{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:38:10Z","timestamp":1762875490355},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346002"},{"type":"electronic","value":"9783642346019"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34601-9_14","type":"book-chapter","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T21:04:18Z","timestamp":1353013458000},"page":"180-191","source":"Crossref","is-referenced-by-count":14,"title":["Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks"],"prefix":"10.1007","author":[{"given":"Qi","family":"Han","sequence":"first","affiliation":[]},{"given":"Yinghui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiaxiang","family":"Quan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Chaplin, C., Qi, E., Ptasinski, H., Walker, J., Li, S.: 802.11i overview, IEEE.802.11-04\/0123r1 ( February 2005), http:\/\/www.drizzle.com\/~aboba\/IEEE"},{"issue":"1","key":"14_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MWC.2004.1269714","volume":"11","author":"A. Mishra","year":"2004","unstructured":"Mishra, A., Shin, M., Arbaugh, W.: Proactive Key Distribution Using Neighbor Graphs. IEEE Wireless Communication Magazine\u00a011(1), 26\u201336 (2004)","journal-title":"IEEE Wireless Communication Magazine"},{"issue":"5","key":"14_CR3","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1049\/ip-com:20040834","volume":"151","author":"S. Pack","year":"2004","unstructured":"Pack, S., Choi, Y.: Fast Handoff Scheme based on mobility prediction in public wireless LAN systems. IEE Proc.-Commun.\u00a0151(5), 489\u2013495 (2004)","journal-title":"IEE Proc.-Commun."},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11604938_8","volume-title":"Information Security Applications","author":"K. Hong","year":"2006","unstructured":"Hong, K., Jung, S., Wu, S.F.: A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 96\u2013107. Springer, Heidelberg (2006)"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/978-3-540-27824-5_127","volume-title":"Telecommunications and Networking - ICT 2004","author":"H. Wang","year":"2004","unstructured":"Wang, H., Prasad, A.R.: Fast Authentication for Inter-domain Handover. In: de Souza, J.N., Dini, P., Lorenz, P. (eds.) ICT 2004. LNCS, vol.\u00a03124, pp. 973\u2013982. Springer, Heidelberg (2004)"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1093\/ietcom\/e91-b.2.605","volume":"E-91B","author":"J. Choi","year":"2008","unstructured":"Choi, J., Jung, S.: A Secure and Efficient Handover Authentication Based on Light-weight Diffie-Hellman on Mobile Node in FMIPv6. IEICE Transactions on Communications\u00a0E-91B(2), 605\u2013608 (2008)","journal-title":"IEICE Transactions on Communications"},{"key":"14_CR7","first-page":"2543","volume-title":"WCNC 2008","author":"C. Zhang","year":"2008","unstructured":"Zhang, C., Lu, R., Ho, P., Chen, A.: A location Privacy Preserving Authentication Scheme in Vehicular Networks. In: WCNC 2008, pp. 2543\u20132548. IEEE Communications Society, New York (2008)"},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/LCOMM.2010.01.091607","volume":"14","author":"J. Choi","year":"2010","unstructured":"Choi, J., Jung, S.: A Handover Authentication Using Credentials Based on Chameleon Hashing. IEEE Communication Letters\u00a014(1), 54\u201356 (2010)","journal-title":"IEEE Communication Letters"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Rabin, T.: Chameleon Signatures. In: NDSS 2000, pp. 143\u2013154 (2000)","DOI":"10.1016\/S0300-483X(00)00383-8"},{"issue":"12","key":"14_CR10","doi-asserted-by":"publisher","first-page":"3400","DOI":"10.1587\/transinf.E93.D.3400","volume":"E93-D","author":"E. Yoon","year":"2010","unstructured":"Yoon, E., Khan, M., Yoo, K.: Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing. IEICE Transactions on Information and Systems\u00a0E93-D(12), 3400\u20133402 (2010)","journal-title":"IEICE Transactions on Information and Systems"},{"key":"14_CR11","first-page":"1570","volume-title":"ICC 2007","author":"Y. Kim","year":"2007","unstructured":"Kim, Y., Ren, W., Jo, J., Yang, M., Jiang, J., Zheng: SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-based Cryptography. In: ICC 2007, pp. 1570\u20131575. IEEE Communications Society, New York (2007)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chen, X., Li, H., Cao, J.: Secure And Efficient Identity-Based Handoff Authentication Schemes. Security and Communication Networks, February 6 (2012), doi:10.1002\/sec.421","DOI":"10.1002\/sec.421"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-72738-5_2","volume-title":"Applied Cryptography and Network Security","author":"X. Chen","year":"2007","unstructured":"Chen, X., Zhang, F., Susilo, W., Mu, Y.: Efficient Generic On-Line\/Off-Line Signatures Without Key Exposure. