{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T20:48:32Z","timestamp":1726519712532},"reference-count":9,"publisher":"Elsevier BV","issue":"9-10","license":[{"start":{"date-parts":[[1996,8,1]],"date-time":"1996-08-01T00:00:00Z","timestamp":838857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1996,8]]},"DOI":"10.1016\/s0140-3664(96)01112-7","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:56:11Z","timestamp":1027652171000},"page":"848-850","source":"Crossref","is-referenced-by-count":27,"title":["Key authentication scheme for cryptosystems based on discrete logarithms"],"prefix":"10.1016","volume":"19","author":[{"given":"Gwoboa","family":"Horng","sequence":"first","affiliation":[]},{"given":"C.S.","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(96)01112-7_BIB1","series-title":"Proc. EUROCRYPTO '91","first-page":"490","article-title":"Self-certified public keys","author":"Girault","year":"1991"},{"key":"10.1016\/S0140-3664(96)01112-7_BIB2","series-title":"Proc. CRYPTO '84","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"Shamir","year":"1984"},{"key":"10.1016\/S0140-3664(96)01112-7_BIB3","first-page":"190","article-title":"Contemporary Cryptology: The Science of Information Integrity","author":"Simmons","year":"1992"},{"year":"1978","series-title":"A Method for Certification","author":"Kohnfelder","key":"10.1016\/S0140-3664(96)01112-7_BIB4"},{"key":"10.1016\/S0140-3664(96)01112-7_BIB5","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/0167-4048(94)90009-4","article-title":"Authentication and protection of public keys","volume":"13","author":"Laih","year":"1994","journal-title":"Computers & Security"},{"issue":"8","key":"10.1016\/S0140-3664(96)01112-7_BIB6","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1145\/361082.361087","article-title":"A user authentication system not requiring secrecy in the computer","volume":"17","author":"Evans","year":"1974","journal-title":"Commun. ACM"},{"key":"10.1016\/S0140-3664(96)01112-7_BIB7","first-page":"89","article-title":"The search for provably secure cryptosystems","volume":"42","author":"Goldwasser","year":"1990"},{"issue":"4","key":"10.1016\/S0140-3664(96)01112-7_BIB8","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"IT-31","author":"El Gamal","year":"1985","journal-title":"IEEE Trans. Inform. Theory"},{"year":"1992","series-title":"Digital Signature Standard","author":"NIST FIPS PUB XX","key":"10.1016\/S0140-3664(96)01112-7_BIB9"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366496011127?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366496011127?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T03:23:27Z","timestamp":1555212207000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366496011127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,8]]},"references-count":9,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[1996,8]]}},"alternative-id":["S0140366496011127"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(96)01112-7","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[1996,8]]}}}