{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:48:24Z","timestamp":1771703304531,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2009,4,18]],"date-time":"2009-04-18T00:00:00Z","timestamp":1240012800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1007\/s12243-009-0096-z","type":"journal-article","created":{"date-parts":[[2009,4,17]],"date-time":"2009-04-17T14:57:59Z","timestamp":1239980279000},"page":"735-744","source":"Crossref","is-referenced-by-count":36,"title":["A new authenticated group key agreement in a mobile environment"],"prefix":"10.1007","volume":"64","author":[{"given":"Cheng-Chi","family":"Lee","sequence":"first","affiliation":[]},{"given":"Tsung-Hung","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Chwei-Shyong","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,4,18]]},"reference":[{"issue":"2","key":"96_CR1","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1109\/TEMC.2008.919033","volume":"50","author":"BT Ahmed","year":"2008","unstructured":"Ahmed BT, Ramon MC (2008) On the impact of Ultra-Wideband (UWB) on macrocell downlink of UMTS and CDMA-450 systems. IEEE Trans Electromagn Compat 50(2):406\u2013412","journal-title":"IEEE Trans Electromagn Compat"},{"issue":"17","key":"96_CR2","doi-asserted-by":"crossref","first-page":"1627","DOI":"10.1016\/S0140-3664(00)00249-8","volume":"23","author":"N Asokan","year":"2000","unstructured":"Asokan N, Ginzboorg P (2000) Key agreement in ad hoc networks. Comput Commun 23(17):1627\u20131637","journal-title":"Comput Commun"},{"issue":"2","key":"96_CR3","first-page":"187","volume":"4","author":"AK Awasthi","year":"2007","unstructured":"Awasthi AK, Lal S (2007) Id-based ring signature and proxy ring signature schemes from bilinear pairings. Int J Netw Secur 4(2):187\u2013192","journal-title":"Int J Netw Secur"},{"key":"96_CR4","doi-asserted-by":"crossref","unstructured":"Barua R, Dutta R, Sarkar P (2003) Extending joux protocol to multi party key agreement. In: Proc. indocrypt 2003, pp\u00a0205\u2013217","DOI":"10.1007\/978-3-540-24582-7_15"},{"key":"96_CR5","doi-asserted-by":"crossref","first-page":"999","DOI":"10.1049\/el:19930666","volume":"29","author":"MJ Beller","year":"1993","unstructured":"Beller MJ, Yacobi Y (1993) Fully-fledged two-way public key authentication and key agreement for low-cost terminals. IEE Electron Lett 29:999\u20131001","journal-title":"IEE Electron Lett"},{"key":"96_CR6","unstructured":"Boneh D (1988) The decision Diffie\u2013Hellman problem. In: Proceedings of 3rd algorithmic number theory symposium, pp\u00a048\u201363"},{"key":"96_CR7","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin M (2001) Identity based encryption from the weil pairing. In: Advances in cryptology-crypto\u20192001. LNCS, vol\u00a02139, pp\u00a0213\u2013229","DOI":"10.1007\/3-540-44647-8_13"},{"key":"96_CR8","doi-asserted-by":"crossref","unstructured":"Boyd C, Nieto JMG (2003) Round-optimal contributory conference key agreement. In: Proceedings of public-key cryptography. LNCS, vol\u00a02567, pp\u00a0161\u2013174","DOI":"10.1007\/3-540-36288-6_12"},{"key":"96_CR9","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-540-24632-9_9","volume":"2947","author":"E Bresson","year":"2004","unstructured":"Bresson E, Catalano D (2004) Constant round authenticated group key agreement via distributed computing. Lect Notes Comput Sci (Proc. PKC 2004) 2947:115\u2013129","journal-title":"Lect Notes Comput Sci (Proc. PKC 2004)"},{"issue":"17","key":"96_CR10","doi-asserted-by":"crossref","first-page":"1730","DOI":"10.1016\/j.comcom.2004.05.023","volume":"27","author":"E Bresson","year":"2004","unstructured":"Bresson E, Chevassut O, Essiari A, Pointcheval D (2004) Mutual authentication and group key agreement for low-power mobile devices. Comput Commun 27(17):1730\u20131737","journal-title":"Comput Commun"},{"key":"96_CR11","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/BFb0053443","volume":"950","author":"M Burmester","year":"1995","unstructured":"Burmester M, Desmedt Y (1995) A secure and efficient conference key distribution system. Lect Notes Comput Sci (Proc. Eurocrypt 1994) 950:275\u2013286","journal-title":"Lect Notes Comput Sci (Proc. Eurocrypt 1994)"},{"issue":"3","key":"96_CR12","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ipl.2005.01.003","volume":"94","author":"M Burmester","year":"2005","unstructured":"Burmester M, Desmedt Y (2005) A secure and scalable group key exchange system. Inf Process Lett 94(3):137\u2013143","journal-title":"Inf Process Lett"},{"key":"96_CR13","unstructured":"CDPD Forum (1995) Cellular digital packet data (CDPD) system specification. Tech rep release 1.1, CDPD Forum, Jan. 1995"},{"key":"96_CR14","first-page":"14","volume":"1","author":"C-W Chen","year":"2005","unstructured":"Chen C-W, Chuang M-C, Tsai C-S (2005) An efficient authentication scheme between MANET