{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:04:32Z","timestamp":1729652672920,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/grc.2013.6740452","type":"proceedings-article","created":{"date-parts":[[2014,2,21]],"date-time":"2014-02-21T15:19:40Z","timestamp":1392995980000},"page":"443-448","source":"Crossref","is-referenced-by-count":5,"title":["A novel detective and self-organized certificateless key management scheme in mobile ad hoc networks"],"prefix":"10.1109","author":[{"given":"Jun","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Sanchun","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Fangfang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Dianxin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuanjun","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"2","first-page":"567","article-title":"Self securing ad hoc wireless network","author":"luo","year":"2002","journal-title":"Internatioinal Symposium on Computers and Communications"},{"key":"10","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","article-title":"Certificateless public key cryptography [M]","author":"al-riyami","year":"2003","journal-title":"Advances in Cryptology-ASIACRYPT 2003"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"7","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.adhoc.2004.03.005","article-title":"TIDS: Threshold and identity-based security scheme for wireless ad hoc networks","volume":"2","author":"deng","year":"2004","journal-title":"Ad Hoc Networks"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2004.1286434"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210183"},{"key":"4","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based encryption from the Weil pairing [C]","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-Crypto 2001"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.291"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1012.0362"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22577-2_66"}],"event":{"name":"2013 IEEE International Conference on Granular Computing (GrC)","start":{"date-parts":[[2013,12,13]]},"location":"TBD, China","end":{"date-parts":[[2013,12,15]]}},"container-title":["2013 IEEE International Conference on Granular Computing (GrC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6729743\/6740363\/06740452.pdf?arnumber=6740452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T04:20:46Z","timestamp":1498105246000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6740452\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/grc.2013.6740452","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}