{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:56:58Z","timestamp":1767650218810,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1109\/ipdps.2006.1639684","type":"proceedings-article","created":{"date-parts":[[2006,7,10]],"date-time":"2006-07-10T19:59:56Z","timestamp":1152561596000},"page":"8 pp.","source":"Crossref","is-referenced-by-count":5,"title":["Energy-efficient ID-based group key agreement protocols for wireless networks"],"prefix":"10.1109","author":[{"family":"Chik How Tan","sequence":"first","affiliation":[]},{"given":"J.C.M.","family":"Teo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/71.877936"},{"key":"13","article-title":"Cryptosystems based on pairing","author":"sakai","year":"2000","journal-title":"SCIS 2000"},{"key":"14","first-page":"362","article-title":"Identity-based access control for ad hoc groups","volume":"3506","author":"saxena","year":"2005","journal-title":"LNCS"},{"journal-title":"Multiprecision Integer and Rational Arithmetic C\/c++ library","year":"0","key":"11"},{"key":"12","first-page":"320","article-title":"Efficient identity-based conference key distribution protocols","volume":"1438","author":"saeednia","year":"1998","journal-title":"LNCS"},{"year":"0","key":"3"},{"key":"2","first-page":"275","author":"burmester","year":"1995","journal-title":"Advances in Cryptography - Eurocrypt '94 volume 950 of LNCS A secure and efficient conference key distribution system"},{"key":"1","article-title":"On the performance of group key agreement protocols","author":"amir","year":"2001","journal-title":"John Hopkins Univ Center of Networking and Distributed Systems TR CNDS-2001-5"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984337"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056542"},{"key":"6","article-title":"The energy cost of secrets in ad-hoc networks","author":"hodjat","year":"2002","journal-title":"IEEE CAS Workshop on Wireless Communication and Networking"},{"key":"5","first-page":"216","article-title":"A \"paradoxical\" identity-based signature scheme resulting from zero-knowledge","volume":"403","author":"guillou","year":"1990","journal-title":"LNCS"},{"key":"4","first-page":"498","article-title":"An efficient dynamic group key agreement for low-power mobile devices","volume":"3480","author":"cho","year":"2005","journal-title":"LNCS"},{"key":"9","first-page":"110","article-title":"Scalable protocols for authenticated group key exchange","volume":"2729","author":"katz","year":"2003","journal-title":"LNCS"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022241315935"}],"event":{"name":"Proceedings 20th IEEE International Parallel & Distributed Processing Symposium","start":{"date-parts":[[2006,4,25]]},"location":"Rhodes Island, Greece","end":{"date-parts":[[2006,4,29]]}},"container-title":["Proceedings 20th IEEE International Parallel &amp; Distributed Processing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10917\/34366\/01639684.pdf?arnumber=1639684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T23:18:35Z","timestamp":1489533515000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1639684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ipdps.2006.1639684","relation":{},"subject":[],"published":{"date-parts":[[2006]]}}}