{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:19:57Z","timestamp":1730236797261,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/icct46805.2019.8947083","type":"proceedings-article","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T00:42:22Z","timestamp":1578012142000},"page":"415-419","source":"Crossref","is-referenced-by-count":1,"title":["Unified Identity Authentication Scheme Based on UAF Protocol"],"prefix":"10.1109","author":[{"given":"Ping","family":"Zhen","sequence":"first","affiliation":[]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"FIDO UAF application API and transport binding specification v1 0","year":"2016","key":"ref4"},{"journal-title":"Fido uaf architectural overview","year":"2016","key":"ref3"},{"journal-title":"OAuth2 0","year":"2012","key":"ref10"},{"key":"ref6","first-page":"6","article-title":"An open authorization scheme based on FIDO UAF architecture","volume":"2017","author":"lianglei","year":"2017","journal-title":"Technology Research"},{"key":"ref11","first-page":"7","article-title":"Multi-identities Authentication and Authorization Schema in Cloud Computing. Journal[J]","volume":"8","author":"weiyu","year":"2012","journal-title":"Netinfo Security"},{"journal-title":"Research on Security of FIDO UAF Authentication Protocol","year":"2016","author":"kexin","key":"ref5"},{"journal-title":"IEEE Standard for Identity-Based Cryptographic Techniques using Pairings","year":"2013","key":"ref8"},{"key":"ref7","first-page":"47","article-title":"A.: Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Advances in Cryptology (CRYPTO)"},{"journal-title":"FIDO UAF protocol specification v1 0 2016-08-20","year":"2016","key":"ref2"},{"journal-title":"GM\/T 0044-2016 SM9 Identification Cryptography Algorithm","year":"2016","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866414"}],"event":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2019,10,16]]},"location":"Xi'an, China","end":{"date-parts":[[2019,10,19]]}},"container-title":["2019 IEEE 19th International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8943077\/8946993\/08947083.pdf?arnumber=8947083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:48:01Z","timestamp":1658094481000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8947083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icct46805.2019.8947083","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}