{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:47:23Z","timestamp":1742978843733,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642359651"},{"type":"electronic","value":"9783642359668"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35966-8_22","type":"book-chapter","created":{"date-parts":[[2013,3,28]],"date-time":"2013-03-28T08:35:38Z","timestamp":1364459738000},"page":"267-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Tag Identity-Based Encryption Scheme for Logistic Systems"],"prefix":"10.1007","author":[{"given":"Jongseok","family":"Choi","sequence":"first","affiliation":[]},{"given":"Howon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,29]]},"reference":[{"key":"22_CR1","first-page":"213","volume":"2001","author":"D Boneh","year":"2001","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. CRYPTO 2001:213\u2013229","journal-title":"CRYPTO"},{"key":"22_CR2","first-page":"514","volume":"2001","author":"D Boneh","year":"2001","unstructured":"Boneh D, Lynn B, Shacham H (2001) Short signatures from the Weil pairing. ASIACRYPT 2001:514\u2013532","journal-title":"ASIACRYPT"},{"key":"22_CR3","unstructured":"Chien HY, Chen CH (2005) A remote authentication scheme preserving user. IEEE AINA\u201905 245\u2013248"},{"issue":"2","key":"22_CR4","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TCE.2004.1309441","volume":"50","author":"Manik Lal Das","year":"2004","unstructured":"Das Manik Lal, Sacena Ashutosh, Gulati Ved P (2004) A dynamic id-based remote user authentication scheme. IEEE Trans Consum Electron 50(2):629\u2013631","journal-title":"IEEE Trans Consum Electron"},{"key":"22_CR5","unstructured":"Desmedt Y, Quisquater J (1986) Public-key systems based on the difficulty of tampering. CRYPTO \u201886 111\u2013117"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Huhnlein D, Jacobson M, Weber D (2000) Towards practical non-interactive public key cryptosystems using non-maximal imaginary quadratic orders. Sel Areas Crypt 275\u2013287","DOI":"10.1007\/3-540-44983-3_20"},{"issue":"4","key":"22_CR7","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s00145-004-0312-y","volume":"17","author":"Antoine Joux","year":"2004","unstructured":"Joux Antoine (2004) A one round protocol for tripartite Diffie\u2013Hellman. J Cryptol 17(4):263\u2013276","journal-title":"J Cryptol"},{"issue":"1","key":"22_CR8","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.csi.2007.10.007","volume":"31","author":"Y-P Liao","year":"2009","unstructured":"Liao Y-P, Wang S-S (2009) A secure dynamic ID based remote user authentication scheme for multi-server environment. Comput Stand Interfaces 31(1):24\u201329","journal-title":"Comput Stand Interfaces"},{"key":"22_CR9","unstructured":"Liao I-E, Lee C-C, Hwang M-S (2005) Security enhancement for a dynamic id-based remote user authentication scheme. International conference on next generation web services practices (NWeSP\u201905), pp 437\u2013440"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Maurer U, Yacobi Y (1991) Non-interactive public-key cryptography. CRYPTO \u201891 498\u2013507","DOI":"10.1007\/3-540-46416-6_43"},{"key":"22_CR11","first-page":"47","volume":"\u201884","author":"A Shamir","year":"1984","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. CRYPTO \u201884 47\u201353","journal-title":"CRYPTO"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Tanaka H (1987) A realization scheme for the identity-based cryptosystem. CRYPTO \u201887 341\u2013349","DOI":"10.1007\/3-540-48184-2_29"},{"issue":"4","key":"22_CR13","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/49.17709","volume":"7","author":"S Tsuji","year":"1989","unstructured":"Tsuji S, Itoh T (1989) An ID-based cryptosystem based on the discrete logarithm problem. IEEE J Sel Areas Commun 7(4):467\u2013473","journal-title":"IEEE J Sel Areas Commun"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Wong KHM, Zheng Y, Cao J, Wang S (2006) A dynamic user authentication scheme for wireless sensor networks. IEEE international conference on sensor networks, Ubiquitous, and Trustworthy Computing (SUTC\u201906), pp 244\u2013251","DOI":"10.1109\/SUTC.2006.1636182"}],"container-title":["Lecture Notes in Logistics","Dynamics in Logistics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35966-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T16:44:29Z","timestamp":1676306669000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-35966-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642359651","9783642359668"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35966-8_22","relation":{},"ISSN":["2194-8917","2194-8925"],"issn-type":[{"type":"print","value":"2194-8917"},{"type":"electronic","value":"2194-8925"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"29 March 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}