{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T19:30:13Z","timestamp":1694633413855},"reference-count":25,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1080\/00207160701663315","type":"journal-article","created":{"date-parts":[[2008,6,21]],"date-time":"2008-06-21T12:17:09Z","timestamp":1214050629000},"page":"753-770","source":"Crossref","is-referenced-by-count":5,"title":["Subliminal channels in the identity-based threshold ring signature"],"prefix":"10.1080","volume":"86","author":[{"given":"Chao-Lin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chuan-Ming","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24582-7_15"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"CIT0003","first-page":"213","author":"Boneh D.","year":"2001","journal-title":"Advance in Cryptology-Crypto\u201901"},{"key":"CIT0004","first-page":"465","author":"Bresson E.","year":"2002","journal-title":"Advance in Cryptology-Crypto\u201902"},{"key":"CIT0005","unstructured":"Chang, C. F., Hwang, T. and Li, C. M. 2004. \u201cAsymmetric subliminal channel signature scheme\u201d. NCKU. Master thesis"},{"key":"CIT0006","first-page":"255","author":"Canetti R.","year":"2003","journal-title":"Advances in Cryptology \u2013 Eurocrypt'03"},{"key":"CIT0007","doi-asserted-by":"crossref","unstructured":"Chow, S. S.M., Hui, L. C.K. and Yiu, S. M. 2004. Identity based threshold ring signature. International Conference on Information Security and Cryptology \u2013 ICISC 2004. 2004. pp.218\u2013232. LNCS 3506","DOI":"10.1007\/11496618_17"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Chow, S. S.M., Yiu, S. M. and Hui, L. C.K. 2005. Efficient identity based ring signature. 3rd International Conference \u2013 ACNS 05. 2005. Applied Cryptography and Network Security, pp.499\u2013512. Springer. LNCS 3531","DOI":"10.1007\/11496137_34"},{"key":"CIT0009","first-page":"144","author":"Chow S. S.M.","year":"2005","journal-title":"EuroPKI 2005"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1007\/11958239_12"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19971511"},{"key":"CIT0012","unstructured":"Huang, Z., Chen, D. and Wang, Y. 2005. Multi-signature with anonymous threshold subliminal channel for ad-hoc environments. 19th International Conference on Advanced Information Networking and Applications. 2005. Vol. 1, pp.67\u201371."},{"key":"CIT0013","unstructured":"Herranz, J. and Saez, G. 2003. Forking lemmas for ring signature schemes. 4th International Conference on Cryptology. 2003. Advances in Indocrypt'03, pp.266\u2013279."},{"key":"CIT0014","unstructured":"Jan, J. K. and Tseng, Y. M. 1999. New digital signature with subliminal channel based on the discrete logarithm problem. Proceedings of the 1999 International Workshops on Parallel Processing. 1999. pp.198\u2013203."},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1201\/9780203504765"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2003.1261223"},{"key":"CIT0017","first-page":"187","volume":"86","author":"Lee N. Y.","year":"2003","journal-title":"IEICE Trans. Fundam."},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2005.01.071"},{"key":"CIT0019","unstructured":"Li, C. M., Hung, C. C. and Hwang, T. 2005. \u201cMultiple subliminal channels in the ring signature\u201d. NCKU. Master thesis"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"CIT0022","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/978-1-4684-4730-9_5","author":"Simmons G. J.","year":"1984","journal-title":"Advance in Cryptology-CRYPTO'83"},{"key":"CIT0023","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/3-540-48285-7_18","volume":"93","author":"Simmons G. J.","year":"1994","journal-title":"Advance in Cryptology-Eurocrypt'"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.04.007"},{"key":"CIT0025","first-page":"49","author":"Zahng J.","year":"2005","journal-title":"Processings of IEEE Networking, Sensing and Control"},{"key":"CIT0026","unstructured":"Zhang, F., Lee, B. and Kim, K. Exploring signature schemes with subliminal channel. Proceedings of SCIS2003. Vol. 1\/2, pp.245\u2013250."}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160701663315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,12]],"date-time":"2021-09-12T13:02:13Z","timestamp":1631451733000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/00207160701663315"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2009,5]]}},"alternative-id":["10.1080\/00207160701663315"],"URL":"https:\/\/doi.org\/10.1080\/00207160701663315","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,5]]}}}