627","volume":"36","author":"A. Karmouch","year":"1998","unstructured":"Karmouch, A.: Mobile Software Agents for Telecommunications, Guest Editorial. IEEE Communications Magazine\u00a036(7), 24\u201325 (1998)","journal-title":"IEEE Communications Magazine"},{"issue":"5","key":"25_CR4","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.csi.2003.11.010","volume":"26","author":"I.C. Lin","year":"2004","unstructured":"Lin, I.C., Ou, H.H., Hwang, M.S.: Efficient access control and key management schemes for mobile agents. Computer Standards & Interfaces\u00a026(5), 423\u2013433 (2004)","journal-title":"Computer Standards & Interfaces"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Hohl, F.: A model of attacks malicious hosts against mobile agents. In: Proceedings of the 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, Brussels, Belgium, pp. 105\u2013120 (1998)","DOI":"10.1007\/3-540-49255-0_77"},{"key":"25_CR6","volume-title":"Programming and Deploying Java Mobile Agents with Aglets","author":"D.B. Lange","year":"1998","unstructured":"Lange, D.B., Oshima, M.: Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley Press, Massachusetts (1998)"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"issue":"177","key":"25_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation\u00a048(177), 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"25_CR9","unstructured":"Aydin, M.A., Aydin, G.Z.: A Survey of Elliptic Curve Cryptography 6(2), 211\u2013221 (2006)"},{"key":"25_CR10","unstructured":"Huang, K.H., Chung, Y.F., Liu, C.H., Lai, F., Chen, T.S.: Efficient migration for mobile computing in distributed networks,Computer Standards & Interfaces (2007) (in press)"},{"key":"25_CR11","unstructured":"Shieh, C.W.: An Efficient Design Of Elliptic Curve Cryptography Processor, Master\u2019s Thesis, Tatung University, Taipei (2006)"},{"key":"25_CR12","unstructured":"Wu, S.T.: Authentication and Group Secure Communications Using Elliptic Curve Cryptography, Doctoral Dissertation, National Taiwan University of Science and Technology, Taipei (2005)"},{"key":"25_CR13","unstructured":"Guan, D.J., Jen, L.h.: Study and Implementation of Elliptic Curve Cryptosystem, Master\u2019s Thesis, National Sun Yat-sen University of Technology, Kaohsiung (2005)"},{"issue":"10","key":"25_CR14","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1109\/TKDE.2004.59","volume":"16","author":"H.Y. Chien","year":"2004","unstructured":"Chien, H.Y.: Efficient Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Knowledge and Data Eng.\u00a016(10), 1301\u20131304 (2004)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"issue":"2","key":"25_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TDSC.2007.70241","volume":"5","author":"E. Bertino","year":"2008","unstructured":"Bertino, E., Shang, N., Wagstaff, S.S.: An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting. IEEE Trans. Actions on Dependable and Secure Computing\u00a05(2), 65\u201370 (2008)","journal-title":"IEEE Trans. Actions on Dependable and Secure Computing"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03095-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T02:57:35Z","timestamp":1552100255000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03095-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642030949","9783642030956"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03095-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}