{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T06:11:21Z","timestamp":1648879881662},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,6,9]],"date-time":"2012-06-09T00:00:00Z","timestamp":1339200000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s11227-012-0787-5","type":"journal-article","created":{"date-parts":[[2012,6,8]],"date-time":"2012-06-08T12:40:02Z","timestamp":1339159202000},"page":"132-143","source":"Crossref","is-referenced-by-count":1,"title":["A scalable server for key distribution and its application to accounting"],"prefix":"10.1007","volume":"64","author":[{"given":"J. A.","family":"\u00c1lvarez-Bermejo","sequence":"first","affiliation":[]},{"given":"N.","family":"Antequera","sequence":"additional","affiliation":[]},{"given":"R.","family":"Garc\u00eda-Rubio","sequence":"additional","affiliation":[]},{"given":"J. A.","family":"L\u00f3pez-Ramos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,9]]},"reference":[{"key":"787_CR1","first-page":"586","volume":"3","author":"M Janakova","year":"2011","unstructured":"Janakova M (2011) Database technology analysis for the support or instant information retrieval. Int J Comput Inf Syst Ind Manag Appl 3:586\u2013593","journal-title":"Int J Comput Inf Syst Ind Manag Appl"},{"key":"787_CR2","unstructured":"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011\u20132016, White Paper, Cisco, June, 2011, http:\/\/www.cisco.com\/en\/US\/solutions\/collateral\/ns341\/ns525\/ns537\/ns705\/ns827\/white_paper_c11-520862.pdf"},{"key":"787_CR3","first-page":"85","volume-title":"Parallel and distributed computing, applications and technologies","author":"T Yamakami","year":"2003","unstructured":"Yamakami T (2003) Toward understanding the mobile Internet user behavior: a methodology for user clustering with aging analysis. In: Parallel and distributed computing, applications and technologies, pp 85\u201389"},{"issue":"3","key":"787_CR4","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/937503.937506","volume":"35","author":"S Rafaeli","year":"2003","unstructured":"Rafaeli S, Hutchison D (2003) A survey of key management for secure group communication. ACM Comput Surv 35(3):309\u2013329","journal-title":"ACM Comput Surv"},{"key":"787_CR5","doi-asserted-by":"crossref","first-page":"1421","DOI":"10.1109\/TC.2009.88","volume":"58","author":"A Shoufan","year":"2009","unstructured":"Shoufan A, Huss SA (2009) High-performance rekeying processor architecture for group key management. IEEE Trans Comput 58:1421\u20131434","journal-title":"IEEE Trans Comput"},{"key":"787_CR6","first-page":"1","volume-title":"International conference on multimedia computing and systems (ICMCS)","author":"AB Hssane","year":"2011","unstructured":"Hssane AB, Hasnaoui ML, Benkirane S, Ezzati A, Benalla S (2011) Modified Gram Schmidt algorithm applied to localization for wireless sensor networks. In: International conference on multimedia computing and systems (ICMCS), 7\u20139 April 2011, pp 1\u20135"},{"key":"787_CR7","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1109\/ISCID.2009.275","volume-title":"Second international symposium on computational intelligence and design","author":"J Yin","year":"2009","unstructured":"Yin J, Dong F, Wang N (2009) Modified Gram\u2013Schmidt algorithm for extreme learning machine. In: Second international symposium on computational intelligence and design, 12\u201314 Dec 2009. ISCID \u201909, vol 2, pp 517\u2013520"},{"key":"787_CR8","unstructured":"Lopez-Ramos JA, Rosenthal J, Schipani D (2010) Managing key multicasting through orthogonal systems. Preprint"},{"key":"787_CR9","unstructured":"Ardnt H (2010) The universal Java matrix package: everything is a matrix! ICML\/MLOSS, Haifa, 2010-06-25"},{"key":"787_CR10","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/ICSC.2010.94","volume-title":"IEEE fourth international conference on semantic computing (ICSC)","author":"D Widdows","year":"2010","unstructured":"Widdows D, Cohen T (2010) The semantic vectors package: new algorithms and public tools for distributional semantics. In: IEEE fourth international conference on semantic computing (ICSC), 22\u201324 Sept 2010, pp 9\u201315"},{"key":"787_CR11","first-page":"174","volume-title":"9th International conference on grid and cooperative computing (GCC)","author":"W Fan","year":"2010","unstructured":"Fan W, Chen X, Li X (2010) Parallelization of RSA algorithm based on compute unified device architecture. In: 9th International conference on grid and cooperative computing (GCC), 1\u20135 Nov 2010, pp 174\u2013178"},{"issue":"3","key":"787_CR12","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1145\/1897852.1897873","volume":"54","author":"N Shavit","year":"2011","unstructured":"Shavit N (2011) Data structures in the multicore age. Commun ACM 54(3):76\u201384","journal-title":"Commun ACM"},{"key":"787_CR13","first-page":"841","volume-title":"IEEE world congress on computational intelligence","author":"W-M Pang","year":"2008","unstructured":"Pang W-M, Wong T-T, Heng P-A (2008) Generating massive high-quality random numbers using GPU. In: IEEE world congress on computational intelligence, 1\u20136 June 2008, pp 841\u2013847"},{"issue":"3","key":"787_CR14","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1108\/02686900110385489","volume":"16","author":"JL Bierstaker","year":"2001","unstructured":"Bierstaker JL, Burnaby P, Thibodeau J (2001) The impact of information technology on the audit process: an assessment of the state of the art and implications for the future. Manag Audit J 16(3):159\u2013164","journal-title":"Manag Audit J"},{"issue":"1","key":"787_CR15","doi-asserted-by":"crossref","first-page":"65","DOI":"10.2308\/aud.2001.20.1.65","volume":"20","author":"BK Church","year":"2001","unstructured":"Church BK, McMillan JJ, Schneider A (2001) Factors affecting internal auditors\u2019 consideration of fraudulent financial reporting during analytical procedures. Auditing: J Pract Theory 20(1):65\u201380","journal-title":"Auditing: J Pract Theory"},{"key":"787_CR16","volume-title":"An analysis of U.S. public companies fraudulent financial reporting: 1987\u20131997","author":"M Beasley","year":"1999","unstructured":"Beasley M, Carcello JV, Hermanson DR (1999) An analysis of U.S. public companies fraudulent financial reporting: 1987\u20131997. AICPA, New York"},{"issue":"4","key":"787_CR17","first-page":"47","volume":"55","author":"SM Glover","year":"1998","unstructured":"Glover SM (1998) The next generation software. Intern Auditor 55(4):47\u201352","journal-title":"Intern Auditor"},{"key":"787_CR18","first-page":"271","volume":"3","author":"R Maulik","year":"2011","unstructured":"Maulik R, Chaki N (2011) A study on wormhole attacks in MANET. Int J Comput Inf Syst Ind Manag Appl 3:271\u2013279","journal-title":"Int J Comput Inf Syst Ind Manag Appl"},{"key":"787_CR19","unstructured":"Pons Ortega F (2007) Auditor\u00eda inform\u00e1tica. Una aproximaci\u00f3n a la mejora del control interno. Auditor\u00eda p\u00fablica, revista de los \u00f3rganos auton\u00f3micos de control externo 41, pp\u00a097\u2013100"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-012-0787-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-012-0787-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-012-0787-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:24:07Z","timestamp":1559384647000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-012-0787-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,9]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["787"],"URL":"https:\/\/doi.org\/10.1007\/s11227-012-0787-5","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,9]]}}}