{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:58:28Z","timestamp":1743141508321,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":18,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400772618"},{"type":"electronic","value":"9789400772625"}],"license":[{"start":{"date-parts":[[2013,11,13]],"date-time":"2013-11-13T00:00:00Z","timestamp":1384300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,11,13]],"date-time":"2013-11-13T00:00:00Z","timestamp":1384300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-94-007-7262-5_140","type":"book-chapter","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T17:02:50Z","timestamp":1384275770000},"page":"1237-1246","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Authentication of Real-Time Communication System Using KIS Scheme"],"prefix":"10.1007","author":[{"given":"Binayak","family":"Kar","sequence":"first","affiliation":[]},{"given":"Eric Hsiao-kuang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,13]]},"reference":[{"key":"140_CR1","doi-asserted-by":"crossref","unstructured":"Dodis Y, Katz J, Xu S, Yung M (2003) Strong key-insulated signature scheme. In: Public Key Cryptography PCK, pp 130\u2013144","DOI":"10.1007\/3-540-36288-6_10"},{"key":"140_CR2","doi-asserted-by":"crossref","unstructured":"Kopetz H (2011) Real-time system: design principles for distributed embedded applications, vol 25. Springer","DOI":"10.1007\/978-1-4419-8237-7_11"},{"issue":"7","key":"140_CR3","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.2007.382659","volume":"45","author":"L Lin","year":"2007","unstructured":"Lin L, Lin P (2007) Orchestration in web services and real-time communications. Commun Mag, IEEE 45(7):44\u201350","journal-title":"Commun Mag, IEEE"},{"key":"140_CR4","first-page":"57","volume":"800","author":"E Barker","year":"2011","unstructured":"Barker E, Barker W, Burr W, Polk W, Smid M (2011) Recommendation for key-management-part 1: general (revision 3). NIST Spec Publ 800:57","journal-title":"NIST Spec Publ"},{"key":"140_CR5","doi-asserted-by":"crossref","unstructured":"Dodis Y, Katz J, Xu S, Yung M (2002) Key-insulated public key cryptosystems. In: Advances in cryptology Eurocrypt, Springer pp 65\u201382","DOI":"10.1007\/3-540-46035-7_5"},{"key":"140_CR6","doi-asserted-by":"crossref","unstructured":"Gonzalez-Deleito N, Markoitch O, DallOlio E (2004) A new key-insulated signature scheme. In: Information and communication security, pp 9\u201312","DOI":"10.1007\/978-3-540-30191-2_36"},{"key":"140_CR7","doi-asserted-by":"crossref","unstructured":"Ohtake G, Ogawa K (2012) Application authentication for hybrid services of broadcasting and communication networks. In: Information security applications, pp 171\u2013186","DOI":"10.1007\/978-3-642-27890-7_15"},{"issue":"6","key":"140_CR8","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1587\/transfun.E93.A.1039","volume":"93","author":"G Ohtake","year":"2010","unstructured":"Ohtake G, Hanaoka G, Ogawa K (2010) Efficient provider authentication for bidirectional broadcasting services. IEICE Trans Fundam Electron, Commun Comput Sci 93(6):1039\u20131051","journal-title":"IEICE Trans Fundam Electron, Commun Comput Sci"},{"key":"140_CR9","doi-asserted-by":"crossref","unstructured":"Matsuda T, Hanaoka G, Ogawa K (2007) A practical provider authentication system for bidirectional broadcast service. In: Knowledge based intelligent information and engineering systems. Springer, pp 967\u2013974","DOI":"10.1007\/978-3-540-74829-8_118"},{"key":"140_CR10","doi-asserted-by":"crossref","unstructured":"Ohtake G, Hanaoka G, Ogawa K (2008) An efficient strong key-insulated signature scheme and its application. In: Public key infrastructure, PKI, pp 150\u2013165","DOI":"10.1007\/978-3-540-69485-4_11"},{"key":"140_CR11","doi-asserted-by":"crossref","unstructured":"Weng J, Liu S, Chen K, Li X (2006) Identity based key-insulated signature with secure key-updates. In: Information security and cryptology. Springer, pp 13\u201326","DOI":"10.1007\/11937807_2"},{"key":"140_CR12","doi-asserted-by":"crossref","unstructured":"Weng J, Liu S, Chen K, Ma C (2007) Identity based key-insulated signature without random oracles. In: Computational intelligence and security, pp 470\u2013480","DOI":"10.1007\/978-3-540-74377-4_50"},{"key":"140_CR13","doi-asserted-by":"crossref","unstructured":"Du H, Li J, Zhang Y, Li T, Zhang Y (2012) Certificate based key-insulated signature. In: Data and knowledge engineering. Springer, pp 206\u2013220","DOI":"10.1007\/978-3-642-34679-8_19"},{"key":"140_CR14","unstructured":"Wu TY, Tseng YM, Yu CW (2012) Id based key-insulated signature scheme with batch verifications and its novel applications. In: Int J Innovative Comput, Inf Control 8(7(A)):4797\u20134810"},{"key":"140_CR15","doi-asserted-by":"crossref","unstructured":"Nickalls R (1993) A new approach to solving the cubic: Cardan\u2019s solution revealed. In: The mathematical Gazette. pp 354\u2013359","DOI":"10.2307\/3619777"},{"key":"140_CR16","unstructured":"Stallings W (2003) Cryptography and network security, principles and practices. Practice Hall"},{"issue":"177","key":"140_CR17","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystem. Math Comput 48(177):203\u2013209","journal-title":"Math Comput"},{"key":"140_CR18","unstructured":"Remarks on the security of elliptic curve cryptosystem: a Certicom white paper, CTEC Cryptosystem, updated July (2000). http:\/\/www.certicom.com\/"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Technologies, Embedded and Multimedia for Human-centric Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-7262-5_140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T17:52:32Z","timestamp":1676829152000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-7262-5_140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,13]]},"ISBN":["9789400772618","9789400772625"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-7262-5_140","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013,11,13]]},"assertion":[{"value":"13 November 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}