{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:46:35Z","timestamp":1762508795139,"version":"3.37.3"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology of the Republic of China, Taiwan","doi-asserted-by":"publisher","award":["MOST 106-2221-E-320-001","MOST 108-2221-E-320-001","MOST 110-2221-E-320-005-MY2"],"award-info":[{"award-number":["MOST 106-2221-E-320-001","MOST 108-2221-E-320-001","MOST 110-2221-E-320-005-MY2"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3188316","type":"journal-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T19:58:34Z","timestamp":1656964714000},"page":"71278-71283","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Extended Chaotic Map-Based IBE for Industrial Environment"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8454-5803","authenticated-orcid":false,"given":"Tian-Fu","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Medical Informatics, Tzu Chi University, Hualien, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yi-Chien","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Medical Informatics, Tzu Chi University, Hualien, Taiwan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"volume-title":"PKI in Manufacturing\u2014Creating an Industrial PKI Registration Authority","year":"2020","author":"Philipp","key":"ref1"},{"volume-title":"Industry 4.0: The Authentication of Things Within the Internet of Things\u2014PKI as a Solution Approach","year":"2017","author":"Brisch","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/3-540-39568-7_5"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/3-540-48071-4_32"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/3-540-44647-8_13"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/3-540-45325-3_32"},{"key":"ref7","first-page":"69","article-title":"Secure key issuing in ID-based cryptography","volume-title":"Proc. ACSW Frontiers 2nd Workshop Australas. Inf. Secur., Data Mining Web Intell., Softw. Internationalisation","volume":"32","author":"Lee"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ISCAS.2003.1204947"},{"volume-title":"Chebyshev Polynomials","year":"2003","author":"Mason","key":"ref9"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/s11071-015-2126-x"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TCSI.2005.851701"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.chaos.2006.09.047"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.cnsns.2010.08.015"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.cnsns.2012.09.032"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/s11071-011-0247-4"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/s11071-012-0652-3"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/s11071-014-1304-6"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s11071-015-2135-9"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s10916-015-0240-4"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.3390\/s150714960"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/s11227-016-1688-9"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/3-540-45539-6_12"},{"volume-title":"Sequences of Games: A Tool for Taming Complexity in Security Proofs","year":"2005","author":"Shoup","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/978-3-540-40061-5_29"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09815060.pdf?arnumber=9815060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T05:01:29Z","timestamp":1706763689000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9815060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3188316","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2022]]}}}