and WLAN on IPv6 based internet. Int J Netw Secur 1:14\u201323","journal-title":"Int J Netw Secur"},{"issue":"2","key":"96_CR15","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.jss.2006.02.046","volume":"80","author":"X Chen","year":"2007","unstructured":"Chen X, Zhang F, Liu S (2007) Id-based restrictive partially blind signatures and applications. J Syst Softw 80(2):164\u2013171","journal-title":"J Syst Softw"},{"issue":"24","key":"96_CR16","doi-asserted-by":"crossref","first-page":"5651","DOI":"10.1016\/j.ins.2007.06.026","volume":"177","author":"JT Chung","year":"2007","unstructured":"Chung JT, Li CM, Hwang T (2007) All-in-one group-oriented cryptosystem based on bilinear pairing. Inf Sci 177(24):5651\u20135663","journal-title":"Inf Sci"},{"key":"96_CR17","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory IT-22:644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"96_CR18","doi-asserted-by":"crossref","unstructured":"Durresi A, Durresi M, Barolli L (2008) Secure spatial authentication for mobile stations in hybrid 3G-WLAN serving networks. In: 2008 third international conference on availability, reliability and security, pp\u00a01325\u20131331","DOI":"10.1109\/ARES.2008.190"},{"issue":"5","key":"96_CR19","doi-asserted-by":"crossref","first-page":"2007","DOI":"10.1109\/TIT.2008.920224","volume":"54","author":"R Dutta","year":"2008","unstructured":"Dutta R, Barua R (2008) Provably secure constant round contributory group key agreement in dynamic setting. IEEE Trans Inf Theory 54(5):2007\u20132025","journal-title":"IEEE Trans Inf Theory"},{"key":"96_CR20","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T ElGamal","year":"1985","unstructured":"ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory IT-31:469\u2013472","journal-title":"IEEE Trans Inf Theory"},{"issue":"2","key":"96_CR21","first-page":"82","volume":"76","author":"H Granbohm","year":"1999","unstructured":"Granbohm H, Wiklund J (1999) GPRS\u2014general packet radio service. Ericsson Rev 76(2):82\u201388","journal-title":"Ericsson Rev"},{"issue":"2","key":"96_CR22","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/TWC.2003.809452","volume":"2","author":"KF Hwang","year":"2003","unstructured":"Hwang KF, Chang CC (2003) A self-encryption mechanism for authentication of roaming and teleconference services. IEEE Trans Wirel Commun 2(2):400\u2013407","journal-title":"IEEE Trans Wirel Commun"},{"key":"96_CR23","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1109\/49.345886","volume":"13","author":"MS Hwang","year":"1995","unstructured":"Hwang MS, Yang WP (1995) Conference key distribution protocols for digital mobile communication systems. IEEE J Sel Areas Commun 13:416\u2013420","journal-title":"IEEE J Sel Areas Commun"},{"issue":"5","key":"96_CR24","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1109\/25.790522","volume":"48","author":"M-S Hwang","year":"1999","unstructured":"Hwang M-S (1999) Dynamic participation in a secure conference scheme for mobile communications. IEEE Trans Veh Technol 48(5):1469\u20131474","journal-title":"IEEE Trans Veh Technol"},{"issue":"5","key":"96_CR25","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1109\/TIT.1982.1056542","volume":"28","author":"I Ingemaresson","year":"1982","unstructured":"Ingemaresson I, Tang TD, Wong CK (1982) A conference key distribution system. IEEE Trans Inf Theory 28(5):714\u2013720","journal-title":"IEEE Trans Inf Theory"},{"key":"96_CR26","doi-asserted-by":"crossref","unstructured":"Katz J, Yung M (2003) Scalable protocols for authenticated group key exchange. In: Proceedings of advances in cryptology-crypto\u201903, pp\u00a0110\u2013125","DOI":"10.1007\/978-3-540-45146-4_7"},{"issue":"1","key":"96_CR27","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/984334.984337","volume":"7","author":"Y Kim","year":"2004","unstructured":"Kim Y, Perrig A, Tsudik G (2004) Tree based group key agreement. ACM Trans Inf Syst Secur 7(1):60\u201396","journal-title":"ACM Trans Inf Syst Secur"},{"key":"96_CR28","doi-asserted-by":"crossref","first-page":"1696","DOI":"10.1109\/TVT.2007.897254","volume":"56","author":"L-H Li","year":"2007","unstructured":"Li L-H, Lin F-L, Chuang H-R (2007) Complete RF-system analysis of direct conversion receiver (DCR) for 802.11a WLAN OFDM system. IEEE Trans Veh Technol 56:1696\u20131703","journal-title":"IEEE Trans Veh Technol"},{"key":"96_CR29","unstructured":"Lin I-C, Chang C-C, Hwang M-S (2000) Security enhancement for the simple authentication key agreement algorithm. In: The twenty-fourth annual international computer software and applications conference (COMPSAC)\u20192000, pp\u00a0113\u2013115"},{"key":"96_CR30","unstructured":"Nam J, Kim S, Won D (2004) Attacks on bresson-chevassut-essiari-pointcheval\u2019s group key agreement scheme for low-power mobile devices. In: Cryptology ePrint archive, report 