{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:16:41Z","timestamp":1729649801918,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/icufn.2016.7537118","type":"proceedings-article","created":{"date-parts":[[2016,8,11]],"date-time":"2016-08-11T16:34:40Z","timestamp":1470933280000},"page":"670-672","source":"Crossref","is-referenced-by-count":1,"title":["Performance of secure network coding based on homomorphic encryption"],"prefix":"10.1109","author":[{"family":"Seong-Min Choi","sequence":"first","affiliation":[]},{"family":"Joon-Sang Park","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462050"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062146"},{"key":"ref6","article-title":"Final Report on Main Computational Assumptions in Cryptography","volume":"11","author":"vercauteren","year":"2013","journal-title":"ECRPYT"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.336"},{"key":"ref8","article-title":"Weakly Secure Network Coding","author":"bhattad","year":"2005","journal-title":"Proc Net Cod Riva del Garda"},{"key":"ref7","first-page":"223","article-title":"Public-Key Based on Composite Degree Residuocity Classes","volume":"1592","author":"paillier","year":"1999","journal-title":"Proc of EUROCRYPT'99"},{"key":"ref2","first-page":"2235","article-title":"Network Coding for Large Scale Content","author":"gkantsidis","year":"2005","journal-title":"Proc IEEE InfoCom"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_5"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"}],"event":{"name":"2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)","start":{"date-parts":[[2016,7,5]]},"location":"Vienna, Austria","end":{"date-parts":[[2016,7,8]]}},"container-title":["2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7527553\/7536915\/07537118.pdf?arnumber=7537118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T18:23:05Z","timestamp":1475173385000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7537118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icufn.2016.7537118","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}