{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:08:21Z","timestamp":1729634901580,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/isbast.2014.7013119","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:34:53Z","timestamp":1421868893000},"page":"188-192","source":"Crossref","is-referenced-by-count":3,"title":["New secure identity-based and certificateless authenticated Key Agreement protocols without pairings"],"prefix":"10.1109","author":[{"given":"Seyed-Mohsen","family":"Ghoreishi","sequence":"first","affiliation":[]},{"given":"Shukor","family":"Abd Razak","sequence":"additional","affiliation":[]},{"given":"Ismail Fauzi","family":"Isnin","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Chizari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.08.004"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2012.03.044"},{"key":"11","first-page":"412","article-title":"A two-party certificateless authenticated key agreement protocol without pairing","author":"hou","year":"2009","journal-title":"2nd IEEE International Conference on Computer Science and Information Technology"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2009.152"},{"key":"3","article-title":"Identity based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-CRYPTO"},{"key":"2","article-title":"Identity-based cryptosystems and signature schemes","volume":"196","author":"shamir","year":"1984","journal-title":"Advances in Cryptology-Crypto 1984 Lecture Notes in Computer Science 196"},{"key":"1","article-title":"Understanding public-key infrastructure","author":"adams","year":"2003","journal-title":"Concepts Standards and Deployment Considerations"},{"key":"10","first-page":"143","article-title":"A pairing-free ID-based key agreement protocol with different PKGs","volume":"16","author":"farash","year":"2014","journal-title":"Int J Network Security"},{"key":"7","first-page":"30","article-title":"Key agreement protocols and their security analysis","volume":"1335","author":"blake-wilson","year":"1997","journal-title":"Proc of the 6th IMA International Conference on Cryptography and Coding"},{"key":"6","article-title":"On the in distinguishability-based security model of key agreement protocols-simple cases","author":"cheng","year":"2005","journal-title":"Cryptology ePrint Archive"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0011-9"},{"key":"4","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/978-3-540-40061-5_29","article-title":"Certificateless public key cryptography","author":"al-riyami","year":"2003","journal-title":"Advances in Cryptology C Asiacrypt 2003"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.04.002"},{"key":"8","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1016\/j.proeng.2012.01.890","article-title":"An improved pairing-free identity-based authenticated key agreement protocol based on ECC","volume":"30","author":"hafizul islam","year":"2012","journal-title":"Procedia Engineering"}],"event":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","start":{"date-parts":[[2014,8,26]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2014,8,27]]}},"container-title":["2014 International Symposium on Biometrics and Security Technologies (ISBAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994953\/7013076\/07013119.pdf?arnumber=7013119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T04:03:21Z","timestamp":1498190601000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7013119\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isbast.2014.7013119","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}