251"},{"issue":"1","key":"96_CR31","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.jss.2004.10.024","volume":"78","author":"J Nam","year":"2005","unstructured":"Nam J, Lee J, Kim S, Won D (2005) DDH-based group key agreement in a mobile environment. J Syst Softw 78(1):73\u201383","journal-title":"J Syst Softw"},{"issue":"6","key":"96_CR32","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1109\/90.556342","volume":"4","author":"TF Porta La","year":"1996","unstructured":"La Porta TF, Veeraraghavan M, Buskens RW (1996) Comparison of signaling loads for pcs systems. IEEE\/ACM Trans Netw 4(6):840\u2013855","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"11","key":"96_CR33","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"issue":"3","key":"96_CR34","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1016\/j.jss.2006.05.033","volume":"80","author":"Z Shao","year":"2007","unstructured":"Shao Z (2007) Self-certified signature scheme from pairings. J Syst Softw 80(3):388\u2013395","journal-title":"J Syst Softw"},{"issue":"5","key":"96_CR35","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"A Sherman","year":"2003","unstructured":"Sherman A, McGrew D (2003) Key establishment in large dynamic groups using one-way function trees. IEEE Trans Softw Eng 29(5):444\u2013458","journal-title":"IEEE Trans Softw Eng"},{"key":"96_CR36","doi-asserted-by":"crossref","unstructured":"Shoup V (1997) Lower bounds for discrete logarithms and related problems. In: Proceedings of advances in cryptology-eurocrypt\u201997, pp\u00a0256\u2013266","DOI":"10.1007\/3-540-69053-0_18"},{"key":"96_CR37","doi-asserted-by":"crossref","unstructured":"Steiner M, Tsudik G, Waidner M (1996) Diffie\u2013Hellman key distribution extended to group communication. In: Proceedings of ACM CCS 1996, pp\u00a031\u201337","DOI":"10.1145\/238168.238182"},{"key":"96_CR38","doi-asserted-by":"crossref","unstructured":"Steiner M, Tsudik G, Waidner M (1998) Cliques: a new approach to group key agreement. In: Proceedings of IEEE conf distrib comput syst, pp\u00a0380\u2013380","DOI":"10.1109\/ICDCS.1998.679745"},{"issue":"3","key":"96_CR39","first-page":"369","volume":"13","author":"YM Tseng","year":"2002","unstructured":"Tseng YM (2002) Cryptanalysis and improvement of key distribution system for VSAT satellite communications. Informatica 13(3):369\u2013376","journal-title":"Informatica"},{"issue":"6","key":"96_CR40","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1002\/nem.503","volume":"13","author":"YM Tseng","year":"2003","unstructured":"Tseng YM (2003) A scalable key management scheme with minimizing key storage for secure group communications. Int J Netw Manage 13(6):419\u2013425","journal-title":"Int J Netw Manage"},{"issue":"4","key":"96_CR41","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1093\/comjnl\/bxh111","volume":"48","author":"YM Tseng","year":"2005","unstructured":"Tseng YM (2005) A robust multi-party key agreement protocol resistant to malicious participants. Comput J 48(4):480\u2013487","journal-title":"Comput J"},{"issue":"4","key":"96_CR42","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.cose.2006.12.001","volume":"26","author":"YM Tseng","year":"2007","unstructured":"Tseng YM (2007) A resource-constrained group key agreement protocol for imbalanced wireless networks. Comput Secur 26(4):331\u2013337","journal-title":"Comput Secur"},{"issue":"7","key":"96_CR43","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1016\/j.jss.2006.12.565","volume":"80","author":"Q Wang","year":"2007","unstructured":"Wang Q, Cao Z (2007) Identity based proxy multi-signature. J Syst Softw 80(7):1023\u20131029","journal-title":"J Syst Softw"},{"key":"96_CR44","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/98.403453","volume":"24","author":"JE Wilkes","year":"1995","unstructured":"Wilkes JE (1995) Privacy and authentication needs of PCS. IEEE Pers Commun 24:11\u201315","journal-title":"IEEE Pers Commun"},{"issue":"3","key":"96_CR45","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1016\/j.ins.2007.07.005","volume":"178","author":"J Zhang","year":"2008","unstructured":"Zhang J, Mao J (2008) A novel id-based designated verifier signature scheme. Inf Sci 178(3):766\u2013773","journal-title":"Inf Sci"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-009-0096-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-009-0096-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-009-0096-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T06:38:00Z","timestamp":1559457480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-009-0096-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,18]]},"references-count":45,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["96"],"URL":"https:\/\/doi.org\/10.1007\/s12243-009-0096-z","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,4,18]]}}}