{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:38:18Z","timestamp":1730227098523,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275893","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"1883-1892","source":"Crossref","is-referenced-by-count":9,"title":["A secure SMS protocol for implementing digital cash system"],"prefix":"10.1109","author":[{"given":"N. Raghu","family":"Kisore","sequence":"first","affiliation":[]},{"given":"Supriya","family":"Sagi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"biryukov","article-title":"Real time cryptanalysis of A5\/1 on a PC","key":"ref10"},{"year":"2002","journal-title":"3rd Generation Partnership Project (3GPP) TR 23 039","article-title":"Interface Protocols for the Connection of Short Message Service Centers (SMSCs) to Short Message Entities (SMEs)","key":"ref11"},{"year":"2013","author":"barker","article-title":"Nist sp (special publication) 800-56a, revision 2, recommendation for pair-wise key establishment schemes using discrete logarithm","key":"ref12"},{"year":"2009","journal-title":"Standards for Efficient Cryptography (SEC) TS","article-title":"SEC 2: Recommended Elliptic Curve Domain Parameters, Version 2.0","key":"ref13"},{"year":"1997","article-title":"Set secure electronic transaction specification, version 1.0, book 3: Formal protocol definition","key":"ref14"},{"key":"ref15","article-title":"Evaluation of Security Level of Cryptography: ECMQVS (from SEC 1)","author":"rogaway","year":"2001","journal-title":"CRYPTREC TS"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/501978.501981"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref18","first-page":"71","article-title":"Using an approximated one-time pad to secure short messaging service (SMS)","volume":"1","author":"croft","year":"2005","journal-title":"Southern African Telecommunication Networks and Applications Conference 2005 (SATNAC 2005) Proceedings"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.cose.2008.05.003"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/S0167-4048(03)00507-8"},{"year":"2008","journal-title":"3rd Generation Partnership Project (3GPP) TS 23 041","article-title":"Technical realization of Short Message Service (SMS)","key":"ref3"},{"key":"ref6","article-title":"Evaluation of Security Level of Cryptography: ECDHS (from SEC 1)","author":"rogaway","year":"2001","journal-title":"CRYPTREC TS"},{"key":"ref5","article-title":"Recommendation for pair-wise key establishment schemes using discrete logarithm cryp-tography","author":"barker","year":"2013","journal-title":"NIST Special Publication 800&#x2013;53 Revision 3"},{"year":"1998","journal-title":"ANSI TS X9 63-2001","article-title":"Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography, Version 2.0","key":"ref8"},{"year":"2009","journal-title":"Standards for Efficient Cryptography","article-title":"SEC 1: Elliptic Curve Cryptography","key":"ref7"},{"year":"2001","article-title":"fips","key":"ref2"},{"key":"ref1","first-page":"rfc 3278","article-title":"Use of elliptic curve cryptography (ecc) algorithms in cryptographic message syntax (ems)","volume":"4","author":"blake-wilson","year":"2002"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1023\/A:1022285130956"},{"key":"ref20","article-title":"A secure text messaging protocol","author":"belvin","year":"2011","journal-title":"Maryland USA"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275893.pdf?arnumber=7275893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:13:19Z","timestamp":1490379199000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275893\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275893","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}