{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:42:24Z","timestamp":1729622544750,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906408","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T14:59:25Z","timestamp":1412089165000},"page":"505-510","source":"Crossref","is-referenced-by-count":0,"title":["Distributed anonymous authentication in heterogeneous networks"],"prefix":"10.1109","author":[{"given":"Shin-Ming","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Cheng-Han","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Shannon","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shih-Hao","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"14","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/1030083.1030106","article-title":"Group signatures with veri fie-local revocation","author":"boneh","year":"2004","journal-title":"Proc ACM Conference on Computer and Communications Security"},{"key":"11","first-page":"41","article-title":"Short group signatures","author":"boneh","year":"2004","journal-title":"Proc Adv Cryptology-CRYFTO"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"3","first-page":"441","article-title":"Fonnal security definitio and efficien construction for roaming with a privacy-preserving extension","volume":"14","author":"yang","year":"2008","journal-title":"J Universal Comput Sci"},{"key":"2","first-page":"1478","article-title":"A quantitative study of authentication and QoS in wireless IP networks","volume":"2","author":"liang","year":"2005","journal-title":"Proc IEEE InfoCom"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.06020042"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1411759.1411774"},{"key":"7","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume":"196","author":"shamir","year":"1984","journal-title":"Proceedings of Advances in Cryptology CRYPTO'99"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2002.1188479"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2004.1311554"},{"key":"4","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1023\/B:WIRE.0000047067.12167.67","article-title":"Towards certificate-base authentication for future mobile communications","volume":"29","author":"bayarou","year":"2004","journal-title":"Wirel Pers Commun"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.326"},{"key":"8","first-page":"213","article-title":"Identity-based encryption from the weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"Proc Adv Cryptology-Crypto"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2014,8,4]]},"location":"Nicosia, Cyprus","end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906408.pdf?arnumber=6906408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T11:58:56Z","timestamp":1650283136000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906408"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906408","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}