{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:05:47Z","timestamp":1729670747062,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/icdim.2007.4444271","type":"proceedings-article","created":{"date-parts":[[2008,7,23]],"date-time":"2008-07-23T13:49:26Z","timestamp":1216820966000},"page":"493-499","source":"Crossref","is-referenced-by-count":0,"title":["Practical and robust self-keying scheme for personal area networks"],"prefix":"10.1109","author":[{"family":"Jihoon Cho","sequence":"first","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/PIMRC.2002.1045230"},{"key":"ref11","first-page":"29","article-title":"Manual authentication for wireless devices","volume":"7","author":"gehrmann","year":"2004","journal-title":"CryptoBytes"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1049\/PBTE051E_ch9"},{"key":"ref13","first-page":"31","article-title":"The personal CA &#x2014; PKI for a Personal Area Network","author":"gehrmann","year":"2002","journal-title":"Proceedings of 1ST Mobile & Wireless Communications Summit 2002 Thessaloniki Greece June 2002"},{"key":"ref14","first-page":"295","article-title":"Secure distributed key generation for discrete-log based cryptosystem","author":"gennaro","year":"1999","journal-title":"Advances in Cryptology &#x2014; EUROCRYPT '99 International Conference on the Theory and Application of Cryptographic Techniques Proceedings"},{"key":"ref15","article-title":"Use of shared keys in the TLS protocol","author":"gutmann","year":"2003","journal-title":"Internet draft (expired) draft-ietf-tls-sharedkeys-02"},{"key":"ref16","first-page":"339","article-title":"Proactive secret sharing or: How to cope with perpetual leakage","author":"herzberg","year":"1995","journal-title":"Advances in Cryptology &#x2014; CRYPTO '95 15th Annual International Cryptology Conference Proceedings"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/SAINTW.2003.1210183"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1109\/TDSC.2006.58","article-title":"Securing mobile ad hoc networks with certificateless public keys","volume":"3","author":"liu","year":"2006","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1049\/PBTE051E_ch3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MCOM.2005.1404606"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1007\/978-3-540-24852-1_18"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.adhoc.2004.03.005"},{"key":"ref5","first-page":"18","article-title":"An identity-based signature from Gap Diffie-Hellman groups","author":"cha","year":"2003","journal-title":"Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography Public Key Cryptography"},{"key":"ref8","article-title":"Pre-shared key ciphersuites for Transport Layer Security (TLS)","author":"eronen","year":"2005","journal-title":"RFC 4279"},{"year":"2003","author":"dierks","journal-title":"The TLS Protocol Version 1 1 IETF Internet Draft","key":"ref7"},{"key":"ref2","first-page":"213","article-title":"Identity-based encryption from the Weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology &#x2014;CRYPTO 2001 21st Annual International Cryptology Conference Santa Barbara California USA August 19&#x2013;23 2001 Proceedings"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/SFCS.1987.4"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ACSAC.2001.991545"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/112600.112605"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/11767480_26"},{"key":"ref21","first-page":"26","article-title":"Cryptosystems based on pairing","author":"sakai","year":"2000","journal-title":"2000 Symposium on Cryptography and Information Security (SCIS2000)"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/INFCOM.2005.1498472"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/SP.2006.35"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/65.806983"}],"event":{"name":"2007 2nd International Conference on Digital Information Management","start":{"date-parts":[[2007,10,28]]},"location":"Lyon, France","end":{"date-parts":[[2007,10,31]]}},"container-title":["2007 2nd International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4444189\/4444190\/04444271.pdf?arnumber=4444271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T10:17:09Z","timestamp":1497781029000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4444271\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icdim.2007.4444271","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}