{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:52:38Z","timestamp":1725594758912},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642225765"},{"type":"electronic","value":"9783642225772"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22577-2_62","type":"book-chapter","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T08:41:43Z","timestamp":1309941703000},"page":"455-460","source":"Crossref","is-referenced-by-count":8,"title":["Elliptic Curve Cryptography: Current Status and Research Challenges"],"prefix":"10.1007","author":[{"given":"Sheetal","family":"Kalra","sequence":"first","affiliation":[]},{"given":"Sandeep K.","family":"Sood","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","doi-asserted-by":"crossref","unstructured":"Azim, M.A., Jamalipour, A.: An Efficient Elliptic Curve Cryptography based Authenticated Key Agreement Protocol for Wireless LAN Security. In: IEEE International Conference on High Performance Switching and Routing (2005)","DOI":"10.1109\/HPSR.2005.1503258"},{"key":"62_CR2","doi-asserted-by":"crossref","unstructured":"Wang, Y., Ramamurthy, B., Zou, X.: The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks. In: IEEE International Conference on Communication (2006)","DOI":"10.1109\/ICC.2006.255104"},{"key":"62_CR3","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1016\/j.jpdc.2010.03.009","volume":"70","author":"M.M. Rahman","year":"2010","unstructured":"Rahman, M.M., El-Khatib, K.: Private key agreement and secure communication for heterogeneous sensor networks. J. Parallel and Distributed Computing\u00a070, 858\u2013870 (2010)","journal-title":"J. Parallel and Distributed Computing"},{"key":"62_CR4","doi-asserted-by":"crossref","unstructured":"Juang, W.S., Chen, S.T., Liaw, H.T.: Robust and Efficient Password \u2013Authenticated Key Agreement Using Smart Cards. IEEE Transactions on Industrial Electronics\u00a055(6) (2008)","DOI":"10.1109\/TIE.2008.921677"},{"key":"62_CR5","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.cose.2008.11.008","volume":"28","author":"J.H. Yang","year":"2009","unstructured":"Yang, J.H., Chang, C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystems. J. Computer & Security\u00a028, 138\u2013143 (2009)","journal-title":"J. Computer & Security"},{"key":"62_CR6","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.jss.2009.03.075","volume":"82","author":"J.H. Yang","year":"2009","unstructured":"Yang, J.H., Chang, C.C.: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Systems and Software\u00a082, 1497\u20131502 (2009)","journal-title":"J. Systems and Software"},{"key":"62_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/S0920-5489(03)00069-2","volume":"26","author":"S.F. Tzeng","year":"2004","unstructured":"Tzeng, S.F., Hwang, M.S.: Digital Signatures with message recovery and its variants based on elliptic curve discrete logarithm problem. J. Computer Standards & Interface\u00a026, 61\u201371 (2004)","journal-title":"J. Computer Standards & Interface"},{"key":"62_CR8","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.csi.2004.03.011","volume":"27","author":"S. Zuhua","year":"2004","unstructured":"Zuhua, S.: Improvement of digital signatures with message recovery and its variants based on elliptic curve discrete logarithm problem. J. Computer Standards & Interface\u00a027, 61\u201369 (2004)","journal-title":"J. Computer Standards & Interface"},{"issue":"6","key":"62_CR9","first-page":"527","volume":"22","author":"T.S. Chen","year":"2003","unstructured":"Chen, T.S., Chung, Y.F., Huang, G.S.: Efficient proxy multisignature scheme based on the elliptic curve cryptosystem. Computer & Society\u00a022(6), 527\u2013534 (2003)","journal-title":"Computer & Society"},{"key":"62_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/S0920-5489(03)00075-8","volume":"26","author":"M.S. Hwang","year":"2004","unstructured":"Hwang, M.S., Tzeng, S.F., Tsai, C.S.: Generalization of proxy signature based on elliptic curves. J. Computer Standards & Interface\u00a026, 73\u201384 (2004)","journal-title":"J. Computer Standards & Interface"},{"key":"62_CR11","volume-title":"International Conference on Computer and Communications Security","author":"X. Sun","year":"2009","unstructured":"Sun, X., Xia, M.: An improved Proxy Signature Scheme Based on Elliptic Curve Cryptography. In: International Conference on Computer and Communications Security. IEEE Computer Society, Los Alamitos (2009)"},{"key":"62_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.csi.2004.02.003","volume":"27","author":"T.S. Chen","year":"2004","unstructured":"Chen, T.S.: A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem. J. Computer Standards & Interface\u00a027, 33\u201338 (2004)","journal-title":"J. Computer Standards & Interface"},{"key":"62_CR13","volume-title":"International Conference on Networking and Digital Society","author":"P. Jianfen","year":"2010","unstructured":"Jianfen, P., Yajian, Z., Cong, W., Yixian, Y.: An application of Modified Optimal \u2013Type Elliptic Curve Blind Signature Scheme to Threshold Signature. In: International Conference on Networking and Digital Society. IEEE, Los Alamitos (2010)"},{"key":"62_CR14","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.csi.2003.11.008","volume":"26","author":"T.S. Chen","year":"2004","unstructured":"Chen, T.S., Huang, K.H., Chung, Y.F.: A practical authenticated encryption scheme based on the elliptic curve cryptosystems. Computer Standards & Interface\u00a026, 461\u2013469 (2004)","journal-title":"Computer Standards & Interface"}],"container-title":["Communications in Computer and Information Science","High Performance Architecture and Grid Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22577-2_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T18:32:29Z","timestamp":1553884349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22577-2_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642225765","9783642225772"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22577-2_62","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}