{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T09:21:00Z","timestamp":1710408060349},"reference-count":4,"publisher":"Oxford University Press (OUP)","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Computer Journal"],"DOI":"10.1093\/comjnl\/bxw058","type":"journal-article","created":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T02:23:05Z","timestamp":1472696585000},"source":"Crossref","is-referenced-by-count":1,"title":["Editorial: On the Security of the First Leakage-Free Certificateless Signcryption Scheme"],"prefix":"10.1093","author":[{"given":"Xi-Jun","family":"Lin","sequence":"first","affiliation":[]},{"given":"Lin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Haipeng","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Xiaoshuai","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"2016083119225920000_bxw058v1.1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv002"},{"key":"2016083119225920000_bxw058v1.2","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1093\/comjnl\/bxt116","article-title":"Leakage-free ID-based signature","volume":"58","author":"Tseng","year":"2013","journal-title":"Comp. J."},{"key":"2016083119225920000_bxw058v1.3","doi-asserted-by":"crossref","unstructured":"Barbosa, M. and Farshim, P. (2008) Certificateless signcryption. Proceedings of the ACM Symposium on Information Computer & Communications Security, Tokyo, March 18\u201320, pp. 369\u2013372. ACM, New York.","DOI":"10.1145\/1368310.1368364"},{"key":"2016083119225920000_bxw058v1.4","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S. and Paterson, K. (2003) Certificateless public key cryptography. Asiacrypt\u201903, Taipei, Taiwan, November 30\u2013December 4, pp. 452\u2013473. Springer-Verlag, Berlin.","DOI":"10.1007\/978-3-540-40061-5_29"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/60\/4\/491\/11077782\/bxw058.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T03:28:01Z","timestamp":1568345281000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article-lookup\/doi\/10.1093\/comjnl\/bxw058"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,31]]},"references-count":4,"alternative-id":["10.1093\/comjnl\/bxw058"],"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxw058","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,31]]}}}