{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:40:28Z","timestamp":1739997628884,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121555"},{"type":"electronic","value":"9783642121562"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12156-2_45","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:30:27Z","timestamp":1270063827000},"page":"599-609","source":"Crossref","is-referenced-by-count":4,"title":["On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs"],"prefix":"10.1007","author":[{"given":"Chun-Ta","family":"Li","sequence":"first","affiliation":[]},{"given":"Cheng-Chi","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Lian-Jun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"45_CR1","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1016\/j.comnet.2008.03.004","volume":"52","author":"M.-C. Chan","year":"2008","unstructured":"Chan, M.-C., Hu, S.-Y., Jiang, J.-R.: An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games. Computer Networks\u00a052(9), 1838\u20131845 (2008)","journal-title":"Computer Networks"},{"key":"45_CR2","doi-asserted-by":"crossref","unstructured":"Corman, A., Douglas, S., Schachte, P., Teague, V.: A seucre event agreement (SEA) protocol for peer-to-peer games. In: The First International Conference on Availability, Reliability and Security (2006)","DOI":"10.1109\/ARES.2006.15"},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Dickey, C., Zappala, D., Lo, V., Marr, J.: Low lattency and cheat-proof event ordering for peer-to-peer games. In: Proceedings of the ACM International Workshop on Network and Operating System Support for Digital Audio and Video, pp. 134\u2013139 (2004)","DOI":"10.1145\/1005847.1005877"},{"issue":"18","key":"45_CR4","doi-asserted-by":"publisher","first-page":"4255","DOI":"10.1016\/j.comcom.2008.06.002","volume":"31","author":"C.-T. Li","year":"2008","unstructured":"Li, C.-T., Hwang, M.-S., Chu, Y.-P.: Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Computer Communications\u00a031(18), 4255\u20134258 (2008)","journal-title":"Computer Communications"},{"issue":"12","key":"45_CR5","doi-asserted-by":"publisher","first-page":"2803","DOI":"10.1016\/j.comcom.2007.12.005","volume":"31","author":"C.-T. Li","year":"2008","unstructured":"Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks. Computer Communications\u00a031(12), 2803\u20132814 (2008)","journal-title":"Computer Communications"},{"issue":"10","key":"45_CR6","doi-asserted-by":"publisher","first-page":"2534","DOI":"10.1016\/j.comcom.2008.03.018","volume":"31","author":"C.-T. Li","year":"2008","unstructured":"Li, C.-T., Hwang, M.-S., Liu, C.-Y.: An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks. Computer Communications\u00a031(10), 2534\u20132540 (2008)","journal-title":"Computer Communications"},{"issue":"3","key":"45_CR7","first-page":"227","volume":"23","author":"C.-T. Li","year":"2008","unstructured":"Li, C.-T., Hwang, M.-S., Chu, Y.-P.: Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. International Journal of Computer Systems Science and Engineering\u00a023(3), 227\u2013234 (2008)","journal-title":"International Journal of Computer Systems Science and Engineering"},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Li, C.-T., Hwang, M.-S., Lai, Y.-C.: A Verifiable Electronic Voting Scheme Over the Internet. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 449\u2013454 (2009)","DOI":"10.1109\/ITNG.2009.93"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Li, C.-T., Hwang, M.-S.: Improving the Security of Non-PKI Methods for Public Key Distribution. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 1695\u20131696 (2009)","DOI":"10.1109\/ITNG.2009.92"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Wei, C.-H., Chin, Y.-H., Li, C.-T.: A Secure Billing Protocol for Grid Computing. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 320\u2013325 (2009)","DOI":"10.1109\/ITNG.2009.94"},{"key":"45_CR11","doi-asserted-by":"crossref","unstructured":"Li, C.-T.: An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards. In: 5th International Conference on Information Assurance and Security, pp. 517\u2013520 (2009)","DOI":"10.1109\/IAS.2009.17"},{"key":"45_CR12","unstructured":"Li, C.-T., Hwang, M.-S.: An Online Biometrics-based Secret Sharing Scheme for Multiparty Cryptosystem Using Smart Cards. International Journal of Innovative Computing, Information and Control (2009) (article in press)"},{"issue":"2","key":"45_CR13","first-page":"166","volume":"8","author":"C.-T. Li","year":"2009","unstructured":"Li, C.-T., Chu, Y.-P.: Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks. International Journal of Network Security\u00a08(2), 166\u2013168 (2009)","journal-title":"International Journal of Network Security"},{"issue":"3","key":"45_CR14","first-page":"17","volume":"20","author":"C.-T. Li","year":"2009","unstructured":"Li, C.-T.: An Efficient and Secure Communication Scheme for Trusted Computing Environments. Journal of Computers\u00a020(3), 17\u201324 (2009)","journal-title":"Journal of Computers"},{"issue":"8","key":"45_CR15","first-page":"2107","volume":"5","author":"C.-T. Li","year":"2009","unstructured":"Li, C.-T., Hwang, M.-S., Chu, Y.-P.: An Efficient Sensor-To-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks. International Journal of Innovative Computing, Information and Control\u00a05(8), 2107\u20132124 (2009)","journal-title":"International Journal of Innovative Computing, Information and Control"},{"issue":"12","key":"45_CR16","first-page":"4715","volume":"5","author":"C.-T. Li","year":"2009","unstructured":"Li, C.-T., Wei, C.-H., Chin, Y.-H.: A Secure Event Update Protocol for Peer-To-Peer Massively Multiplayer Online Games Against Masquerade Attacks. International Journal of Innovative Computing, Information and Control\u00a05(12(A)), 4715\u20134723 (2009)","journal-title":"International Journal of Innovative Computing, Information and Control"},{"issue":"1","key":"45_CR17","first-page":"201","volume":"5","author":"C.-T. Li","year":"2010","unstructured":"Li, C.-T., Lee, C.-C., Wang, L.-J.: A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels. Journal of Information Assurance and Security\u00a05(1), 201\u2013208 (2010)","journal-title":"Journal of Information Assurance and Security"},{"key":"45_CR18","unstructured":"Li, C.-T., Wei, C.-H., Lee, C.-C., Chin, Y.-H., Wang, L.-J.: A Secure and Undeniable Billing Protocol among Charged Parties for Grid Computing Environments. International Journal of Innovative Computing, Information and Control (2010) (article in press)"},{"issue":"1","key":"45_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"C.-T. Li","year":"2010","unstructured":"Li, C.-T., Hwang, M.-S.: An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards. Journal of Network and Computer Applications\u00a033(1), 1\u20135 (2010)","journal-title":"Journal of Network and Computer Applications"},{"key":"45_CR20","unstructured":"Li, C.-T., Hwang, M.-S.: A Batch Verifying and Detecting the Illegal Signatures. International Journal of Innovative Computing, Information and Control (2010) (article in press)"},{"key":"45_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-540-74484-9_24","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2007","author":"M.-S. Hwang","year":"2007","unstructured":"Hwang, M.-S., Tzeng, S.-F., Li, C.-T.: A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol.\u00a04707, pp. 273\u2013284. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12156-2_45.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:12:29Z","timestamp":1739995949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12156-2_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121555","9783642121562"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12156-2_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}