{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:14:11Z","timestamp":1730258051909,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icsmc.2009.5346018","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T19:44:31Z","timestamp":1260474271000},"page":"5123-5127","source":"Crossref","is-referenced-by-count":7,"title":["A new efficient strong proxy signcryption scheme based on a combination of hard problems"],"prefix":"10.1109","author":[{"given":"Hassan","family":"Elkamchouchi","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Nasr","sequence":"additional","affiliation":[]},{"given":"Roayat","family":"Ismail","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"3"},{"key":"2","first-page":"1338","article-title":"Proxy signatures: Delegation of the power to sign message","volume":"e79 a","author":"mambo","year":"1996","journal-title":"IEICE Transactions on Fundamentals"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"year":"0","key":"1"},{"key":"7","first-page":"482","article-title":"An identity-based identification scheme based on discrete logarithms modulo a composite number","volume":"473","author":"girault","year":"1991","journal-title":"LNCS"},{"key":"6","article-title":"Handboock of Applied Cryptography","author":"menezes","year":"1997","journal-title":"CRC Press"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-7987-7_7"},{"article-title":"An efficient scheme for secure message transmission using proxy signcryption","year":"1998","author":"gamage","key":"4"},{"key":"9","first-page":"137","article-title":"Rijndael: The Advanced Encryption Standard","author":"daemen","year":"2001","journal-title":"Dr Dobb's Journal"},{"journal-title":"Secure Hash Standard","first-page":"180","year":"2002","key":"8"}],"event":{"name":"2009 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2009,10,11]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340904\/5345886\/05346018.pdf?arnumber=5346018","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T02:42:41Z","timestamp":1489891361000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5346018\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2009.5346018","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}