{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T18:32:04Z","timestamp":1715279524312},"reference-count":22,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2015,7,3]]},"DOI":"10.1080\/10798587.2015.1015777","type":"journal-article","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T15:36:16Z","timestamp":1425396976000},"page":"433-443","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Identity Based On-Line\/Off-Line Signature With Designated Verifier"],"prefix":"10.32604","volume":"21","author":[{"given":"Yi","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Anping","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2015,3,3]]},"reference":[{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966922"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_24"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85230-8_22"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_13"},{"key":"cit0021","first-page":"411","volume":"15","author":"Jayaprakash K.","year":"2013","journal-title":"International Journal of Network Security"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2010.10643089"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_22"},{"key":"cit0017","unstructured":"LaguillaumieF. & VergnaudD. (2005). Designated verifier signatures: Anonymity and efficient construction from any bilinear map. In C.Blundo & S.Cimato (Eds.), LNCS. SCN 2004, Amalfi, Italy, September 8\u201310, (Vol. 3352, pp. 105\u2013119). Heidelberg: Springer."},{"key":"cit0001","unstructured":"LewisF. (2004). Wireless sensor networks. Smart environments: Technologies, protocols, and applications. New York, NY: John Wiley."},{"key":"cit0016","unstructured":"LipmaaH., WangG. & BaoF. (2005). Designated verifier signature schemes: Attacks, new security notions and a new construction. In LNCS. ICALP, Lisbon, Portugal, July 11\u201315, (Vol. 3580, pp. 459\u2013471). Heidelberg: Springer."},{"key":"cit0003","first-page":"481","volume":"20","author":"Shaikha R.","year":"2014","journal-title":"Intelligent Automation & Soft Computing"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_21"},{"key":"cit0013","unstructured":"SelviS. S. D., VivekS. S. & RanganC. P. (2010). Identity based online\/offline signcryption scheme. IACR Cryptology Print Archive, 2010, Report No. 376."},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.05.020"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2010.10643101"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1109\/NPC.2008.12"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2013.787190"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2010.10643097"},{"key":"cit0004","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1587\/transinf.E95.D.126","volume":"95","author":"Yasmin R.","year":"2012","journal-title":"IEICE Transactions"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_33"},{"key":"cit0075","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_33"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1015777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:11:54Z","timestamp":1591189914000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1015777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,3]]},"references-count":22,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,4,23]]},"published-print":{"date-parts":[[2015,7,3]]}},"alternative-id":["10.1080\/10798587.2015.1015777"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2015.1015777","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}