{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T16:21:58Z","timestamp":1649002918044},"reference-count":33,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1080\/10798587.2016.1152776","type":"journal-article","created":{"date-parts":[[2016,3,21]],"date-time":"2016-03-21T22:57:13Z","timestamp":1458601033000},"page":"535-542","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":0,"title":["Group-based fast data packet attribute authentication in the reconfigurable networks"],"prefix":"10.32604","volume":"22","author":[{"given":"Hongyong","family":"Jia","sequence":"first","affiliation":[]},{"given":"Yue","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Julong","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2016,3,21]]},"reference":[{"key":"CIT0001","first-page":"1617","volume-title":"IEEE Communications Surveys and Tutorials","volume":"99","author":"Baa N.","year":"2014"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461196"},{"key":"CIT0003","first-page":"480","volume-title":"Advances in cryptology-EUROCRYPT 1997","volume":"1233","author":"Baric N.","year":"1997"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054130"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_5"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"CIT0007","first-page":"106","volume-title":"Proceedings ACM Symposium on Theory of Computing","author":"Carter I.L.","year":"1977"},{"key":"CIT0008","first-page":"1063","volume-title":"Intelligent Automation and Soft Computing","volume":"17","author":"Chen H.","year":"2011"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.2295809"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2014.888243"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848111"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2014.915109"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491207"},{"key":"CIT0014","first-page":"1035","volume-title":"Intelligent Automation and Soft Computing","volume":"17","author":"Gui J.J.","year":"2011"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_30"},{"key":"CIT0016","first-page":"723","volume-title":"Journal of Cryptology","volume":"25","author":"Jan C.","year":"2012"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2015.1015777"},{"key":"CIT0018","first-page":"474","volume-title":"Proceedings of 19th ACM Conference on Computer and Communications Security","author":"Joseph A.A.","year":"2012"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04852-9_17"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848109"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"CIT0022","first-page":"493","volume-title":"IEEE Communications Surveys and Tutorials","volume":"16","author":"Lara A.","year":"2013"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77272-9_3"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2491703"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486005"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2013.786958"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_16"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17455-1_6"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"CIT0034","first-page":"35","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Perrig A.","year":"2001"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2011.10643218"},{"key":"CIT0037","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-642-34129-8_15","volume-title":"Proceedings of the Conference on Information and Communications Security","volume":"7618","author":"Tsz H.Y.","year":"2012"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1152776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:08:51Z","timestamp":1591189731000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1152776"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,21]]},"references-count":33,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,4,20]]},"published-print":{"date-parts":[[2016,10]]}},"alternative-id":["10.1080\/10798587.2016.1152776"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2016.1152776","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}