{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:43:16Z","timestamp":1729676596820,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/icisa.2013.6579416","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:12:51Z","timestamp":1377709971000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Cryptanalysis of Two Proxy Signature Schemes with Restricted Times of Delegation"],"prefix":"10.1109","author":[{"given":"Sung-Ming","family":"Yen","sequence":"first","affiliation":[]},{"given":"Jian-Hong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2007.10.005"},{"key":"2","doi-asserted-by":"crossref","first-page":"455","DOI":"10.15388\/Informatica.2004.072","article-title":"An efficient proxy signature scheme with revocation","volume":"15","author":"das","year":"2004","journal-title":"Informatica"},{"journal-title":"Design and Computation of Public Key Cryptosystems","year":"1994","author":"yen","key":"10"},{"key":"1","first-page":"385","article-title":"Schnorr signature scheme with restricted signing capability and its application","author":"choi","year":"2003","journal-title":"Proc of Computer Security Symp -CSS 2003"},{"key":"7","first-page":"1338","article-title":"Proxy signatures: Delegation of the power to sign messages","volume":"e79 a","author":"mambo","year":"1996","journal-title":"IEICE Trans on Fundamentals of Electronics Communications and Computer Sciences"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2003.12.039"},{"key":"5","first-page":"603","article-title":"Strong proxy signature and its applications","author":"lee","year":"2001","journal-title":"Proceedings of the 2001 Symposium on Cryptography and Information Security"},{"key":"4","first-page":"223","article-title":"Proxy signatures, revisited","volume":"1334","author":"kim","year":"1997","journal-title":"Proc of ICICS 1997 LNCS"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:20000888"},{"key":"8","first-page":"369","article-title":"A digital signature based on a conventional encryption function","volume":"293","author":"merkle","year":"2006","journal-title":"Proc of CRYPTO 1987 LNCS"}],"event":{"name":"2013 International Conference on Information Science and Applications (ICISA)","start":{"date-parts":[[2013,6,24]]},"location":"Suwon, Korea (South)","end":{"date-parts":[[2013,6,26]]}},"container-title":["2013 International Conference on Information Science and Applications (ICISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6575223\/6579310\/06579416.pdf?arnumber=6579416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,2]],"date-time":"2020-08-02T15:06:06Z","timestamp":1596380766000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6579416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icisa.2013.6579416","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}