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol.\u00a04521, pp. 18\u201330. Springer, Heidelberg (2007)"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/0-387-34805-0_20","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., van Antwerpen, H.: Undeniable Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 212\u2013216. Springer, Heidelberg (1990)"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-540-27809-2_19","volume-title":"Financial Cryptography","author":"G. Ateniese","year":"2004","unstructured":"Ateniese, G., de Medeiros, B.: Identity-Based Chameleon Hash and Applications. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 164\u2013180. Springer, Heidelberg (2004)"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-540-30144-8_8","volume-title":"Information Security","author":"X. Chen","year":"2004","unstructured":"Chen, X., Zhang, F., Kim, K.: Chameleon Hashing Without Key Exposure. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 87\u201398. Springer, Heidelberg (2004)"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-540-30598-9_12","volume-title":"Security in Communication Networks","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., de Medeiros, B.: On the Key Exposure Problem in Chameleon Hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol.\u00a03352, pp. 165\u2013179. Springer, Heidelberg (2005)"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-44647-8_21","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"A. Shamir","year":"2001","unstructured":"Shamir, A., Tauman, Y.: Improved Online\/Offline Signature Schemes. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 355\u2013367. Springer, Heidelberg (2001)"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/0-387-34805-0_24","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"S. Even","year":"1990","unstructured":"Even, S., Goldreich, O., Micali, S.: On-Line\/Off-Line Digital Signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 263\u2013275. Springer, Heidelberg (1990)"},{"issue":"1","key":"14_CR21","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF02254791","volume":"9","author":"S. Even","year":"1996","unstructured":"Even, S., Goldreich, O., Micali, S.: On-line\/Off-line Digital Signatures. Journal of Cryptology\u00a09(1), 35\u201367 (1996)","journal-title":"Journal of Cryptology"},{"issue":"21","key":"14_CR22","doi-asserted-by":"publisher","first-page":"4192","DOI":"10.1016\/j.ins.2008.06.022","volume":"178","author":"X. Chen","year":"2008","unstructured":"Chen, X., Zhang, F., Tian, H., Wei, B., Susilo, W., Mu, Y., Lee, H., Kim, K.: Efficient Generic On-line\/Off-line (Threshold) Signatures Without Key Exposure. Information Sciences\u00a0178(21), 4192\u20134203 (2008)","journal-title":"Information Sciences"},{"issue":"9","key":"14_CR23","doi-asserted-by":"publisher","first-page":"1478","DOI":"10.1093\/comjnl\/bxp044","volume":"53","author":"L. Harn","year":"2010","unstructured":"Harn, L., Hsin, W., Lin, C.: Efficient On-line\/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families. The Computer Journal\u00a053(9), 1478\u20131484 (2010)","journal-title":"The Computer Journal"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-36492-7_20","volume-title":"Selected Areas in Cryptography","author":"F. Hess","year":"2003","unstructured":"Hess, F.: Efficient Identity Based Signature Schemes Based on Pairings. In: Nyberg, K., Heys, H. (eds.) SAC 2002. LNCS, vol.\u00a02595, pp. 310\u2013324. Springer, Heidelberg (2003)"},{"issue":"1","key":"14_CR25","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D. Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of Information Security\u00a01(1), 36\u201363 (2001)","journal-title":"International Journal of Information Security"},{"issue":"4","key":"14_CR26","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","volume":"14","author":"A.K. Lenstra","year":"2001","unstructured":"Lenstra, A.K., Verheul, E.R.: Selecting Cryptographic Key Sizes. Journal of Cryptology\u00a014(4), 255\u2013293 (2001)","journal-title":"Journal of Cryptology"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34601-9_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T16:28:20Z","timestamp":1687796900000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34601-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346002","9783642346019"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34601-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}