{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:20:54Z","timestamp":1725600054756},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642226021"},{"type":"electronic","value":"9783642226038"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22603-8_1","type":"book-chapter","created":{"date-parts":[[2011,8,9]],"date-time":"2011-08-09T12:35:07Z","timestamp":1312893307000},"page":"1-15","source":"Crossref","is-referenced-by-count":1,"title":["Combining Mediated and Identity-Based Cryptography for Securing E-Mail"],"prefix":"10.1007","author":[{"given":"Sufyan T.","family":"Faraj Al-Janabi","sequence":"first","affiliation":[]},{"given":"Hussein Khalid","family":"Abd-alrazzaq","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Introduction to Identity-Based Encryption","author":"L. Martin","year":"2008","unstructured":"Martin, L.: Introduction to Identity-Based Encryption. Artech House Inc., Boston (2008)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Kuhn, D., Hu, V., Polk, W., Chang, S.: Introduction to Public Key Technology and the Federal PKI Infrastructure. National Institute of Standards and Technology (NIST). U.S. Government Publication (2001)","DOI":"10.6028\/NIST.SP.800-32"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Vacca, J.R.: Public Key Infrastructure: Building Trusted Applications and Web Services. Auerbach Pub. (2004)","DOI":"10.1201\/9780203498156"},{"key":"1_CR4","volume-title":"SSYM 2001 Proceedings of the 10th Conference on USENIX Security Symposium","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Ding, X., Tsudik, G., Wong, C.: A Method for Fast Revocation of Public Key Certificates and Security Capabilities. In: SSYM 2001 Proceedings of the 10th Conference on USENIX Security Symposium, vol.\u00a010. USENIX Association, CA (2001)"},{"key":"1_CR5","unstructured":"Koga, S., Imamoto, K., Sakurai, K.: Enhancing Security of Security-Mediated PKI by One-time ID. Kyushu University. In: 4th Annual PKI R&D Workshop, pp. 176\u2013189 (2005)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Guan, Z., Cao, Z., Zhao, X., Chen, R., Chen, Z., Nan, X.: WebIBC: Identity Based Cryptography for Client Side Security in Web Applications. School of Electronics Engineering and Computer Science, Peking University (2008)","DOI":"10.1109\/ICDCS.2008.24"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"D. Boneh","year":"1985","unstructured":"Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"1_CR8","unstructured":"Martin, L.: Identity-Based Encryption: A Closer Look. The ISSA J. (September 2005)"},{"key":"1_CR9","unstructured":"Agarwal, A., Shrimali, V., Das, M.: GSM Security Using Identity-based Cryptography. Institute of Information and Communication Technology, India (2009)"},{"key":"1_CR10","volume-title":"ID-Based Threshold Signature and Mediated Signature Schemes","author":"Y. Yong","year":"2007","unstructured":"Yong, Y., Yang, B., Sun, Y.: ID-Based Threshold Signature and Mediated Signature Schemes. IEEE Computer Society, Los Alamitos (2007)"},{"key":"1_CR11","unstructured":"Galbraith, S.: Mathematics of Public Key Cryptography. University of Copenhagen, Denmark, Version 0.6"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Kiltz, E., Neven, G.: Generalised Key Delegation for Hierarchical Identity-Based Encryption. IET Information Security (July 2008)","DOI":"10.1049\/iet-ifs:20070124"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Fujiski, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: 19th Annual International Cryptography Conference, California, USA (1999)","DOI":"10.1007\/3-540-48405-1_34"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Yang, P., Kitagawa, T., Hanaoka, G., Zhang, R., Matsuura, K., Imai, H.: Apply Fujiaski-Okamoto to Identity-Based Encryption. In: 16th International Symposium (AAECC-16) Algebraic Algorithms and Error-Correcting Codes, Las Vegas, USA (2006)","DOI":"10.1007\/11617983_18"},{"key":"1_CR15","volume-title":"Identity-Based Cryptography","author":"M. Joye","year":"2009","unstructured":"Joye, M., Neven, G.: Identity-Based Cryptography. IOS Press, Amsterdam (2009)"}],"container-title":["Communications in Computer and Information Science","Digital Enterprise and Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22603-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T22:52:09Z","timestamp":1560466329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22603-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642226021","9783642226038"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22603-8_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}