{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:54:54Z","timestamp":1725414894846},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/icics.2015.7459858","type":"proceedings-article","created":{"date-parts":[[2016,5,5]],"date-time":"2016-05-05T15:46:29Z","timestamp":1462463189000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Universally composable asymmetric group key agreement protocol"],"prefix":"10.1109","author":[{"given":"Yong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Mingxing","family":"He","sequence":"additional","affiliation":[]},{"given":"Shengke","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501983"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06320-1_36"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.05.009"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2010.81"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_22"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310743"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-011-9114-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_16"},{"key":"ref8","first-page":"61","article-title":"Initiator-resilient universally composable key exchange","author":"hotbeinz","year":"2003","journal-title":"Computer Security-ESORICS 2003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533079"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/SFCS.2001.959888","article-title":"Universally composable security: A new paradigm for cryptographic protocols","author":"canetti","year":"2001","journal-title":"Foundations of Computer Science 2001 Proceedings 42nd IEEE Symposium on"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102146"}],"event":{"name":"2015 10th International Conference on Information, Communications and Signal Processing (ICICS)","start":{"date-parts":[[2015,12,2]]},"location":"Singapore","end":{"date-parts":[[2015,12,4]]}},"container-title":["2015 10th International Conference on Information, Communications and Signal Processing (ICICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7454592\/7459813\/07459858.pdf?arnumber=7459858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T09:41:49Z","timestamp":1567849309000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7459858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icics.2015.7459858","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}