{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T14:29:00Z","timestamp":1745418540962,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811081224"},{"type":"electronic","value":"9789811081231"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-8123-1_5","type":"book-chapter","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T04:11:46Z","timestamp":1519359106000},"page":"44-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Hierarchical Identity-Based Signcryption Scheme in Underwater Wireless Sensor Network"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8392-0811","authenticated-orcid":false,"given":"Chi","family":"Yuan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0923-9267","authenticated-orcid":false,"given":"Wenping","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7748-5427","authenticated-orcid":false,"given":"Deying","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,24]]},"reference":[{"issue":"2014","key":"5_CR1","first-page":"1","volume":"2","author":"K Tran","year":"2014","unstructured":"Tran, K., Oh, S.H.: UWSNs: a round-based clustering scheme for data redundancy resolve. Int. J. Distrib. Sens. Netw. 2(2014), 1\u20136 (2014)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Coutinho, R., Lourei, V., Roaaf, R.: Depth-controlled routing protocol for underwater sensor networks. In: 18th IEEE Symposium on Computers and Communications. IEEE Press, Split (2013)","DOI":"10.1109\/ISCC.2013.6754988"},{"issue":"36","key":"5_CR3","first-page":"31","volume":"5","author":"H Zhong","year":"2015","unstructured":"Zhong, H., Zhang, Q., Tian, L., Wang, L.: Distributed key sharing based scheme for security clustering in unattended wireless sensor network. J. Commun. 5(36), 31\u201339 (2015)","journal-title":"J. Commun."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Ajalakshmi, P., Logeshwa, R.: Performance analysis of cluster head selection routing protocol in underwater acoustic wireless sensor network. In: Internet Conference on Electronics and Communication Systems (ICECS), Coimbatore, pp. 1005\u20131011 (2015)","DOI":"10.1109\/ECS.2015.7124730"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Yuan, C., Chen, W., Zhu, Y., Li, D.: A low computational complexity authentication scheme in underwater wireless sensor network. In: International Conference on Mobile Ad-hoc & Sensor Networks, Shenzhen, China, pp. 116\u2013123 (2015)","DOI":"10.1109\/MSN.2015.26"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Oliveira, L.B., Dahab, R., Lopez, J.: Identity-based encryption for sensor networks. In: The 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, White Plains, New York, USA (2007)","DOI":"10.1109\/PERCOMW.2007.56"},{"key":"5_CR7","unstructured":"RSA Homepage. https:\/\/en.wikipedia.org\/wiki\/RSA_(cryptosystem)"},{"issue":"35","key":"5_CR8","first-page":"20","volume":"1","author":"B Zhang","year":"2016","unstructured":"Zhang, B., Wang, X.: ECC-based security clustering algorithm for wireless sensor network. J. Lanzhou Jiaotong Univ. 1(35), 20\u201324 (2016)","journal-title":"J. Lanzhou Jiaotong Univ."},{"key":"5_CR9","first-page":"1","volume":"12","author":"F Li","year":"2011","unstructured":"Li, F., Zhong, D.: A survey of digital signcryption. Netinfo Secur. 12, 1\u20138 (2011)","journal-title":"Netinfo Secur."},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0052234","volume-title":"Advances in Cryptology: CRYPTO \u201897","author":"Y Zheng","year":"1997","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption)\u00a0\u226a\u00a0cost (signature) + cost (encryption). In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165\u2013179. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052234"},{"issue":"3\/4","key":"5_CR11","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1504\/IJSN.2006.011772","volume":"1","author":"H Wang","year":"2006","unstructured":"Wang, H., Sheng, B., Li, Q.: Elliptic curve cryptography-based access control in sensor networks. Int. J. Secur. Netw. 1(3\/4), 127\u2013137 (2006)","journal-title":"Int. J. Secur. Netw."},{"issue":"20","key":"5_CR12","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/s00145-006-0361-5","volume":"1","author":"J Katz","year":"2007","unstructured":"Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. J. Cryptol. 1(20), 85\u2013113 (2007)","journal-title":"J. Cryptol."},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_5"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Yang, M., AI-Anbuky, A., Liu, W.: An identity-based authentication protocol for sensor networks. In: 9th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1\u20136. IEEE Press, Salvador (2014)","DOI":"10.1109\/ISSNIP.2014.6827621"},{"issue":"48","key":"5_CR15","first-page":"580","volume":"4","author":"R Wei","year":"2015","unstructured":"Wei, R., Zhao, D.: Key-management scheme based on identity and cluster layer for wireless sensor network. Eng. J. Wuhan Univ. 4(48), 580\u2013583 (2015)","journal-title":"Eng. J. Wuhan Univ."},{"issue":"39","key":"5_CR16","first-page":"69","volume":"1","author":"P Guo","year":"2012","unstructured":"Guo, P., Zhang, H., Fu, D., Zhou, M.: Hybrid and lightweight cryptography for WSN. Comput. Sci. 1(39), 69\u201378 (2012)","journal-title":"Comput. Sci."},{"issue":"39","key":"5_CR17","first-page":"64","volume":"9","author":"S Deng","year":"2013","unstructured":"Deng, S., Wang, Y.: Grouping and layered key management strategy in WSN based on EBS. Comput. Eng. 9(39), 64\u201368 (2013)","journal-title":"Comput. Eng."},{"issue":"25","key":"5_CR18","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/48.820738","volume":"1","author":"E Sozer","year":"2000","unstructured":"Sozer, E., Stojanovic, M., Proakis, J.: Underwater acoustic networks. IEEE J. Oceanic Eng. 1(25), 72\u201383 (2000)","journal-title":"IEEE J. Oceanic Eng."}],"container-title":["Communications in Computer and Information Science","Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-8123-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T13:38:02Z","timestamp":1570801082000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-8123-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811081224","9789811081231"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-8123-1_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}