{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:36:07Z","timestamp":1730252167578,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/icnsc.2008.4525421","type":"proceedings-article","created":{"date-parts":[[2008,5,20]],"date-time":"2008-05-20T16:11:19Z","timestamp":1211299879000},"page":"1315-1319","source":"Crossref","is-referenced-by-count":1,"title":["On the Security of two Authenticated Encryption Schemes"],"prefix":"10.1109","author":[{"given":"Jianhong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Cheng","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"13"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"3","first-page":"291","article-title":"signcryption and its application in efficient public key solutionisw'97, in lecture notes computer","volume":"1397","author":"zheng","year":"1998","journal-title":"Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1049\/el:19951167"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19940856"},{"key":"10","first-page":"63","article-title":"the limited verifier signature and its application","volume":"e82a","author":"araki","year":"1999","journal-title":"IEICE Trans on Fundamentals"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00143-1"},{"year":"0","key":"6"},{"year":"0","key":"5"},{"key":"4","first-page":"387","article-title":"security proof for signature scheme, eurocrypt'96 in lect. notes comput","volume":"1070","author":"pointcheval","year":"1996","journal-title":"Sci 1996"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2008 IEEE International Conference on Networking, Sensing and Control (ICNSC)","start":{"date-parts":[[2008,4,6]]},"location":"Sanya, China","end":{"date-parts":[[2008,4,8]]}},"container-title":["2008 IEEE International Conference on Networking, Sensing and Control"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4489617\/4525150\/04525421.pdf?arnumber=4525421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T14:35:48Z","timestamp":1489674948000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4525421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icnsc.2008.4525421","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}