{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T05:47:00Z","timestamp":1726120020690},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T00:00:00Z","timestamp":1442275200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11432-015-5412-9","type":"journal-article","created":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T02:38:20Z","timestamp":1445999900000},"page":"1-15","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Universally composable secure positioning in the bounded retrieval model"],"prefix":"10.1007","volume":"58","author":[{"given":"JunWei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"JianFeng","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,15]]},"reference":[{"key":"5412_CR1","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/TDSC.2006.57","volume":"3","author":"A Vora","year":"2006","unstructured":"Vora A, Nesterenko M. Secure location verification using radio broadcast. IEEE Trans Depend Secur Comput, 2006, 3: 377\u2013385","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"5412_CR2","doi-asserted-by":"crossref","unstructured":"Zhang S L, Zhang Q, Liu M Q, et al. A top-down positioning scheme for underwater wireless sensor networks. Sci China Inf Sci, 2014, 57: 032301","DOI":"10.1007\/s11432-013-4797-6"},{"key":"5412_CR3","doi-asserted-by":"crossref","unstructured":"Li J Z, Guo F C, Jiang W L. Source localization and calibration using TDOA and FDOA measurements in the presence of sensor location uncertainty. Sci China Inf Sci, 2014, 57: 042315","DOI":"10.1007\/s11432-013-4800-2"},{"key":"5412_CR4","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s11277-007-9375-z","volume":"44","author":"S Gezici","year":"2008","unstructured":"Gezici S. A survey on wireless position estimation. Wirel Pers Commun, 2008, 44: 263\u2013282","journal-title":"Wirel Pers Commun"},{"key":"5412_CR5","first-page":"391","volume-title":"Proceedings of 29th Annual International Cryptology Conference","author":"N Chandran","year":"2009","unstructured":"Chandran N, Goyal V, Moriarty R, et al. Position based cryptography. In: Proceedings of 29th Annual International Cryptology Conference, Santa Barbara, 2009. 391\u2013407"},{"key":"5412_CR6","first-page":"293","volume-title":"Proceedings of 49th Annual IEEE Symposium on Foundations of Computer Science","author":"S Dziembowski","year":"2008","unstructured":"Dziembowski S, Sapienza L, Pietrzak K. Leakage-resilient cryptography. In: Proceedings of 49th Annual IEEE Symposium on Foundations of Computer Science, Philadelphia, 2008. 293\u2013302"},{"key":"5412_CR7","first-page":"429","volume-title":"Proceedings of 31st Annual Cryptology Conference","author":"H Buhrman","year":"2011","unstructured":"Buhrman H, Chandran N, Fehr S, et al. Position based quantum cryptography: impossibility and constructions. In: Proceedings of 31st Annual Cryptology Conference, Santa Barbara, 2011. 429\u2013446"},{"key":"5412_CR8","volume-title":"Position-verification in multi-channel model","author":"H J Zhang","year":"2011","unstructured":"Zhang H J, Zhang Z Y, Cao Z F. Position-verification in multi-channel model. Cryptology ePrint Archive, Report 2011\/714, http:\/\/eprint.iacr.org\/2011\/714.pdf. 2011"},{"key":"5412_CR9","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/SFCS.2001.959888","volume-title":"Proceedings of 42nd Annual Symposium on Foundations of Computer Science","author":"R Canetti","year":"2001","unstructured":"Canetti R. Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of 42nd Annual Symposium on Foundations of Computer Science, Las Vegas, 2001. 136\u2013145"},{"key":"5412_CR10","first-page":"337","volume-title":"Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques","author":"R Canetti","year":"2002","unstructured":"Canetti R, Krawczyk H. Universally composable notions of key exchange and secure channels. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, 2002. 337\u2013351"},{"key":"5412_CR11","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/s11432-010-0056-2","volume":"53","author":"J W Zhang","year":"2010","unstructured":"Zhang J W, Ma J F, Moon S J. Universally composable one-time signature and broadcast authentication. Sci China Inf Sci, 2010, 53: 567\u2013580","journal-title":"Sci China Inf Sci"},{"key":"5412_CR12","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s11432-010-0059-z","volume":"53","author":"J W Zhang","year":"2010","unstructured":"Zhang J W, Ma J F, Moon S J. Universally composable secure TNC model and EAP-TNC protocol in IF-T. Sci China Inf Sci, 2010, 53: 465\u2013482","journal-title":"Sci China Inf Sci"},{"key":"5412_CR13","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/11681878_11","volume-title":"Proceedings of 3rd Theory of Cryptography Conference","author":"S Dziembowski","year":"2006","unstructured":"Dziembowski S. Intrusion-resilience via the bounded-storage model. In: Proceedings of 3rd Theory of Cryptography Conference, New York, 2006. 207\u2013224"},{"key":"5412_CR14","first-page":"227","volume-title":"Proceedings of 48th Annual IEEE Symposium on Foundations of Computer Science","author":"S Dziembowski","year":"2007","unstructured":"Dziembowski S, Pietrzak K. Intrusion-resilient secret sharing. In: Proceedings of 48th Annual IEEE Symposium on Foundations of Computer Science, Providence, 2007. 227\u2013237"},{"key":"5412_CR15","first-page":"117","volume":"34","author":"J W Zhang","year":"2013","unstructured":"Zhang J W, Ma J F, Yang C. UC model of secure positioning protocols (in Chinese). J Commun, 2013, 34: 117\u2013122","journal-title":"J Commun"},{"key":"5412_CR16","first-page":"33","volume-title":"Proceedings of 21st Annual ACM Symposium on Theory of Computing","author":"M Naor","year":"1989","unstructured":"Naor M, Yung M. Universal one-way hash functions and their cryptographic applications. In: Proceedings of 21st Annual ACM Symposium on Theory of Computing, Seattle, 1989. 33\u201343"},{"key":"5412_CR17","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/1102120.1102124","volume-title":"Proceedings of 12th ACM Conference on Computer and Communications Security","author":"C H He","year":"2005","unstructured":"He C H, Sundararajan M, Datta A, et al. A modular correctness proof of IEEE 802.11i and TLS. In: Proceedings of 12th ACM Conference on Computer and Communications Security, Alexandria, 2005. 2\u201315"},{"key":"5412_CR18","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1007\/11496137_29","volume-title":"Proceedings of 3rd International Conference on Applied Cryptography and Network Security","author":"Y Hu","year":"2005","unstructured":"Hu Y, Jakobsson M, Perrig A. Efficient constructions for one-way hash chains. In: Proceedings of 3rd International Conference on Applied Cryptography and Network Security, New York, 2005. 423\u2013441"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5412-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-5412-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5412-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,31]],"date-time":"2019-08-31T21:42:55Z","timestamp":1567287775000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-5412-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,15]]},"references-count":18,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["5412"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-5412-9","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,15]]}}}