{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:10:43Z","timestamp":1725725443995},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_84","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T11:40:44Z","timestamp":1367667644000},"page":"761-766","source":"Crossref","is-referenced-by-count":4,"title":["Cryptanalysis of an Authenticated Group Key Transfer Protocol Based on Secret Sharing"],"prefix":"10.1007","author":[{"given":"Mijin","family":"Kim","sequence":"first","affiliation":[]},{"given":"Namje","family":"Park","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"84_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"84_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-540-45146-4_7","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"J. Katz","year":"2003","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 110\u2013125. Springer, Heidelberg (2003)"},{"key":"84_CR3","doi-asserted-by":"publisher","first-page":"5441","DOI":"10.1016\/j.ins.2007.06.002","volume":"177","author":"J. Nam","year":"2007","unstructured":"Nam, J., Paik, J., Kim, U.M., Won, D.: Resource-aware protocol for authenticated group key exchange in integrated wired and wireless networks. Journal of Information Sciences\u00a0177, 5441\u20135467 (2007)","journal-title":"Journal of Information Sciences"},{"key":"84_CR4","doi-asserted-by":"crossref","unstructured":"Hajyvahabzadeh, M., Eidkhani, E., Mortazavi, S.A., Pour, A.N.: A new group key management protocol using code for key calculation: CKC. Information Science and Applications, pp. 1\u20136 (2010)","DOI":"10.1109\/ICISA.2010.5480553"},{"issue":"6","key":"84_CR5","doi-asserted-by":"publisher","first-page":"842","DOI":"10.1109\/TC.2010.40","volume":"59","author":"L. Harn","year":"2010","unstructured":"Harn, L., Lin, C.: Authenticated group key transfer protocol based on secret sharing. IEEE Transactions on Computers\u00a059(6), 842\u2013846 (2010)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"84_CR6","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.ins.2010.09.011","volume":"181","author":"J. Nam","year":"2011","unstructured":"Nam, J., Paik, J., Won, D.: A security weakness in Abdalla et al.\u2019s generic construction of a group key exchange protocol. Journal of Information Sciences\u00a0181(1), 234\u2013238 (2011)","journal-title":"Journal of Information Sciences"},{"issue":"2","key":"84_CR7","first-page":"751","volume":"6","author":"J. Nam","year":"2012","unstructured":"Nam, J., Kim, M., Paik, J., Won, D.: Security Weaknesses in Harn-Lin and Dutta-Barua protocols for group key establishment. KSII Transactions on Internet and Information Systems\u00a06(2), 751\u2013765 (2012)","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"84_CR8","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.proeng.2011.12.731","volume":"9","author":"Y. Sun","year":"2012","unstructured":"Sun, Y., Wen, Q., Sun, H., Li, W., Jin, Z., Zhang, H.: An authenticated group key transfer protocol based on secret sharing. Procedia Engineering\u00a09, 403\u2013408 (2012)","journal-title":"Procedia Engineering"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_84","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T17:53:10Z","timestamp":1557683590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_84"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_84","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}