{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:59:13Z","timestamp":1729663153707,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/isbast.2014.7013116","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T14:34:53Z","timestamp":1421850893000},"page":"171-175","source":"Crossref","is-referenced-by-count":0,"title":["Security evaluation over lightweight cryptographic protocols"],"prefix":"10.1109","author":[{"given":"Seyed-Mohsen","family":"Ghoreishi","sequence":"first","affiliation":[]},{"given":"Shukor","family":"Abd Razak","sequence":"additional","affiliation":[]},{"given":"Ismail Fauzi","family":"Isnin","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Chizari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Relations Among Notions of Security for Public-key Encryption Schemes","year":"1998","author":"bellare","key":"19"},{"journal-title":"Short Programs for Functions on Curves","year":"1986","author":"miller","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"journal-title":"Ecrypt Yearly Report on Algorithms and Keysizes","year":"2004","key":"15"},{"key":"16","article-title":"Pairing-based cryptography for sensor networks","author":"oliveira","year":"2006","journal-title":"5th IEEE International Symposium on Network Computing and Applications"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352557"},{"journal-title":"NIST Recommendation for Key Management Part 1 General NistSpecialpublication 800-57","year":"2005","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0109-y"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09699-5_7"},{"journal-title":"Entity Authentication and Key Distribution","year":"1993","author":"bellare","key":"21"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"22","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/11586821_29","article-title":"Security proof of the Sakai-Kasahara'sidentity-based encryption scheme","volume":"3706 lncs","author":"chen","year":"2005","journal-title":"Cryptography and Coding"},{"key":"23","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1137\/S0097539701398521","article-title":"Identity based encryption from the weil pairing","volume":"32","author":"boneh","year":"2003","journal-title":"SIAM J of Computing"},{"key":"24","article-title":"Efficient selective-ID secure identity based encryption without random oracles","author":"boneh","year":"2004","journal-title":"Proceedings of EUROCRYPT"},{"key":"25","article-title":"Short signatures from the weil pairing","author":"boneh","year":"2001","journal-title":"Proceedings of Asiacrypt"},{"key":"26","first-page":"31","article-title":"Efficient threshold signature, multisignature and blind signature schemes based on the gap-diffie-hellman-group signature scheme","volume":"2139","author":"boldyreva","year":"2003","journal-title":"PKC 2003 LNCS"},{"key":"27","first-page":"xvii","article-title":"Efficient identity-based and authenticated key agreement protocols","author":"wang","year":"2013","journal-title":"Transactions on Computational Science"},{"key":"28","doi-asserted-by":"crossref","DOI":"10.1109\/CSFW.2003.1212715","article-title":"Identity based authenticated key agreement from pairings","author":"chen","year":"2003","journal-title":"IEEE Computer Security Foundations Workshop"},{"key":"3","first-page":"65","article-title":"MOCA: Mobile certificate authority for wireless ad hoc networks","author":"yi","year":"2003","journal-title":"Annual PKI Research Workshop Program"},{"key":"2","first-page":"251","article-title":"The sybil attack","author":"douceur","year":"2002","journal-title":"IPTPS'01 Revised Papers from the First International Workshop on Peer-to-Peer Systems"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.76"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.7763\/IJET.2013.V5.567"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381907"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2004.1400219"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"}],"event":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","start":{"date-parts":[[2014,8,26]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2014,8,27]]}},"container-title":["2014 International Symposium on Biometrics and Security Technologies (ISBAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994953\/7013076\/07013116.pdf?arnumber=7013116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:03:23Z","timestamp":1498176203000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7013116\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/isbast.2014.7013116","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}